Search results for: ARCHITECTURES - Bridge of Knowledge

Search

Search results for: ARCHITECTURES

Filters

total: 145
filtered: 123

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: ARCHITECTURES

  • Collective citizens' behavior modelling with support of the Internet of Things and Big Data

    In this paper, collective human behaviors are modelled by a development of Big Data mining related to the Internet of Things. Some studies under MapReduce architectures have been carried out to improve an efficiency of Big Data mining. Intelligent agents in data mining have been analyzed for smart city systems, as well as data mining has been described by genetic programming. Furthermore, artificial neural networks have been discussed...

    Full text to download in external service

  • Next generation ITS implementation aspects in 5G wireless communication network

    Publication

    - Year 2017

    In the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...

    Full text to download in external service

  • ANN for human pose estimation in low resolution depth images

    Publication

    - Year 2017

    The paper presents an approach to localize human body joints in 3D coordinates based on a single low resolution depth image. First a framework to generate a database of 80k realistic depth images from a 3D body model is described. Then data preprocessing and normalization procedure, and DNN and MLP artificial neural networks architectures and training are presented. The robustness against camera distance and image noise is analysed....

    Full text available to download

  • Visual Data Encryption for Privacy Enhancement in Surveillance Systems

    Publication

    In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...

    Full text to download in external service

  • Integration of Services into Workflow Applications

    Publication

    - Year 2015

    Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications. It discusses key challenges related to the integration of distributed systems and proposes solutions, both in terms of theoretical aspects such as models and workflow scheduling algorithms, and technical...

    Full text to download in external service

  • Systematics of intelligent transport systems services

    Recent years have seen a more intensified deployment of Intelligent Transport Systems (ITS) in Polish cities. Work is also underway on the implementation of ITS on the national roads within the National Traffic Management System (KSZR). The research project RID-4D (part of Road Innovations), is designed to fill the gap, which is the lack of systematics of ITS services in Poland. The paper presents a proposal of ITS services systematics,...

    Full text available to download

  • Interplay of hydrogen bonding and aryl-perfluoroaryl interactions in construction of supramolecular aggregates

    Publication

    - Year 2013

    The stacking between aryl and perfluoroaryl units is an important class of the aromatic – aromatic interactions that has attracted rapidly growing interest in recent years. Continuing interest of our group in this subject it had been prepared three new complexes of pentafluorobenzoic acid with benzyl alcohol, 4-methylbenzyl alcohol and 4-tert-butylbenzyl alcohol and in the next step investigated their self-assembly modes by...

    Full text to download in external service

  • Human Factors and Functional Safety Analysis in Designing the Control Rooms of Industrial Hazardous Plants

    Publication

    - Year 2014

    In this work some aspects of human factors and functional safety analysis in designing the control rooms of industrial hazardous plants are presented. The “defence in depth” (D-in-D) concept is outlined. Some designing issues of the alarm system (AS) with regard to human factors to be supported using the human reliability analysis (HRA) are discussed. The AS and decision support system (DSS), when properly designed, would contribute...

    Full text to download in external service

  • Smart Cities System Design Method Based on Case Based Reasoning

    Publication

    The objective of this paper is to present the results of research carried out to develop a design method for Smart Cities systems. The method is based on the analysis of design cases of Smart Cities systems in cities, the selection of the city appropriate to the requirements for implementation and application. The Case Based Reasoning method was used to develop the proposed design methodology, along with mechanisms of the conversion...

    Full text to download in external service

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain

    Publication

    Abstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...

    Full text to download in external service

  • Teaching High Performance Computing Using BeesyCluster and Relevant Usage Statistics

    Publication

    - Year 2014

    The paper presents motivations and experiences from using the BeesyCluster middleware for teaching high performance computing at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. Features of BeesyCluster well suited for conducting courses are discussed including: easy-to-use WWW interface for application development and running hiding queuing systems, publishing applications as services...

    Full text to download in external service

  • Design of a microrobotic wrist for needle laparoscopic surgery

    Publication

    The paper addresses the design of a micro wrist for needle laparoscopic surgery (needlescopy) using MEMS technology and an original 3 degree of freedom, 3D architecture. Advancement in needlescopy drives the development of multi-dof micro-tools 1-2mmin diameter with 3D mobility but standard available fabricationtechniques are for 2.5D structures. The paper discusses thedevelopment steps and design solutions for the realization...

    Full text to download in external service

  • Composites of tin oxide and different carbonaceous materials as negative electrodes in lithium-ion batteries

    Abstract Tin and tin oxide have been considered as suitable materials with high theoretical capacity for lithium ion batteries. Their low cost, high safety and other technical benefits placed them as promising replacements for graphite negative electrodes. The problem to overcome with tin oxide, as well as with other metallic materials, is high volume changes during alloying/dealloying, subsequent pulverization, delamination from...

    Full text available to download

  • Maritime Communications Network Development Using Virtualised Network Slicing of 5G Network

    Publication

    - Nase More - Year 2020

    The paper presents the review on perspectives of maritime systems development at the context of 5G systems implementation and their main properties. Firstly, 5G systems requirements and principles are discussed, which can be important for maritime applications. Secondly, the problems of network softwarisation, virtualisation and slicing, and possible types of services for potential implementation in 5G marine applications are described....

    Full text available to download

  • DUABI - Business Intelligence Architecture for Dual Perspective Analytics

    Publication

    - Year 2017

    A significant expansion of Big Data and NoSQL databases made it necessary to develop new architectures for Business Intelligence systems based on data organized in a non-relational way. There are many novel solutions combining Big Data technologies with Data Warehousing. However, the proposed solutions are often not sufficient enough to meet the increasing business demands, such as low data latency while still maintaining high...

  • Deep Learning: A Case Study for Image Recognition Using Transfer Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Deep Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Breast MRI segmentation by deep learning: key gaps and challenges

    Publication

    Breast MRI segmentation plays a vital role in early diagnosis and treatment planning of breast anomalies. Convolutional neural networks with deep learning have indicated promise in automating this process, but significant gaps and challenges remain to address. This PubMed-based review provides a comprehensive literature overview of the latest deep learning models used for breast segmentation. The article categorizes the literature...

    Full text available to download

  • Miniaturized Dual-Band SIW-Based Bandpass Filters Using Open-Loop Ring Resonators

    Publication

    - Electronics - Year 2023

    This article presents two novel architectures of dual-band substrate integrated waveguide (SIW) bandpass filters (BPFs). Initially, two identical open-loop ring resonators (OLRRs) are coupled face-to-face on the top of the SIW cavity to realize a dual-band single-pole BPF. To obtain two-pole dual-band characteristics, two OLRRs resonant units are assembled horizontally within the top metal layer of the SIW, which is a technique...

    Full text available to download

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publication
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Year 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Full text to download in external service

  • Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems

    Publication

    - Year 2014

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...

    Full text to download in external service

  • Ln2(SeO3)2(SO4)(H2O)2 (Ln=Sm, Dy, Yb): A Mixed‐Ligand Pathway to New Lanthanide(III) Multifunctional Materials Featuring Nonlinear Optical and Magnetic Anisotropy Properties

    Publication

    - ANGEWANDTE CHEMIE-INTERNATIONAL EDITION - Year 2022

    Bottom-up assembly of optically nonlinear and magnetically anisotropic lanthanide materials involving precisely placed spin carriers and optimized metal-ligand coordination offers a potential route to developing electronic architectures for coherent radiation generation and spin-based technologies, but the chemical design historically has been extremely hard to achieve. To address this, we developed a worthwhile avenue for creating...

    Full text available to download

  • Extensions of ETSI performance measurements methodology for statistical results analysis =Rozszerzenia metodologii pomiarów wydajności zaproponowanej przez ETSI przy statystycznej analizy wyników

    Next Generation Network (NGN) architecture was proposed by International Telecommunication Union Telecommunication Standardization Sector (ITU-T) to deliver telecommunication services satisfying the needs of modern society for an access to information. The core of NGN service stratum are IP Multimedia Subsystem (IMS) elements acting as service controls units. To assess performance of IMS components, European Telecommunications...

  • Clickable polysaccharides for biomedical applications: A comprehensive review

    Publication
    • M. Khodadadi Yazdi
    • S. M. Sajadi
    • F. Seidi
    • N. Rabiee
    • Y. Fatahi
    • M. Rabiee
    • C. M. Dominic
    • P. Zarrintaj
    • K. Formela
    • M. Saeb
    • S. A. Bencherif

    - PROGRESS IN POLYMER SCIENCE - Year 2022

    Recent advances in materials science and engineering highlight the importance of designing sophisticated biomaterials with well-defined architectures and tunable properties for emerging biomedical applications. Click chemistry, a powerful method allowing specific and controllable bioorthogonal reactions, has revolutionized our ability to make complex molecular structures with a high level of specificity, selectivity, and yield...

    Full text available to download

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures

    This article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...

    Full text available to download

  • Detecting Objects of Various Categories in Optical Remote Sensing Imagery Using Neural Networks

    Publication

    - Year 2024

    The effective detection of objects in remote sensing images is of great research importance, so recent years have seen a significant progress in deep learning techniques in this field. However, despite much valuable research being conducted, many challenges still remain. A lot of research projects focus on detecting objects of a single category (class), while correctly detecting objects of different categories is much harder. The...

    Full text to download in external service

  • Call Control Evaluation in ASON/GMPLS Architecture

    Publication

    The Automatically Switched Optical Network (ASON) utilizing Generalized Multi–Protocol Label Switching (GMPLS) protocols named as ASON/GMPLS is one of the propositions of Next Generation Network. The basic assumption of ASON control plane is a separation of call control from connection control. The control plane is divided into call control and connection control components. Presented work regards the problem of call control evaluation...

  • Cross-Lingual Knowledge Distillation via Flow-Based Voice Conversion for Robust Polyglot Text-to-Speech

    Publication
    • D. Piotrowski
    • R. Korzeniowski
    • A. Falai
    • S. Cygert
    • K. Pokora
    • G. Tinchev
    • Z. Zhang
    • K. Yanagisawa

    - Year 2023

    In this work, we introduce a framework for cross-lingual speech synthesis, which involves an upstream Voice Conversion (VC) model and a downstream Text-To-Speech (TTS) model. The proposed framework consists of 4 stages. In the first two stages, we use a VC model to convert utterances in the target locale to the voice of the target speaker. In the third stage, the converted data is combined with the linguistic features and durations...

    Full text to download in external service

  • Visual Features for Improving Endoscopic Bleeding Detection Using Convolutional Neural Networks

    Publication

    The presented paper investigates the problem of endoscopic bleeding detection in endoscopic videos in the form of a binary image classification task. A set of definitions of high-level visual features of endoscopic bleeding is introduced, which incorporates domain knowledge from the field. The high-level features are coupled with respective feature descriptors, enabling automatic capture of the features using image processing methods....

    Full text available to download

  • Performance assessment of OpenMP constructs and benchmarks using modern compilers and multi-core CPUs

    Publication

    - Year 2023

    Considering ongoing developments of both modern CPUs, especially in the context of increasing numbers of cores, cache memory and architectures as well as compilers there is a constant need for benchmarking representative and frequently run workloads. The key metric is speed-up as the computational power of modern CPUs stems mainly from using multiple cores. In this paper, we show and discuss results from running codes such as:...

    Full text to download in external service

  • An Efficient Framework For Fast Computer Aided Design of Microwave Circuits Based on the Higher-Order 3D Finite-Element Method

    In this paper, an efficient computational framework for the full-wave design by optimization of complex microwave passive devices, such as antennas, filters, and multiplexers, is described. The framework consists of a computational engine, a 3D object modeler, and a graphical user interface. The computational engine, which is based on a finite element method with curvilinear higher-order tetrahedral elements, is coupled with built-in...

    Full text available to download

  • A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention

    Publication

    - IEEE Internet of Things Journal - Year 2019

    Together with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...

    Full text available to download

  • Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects

    This article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...

    Full text to download in external service

  • Auto-tuning methodology for configuration and application parameters of hybrid CPU + GPU parallel systems based on expert knowledge

    Publication

    Auto-tuning of configuration and application param- eters allows to achieve significant performance gains in many contemporary compute-intensive applications. Feasible search spaces of parameters tend to become too big to allow for exhaustive search in the auto-tuning process. Expert knowledge about the utilized computing systems becomes useful to prune the search space and new methodologies are needed in the face of emerging heterogeneous...

    Full text available to download

  • Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...

    Full text available to download

  • The impact of the AC922 Architecture on Performance of Deep Neural Network Training

    Publication

    - Year 2020

    Practical deep learning applications require more and more computing power. New computing architectures emerge, specifically designed for the artificial intelligence applications, including the IBM Power System AC922. In this paper we confront an AC922 (8335-GTG) server equipped with 4 NVIDIA Volta V100 GPUs with selected deep neural network training applications, including four convolutional and one recurrent model. We report...

    Full text to download in external service

  • An Intelligent Approach to Short-Term Wind Power Prediction Using Deep Neural Networks

    Publication

    - Journal of Artificial Intelligence and Soft Computing Research - Year 2023

    In this paper, an intelligent approach to the Short-Term Wind Power Prediction (STWPP) problem is considered, with the use of various types of Deep Neural Networks (DNNs). The impact of the prediction time horizon length on accuracy, and the influence of temperature on prediction effectiveness have been analyzed. Three types of DNNs have been implemented and tested, including: CNN (Convolutional Neural Networks), GRU (Gated Recurrent...

    Full text available to download

  • Semantic segmentation training using imperfect annotations and loss masking

    One of the most significant factors affecting supervised neural network training is the precision of the annotations. Also, in a case of expert group, the problem of inconsistent data annotations is an integral part of real-world supervised learning processes, well-known to researchers. One practical example is a weak ground truth delineation for medical image segmentation. In this paper, we have developed a new method of accurate...

    Full text to download in external service

  • Medical Image Segmentation Using Deep Semantic-based Methods: A Review of Techniques, Applications and Emerging Trends

    Publication

    - Information Fusion - Year 2022

    Semantic-based segmentation (Semseg) methods play an essential part in medical imaging analysis to improve the diagnostic process. In Semseg technique, every pixel of an image is classified into an instance, where each class is corresponded by an instance. In particular, the semantic segmentation can be used by many medical experts in the domain of radiology, ophthalmologists, dermatologist, and image-guided radiotherapy. The authors...

    Full text to download in external service

  • Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?

    Publication
    • G. Kulcsar
    • P. Varga
    • M. S. Tatara
    • F. Montori
    • M. A. Inigo
    • G. Urgese
    • P. Azzoni

    - Year 2021

    Advancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...

    Full text available to download

  • Cognitive motivations and foundations for building intelligent decision-making systems

    Concepts based on psychology fit well with current research trends related to robotics and artificial intelligence. Biology-inspired cognitive architectures are extremely useful in building agents and robots, and this is one of the most important challenges of modern science. Therefore, the widely viewed and far-reaching goal of systems research and engineering is virtual agents and autonomous robots that mimic human behavior in...

    Full text available to download

  • IoT for healthcare applications

    Publication
    • K. Sayrafian
    • S. J. Ambroziak
    • D. Bajic
    • L. Berbakov
    • L. M. Correia
    • K. Cwalina
    • C. Garcia-pardo
    • G. Gardašević
    • K. Katzis
    • P. Kulakowski
    • K. Turbic

    - Year 2021

    This chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...

    Full text available to download

  • Photophysical processes in the selected white organic light-emitting diodes

    Publication

    - Year 2017

    The first part discusses history of organic emitters, the scope of the work, phenomena in molecular systems, types of architectures in OLEDs, types of OLEDs emitting white light with examples from the literaturę and a description of the parameters chcracterizing LEDs. The second part describes materials, production of the samples, the measurement systems and results. In chapter 8.1 the results for the OLEDs based on emission from...

    Full text available to download

  • Safety integrity level verification for safety-related functions with security aspects

    The article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...

    Full text to download in external service

  • Deep learning based thermal image segmentation for laboratory animals tracking

    Publication

    Automated systems for behaviour classification of laboratory animals are an attractive alternative to manual scoring. However, the proper animals separation and tracking, especially when they are in close contact, is the bottleneck of the behaviour analysis systems. In this paper, we propose a method for the segmentation of thermal images of laboratory rats that are in close contact during social behaviour tests. For this, we are...

    Full text to download in external service

  • Clothes Detection and Classification Using Convolutional Neural Networks

    Publication

    In this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...

    Full text to download in external service

  • Efficiency of Artificial Intelligence Methods for Hearing Loss Type Classification: an Evaluation

    Publication
    • M. Kassjański
    • M. Kulawiak
    • T. Przewoźny
    • D. Tretiakow
    • J. Kuryłowicz
    • A. Molisz
    • K. Koźmiński
    • A. Kwaśniewska
    • P. Mierzwińska-Dolny
    • M. Grono

    - Journal of Automation, Mobile Robotics and Intelligent Systems - JAMRIS - Year 2024

    The evaluation of hearing loss is primarily conducted by pure tone audiometry testing, which is often regarded as golden standard for assessing auditory function. If the presence of hearing loss is determined, it is possible to differentiate between three types of hearing loss: sensorineural, conductive, and mixed. This study presents a comprehensive comparison of a variety of AI classification models, performed on 4007 pure tone...

    Full text to download in external service

  • Jakość usług w optycznej sieci wielodomenowej z hierarchiczną strukturą płaszczyzn sterowania

    Publication

    - Year 2022

    W rozprawie przedstawiono przegląd architektur sieci z gwarancją jakości klas usług oraz stan prac w zakresie realizacji optycznych sieci ASON, GMPLS oraz ASON/GMPLS. Opisano wymagania i zaawansowanie prac w realizacji sieci ASON/GMPLS z hierarchiczną strukturą płaszczyzn sterowania oraz problemy związane z zagadnieniem jakości klas usług w tej sieci. Zaprezentowano założenia, koncepcję oraz realizację modelu symulacyjnego optycznej...