Search results for: COMPUTER-SUPPORTED WORK - Bridge of Knowledge

Search

Search results for: COMPUTER-SUPPORTED WORK

Filters

total: 5930
filtered: 4507

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: COMPUTER-SUPPORTED WORK

  • An extended basis inexact shift–invert Lanczos for the efficient solution of large-scale generalized eigenproblems

    This paper proposes a technique, based on the Inexact Shift–Invert Lanczos (ISIL) method with Inexact Jacobi Orthogonal Component Correction (IJOCC) refinement, and a preconditioned conjugate-gradient (PCG) linear solver with multilevel preconditioner, for finding several eigenvalues for generalized symmetric eigenproblems. Several eigenvalues are found by constructing (with the ISIL process) an extended projection basis. Presented...

    Full text to download in external service

  • Designing Intelligent Factory: Conceptual Framework and Empirical Validation

    Publication

    - Procedia Computer Science - Year 2016

    This paper presents a framework for monitoring, analysing and decision making for a smart manufacturing environment. We maintain that this approach could play a vital role in developing an architecture and implementation of Industry 4.0. The proposed model has features like experience based knowledge representation and semantic analysis of engineering objects and manufacturing process. It is also capable of continuous real time...

    Full text available to download

  • Extensions of Quasilinearization Method for Differential Equations with Integral Boundary Conditions

    Praca dotyczy równań różniczkowych z warunkami brzegowymi typu całkowego. Podano warunki dostateczne na istnienie jedynego rozwiązania takiego zagadnienia i pokazano, że odpowiednio konstruowane ciągi monotoniczne są zbieżne do tego rozwiązania i jest to zbieżność kwadratowa. Te monotoniczne ciągi są przybliżonymi rozwiązaniami problemu wyjściowego i obustronnie szacują szukane rozwiązanie.

  • Sustainable Waste Management for Implementation of a Circular Economy Model in a Port

    Publication

    - Procedia Computer Science - Year 2023

    The manuscript presents the management of waste from marine vessels and cargo handling companies in a selected European Union port. The main objective of the paper is to analyse and evaluate the existing waste management model in the port of Szczecin in the context of circular economy. The expert research carried out is aimed, inter alia, at identifying which of the solutions currently in use need to be improved from an environmental...

    Full text available to download

  • Synchronous black hole search in directed graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2011

    The paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...

    Full text available to download

  • Smaller representation of finite state automata

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2012

    This paper is a follow-up to Jan Daciuk's experiments on space-efficient finite state automata representation that can be used directly for traversals in main memory (Daciuk, 2000)[4]. We investigate several techniques for reducing memory footprint of minimal automata, mainly exploiting the fact that transition labels and transition pointer offset values are not evenly distributed and so are suitable for compression. We achieve...

    Full text available to download

  • New approach to the chunk recoginition in Polish

    Publication

    - Procedia Computer Science - Year 2021

    Full text to download in external service

  • 2-Coloring number revisited

    2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...

    Full text available to download

  • Proposition of the methodology for Data Acquisition, Analysis and Visualization in support of Industry 4.0

    Publication

    - Procedia Computer Science - Year 2019

    Industry 4.0 offers a comprehensive, interlinked, and holistic approach to manufacturing. It connects physical with digital and allows for better collaboration and access across departments, partners, vendors, product, and people. Consequently, it involves complex designing of highly specialized state of the art technologies. Thus, companies face formidable challenges in the adoption of these new technologies....

    Full text available to download

  • Finding small-width connected path decompositions in polynomial time

    Publication

    A connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...

    Full text available to download

  • Cops, a fast robber and defensive domination on interval graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Full text available to download

  • Smart Virtual Product Development (SVPD) to Enhance Product Manufacturing in Industry 4.0

    Publication

    - Procedia Computer Science - Year 2019

    This paper presents a system capable of enhancing product development process for industrial manufactured products. This system is known as Smart Virtual Product Development (SVPD), and it helps in decision making by using explicit knowledge of formal decision events. It stores and reuses the past decisional events or sets of experiences related to different activities involved in industrial product development process i.e. product...

    Full text available to download

  • Industry 4.0 Implementation Challenges in Manufacturing Industries: an Interpretive Structural Modelling Approach

    Publication

    - Procedia Computer Science - Year 2020

    For the last few years, the fourth industrial revolution, known as Industry 4.0, has been a hot topic among academics. Industry 4.0 literature involves researches presenting studies related to its different aspects including challenges, opportunities, implementation and adoption. However, a detailed study of challenges and barriers towards the Industry 4.0 implementation in manufacturing industries is missing. Hence, this paper...

    Full text available to download

  • Smart Virtual Product Development (SVPD) System to Support Product Inspection Planning in Industry 4.0

    Publication

    - Procedia Computer Science - Year 2020

    This paper presents the idea of supporting product inspection planning process during the early stages of product life cycle for the experts working on product development. Aim of this research is to assist a collaborative product development process by using Smart Virtual Product Development (SVPD) system, which is based on Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). The proposed system is developed...

    Full text available to download

  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey

    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

  • Improving the Performance of Ontological Querying by using a Contextual Approach

    In the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...

    Full text available to download

  • Contextual ontology for tonality assessment

    Publication

    classification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...

    Full text available to download

  • Microscopic traffic simulation models for connected and automated vehicles (CAVs) – state-of-the-art

    Publication
    • P. Gora
    • C. Kartakazas
    • A. Drabicki
    • F. Islam
    • P. Ostaszewski

    - Procedia Computer Science - Year 2020

    Research on connected and automated vehicles (CAVs) has been gaining substantial momentum in recent years. However, thevast amount of literature sources results in a wide range of applied tools and datasets, assumed methodology to investigate thepotential impacts of future CAVs traffic, and, consequently, differences in the obtained findings. This limits the scope of theircomparability and applicability and calls for a proper standardization...

    Full text available to download

  • Gossiping by energy-constrained mobile agents in tree networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2021

    Every node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...

    Full text to download in external service

  • MobileNet family tailored for Raspberry Pi

    With the advances in systems-on-a-chip technologies, there is a growing demand to deploy intelligent vision systems on low-cost microcomputers. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity of contemporary convolutional neural networks (CNNs). The state-of-the-art lightweight CNN is MobileNetV3. However, it was designed to achieve a good trade-off between...

    Full text available to download

  • Integrating Experience-Based Knowledge Representation and Machine Learning for Efficient Virtual Engineering Object Performance

    Publication

    - Procedia Computer Science - Year 2021

    Machine learning and Artificial Intelligence have grown significant attention from industry and academia during the past decade. The key reason behind interest is such technologies capabilities to revolutionize human life since they seamlessly integrate classical networks, networked objects and people to create more efficient environments. In this paper, the Knowledge Representation technique of Set of Experience...

    Full text available to download

  • Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey

    Publication

    In its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...

    Full text to download in external service

  • Weighted 2-sections and hypergraph reconstruction

    Publication

    In the paper we introduce the notion of weighted 2-sections of hypergraphs with integer weights and study the following hypergraph reconstruction problems: (1) Given a weighted graph , is there a hypergraph H such that is its weighted 2-section? (2) Given a weighted 2-section , find a hypergraph H such that is its weighted 2-section. We show that (1) is NP-hard even if G is a complete graph or integer weights w does not exceed...

    Full text to download in external service

  • Jamming and jamming mitigation for selected 5G military scenarios

    Publication
    • P. Skokowski
    • J. M. Kelner
    • K. Malon
    • K. Maślanka
    • A. Birutis
    • M. A. Vazquez
    • S. Saha
    • W. Low
    • A. Czapiewska
    • J. Magiera... and 2 others

    - Procedia Computer Science - Year 2022

    This paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....

    Full text available to download

  • Three levels of fail-safe mode in MPI I/O NVRAM distributed cache

    The paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...

    Full text available to download

  • ARIMA vs LSTM on NASDAQ stock exchange data

    Publication

    - Procedia Computer Science - Year 2022

    This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...

    Full text available to download

  • Machine learning applied to acoustic-based road traffic monitoring

    The motivation behind this study lies in adapting acoustic noise monitoring systems for road traffic monitoring for driver’s safety. Such a system should recognize a vehicle type and weather-related pavement conditions based on the audio level measurement. The study presents the effectiveness of the selected machine learning algorithms in acoustic-based road traffic monitoring. Bases of the operation of the acoustic road traffic...

    Full text available to download

  • The complexity of bicriteria tree-depth

    Publication

    The tree-depth problem can be seen as finding an elimination tree of minimum height for a given input graph G. We introduce a bicriteria generalization in which additionally the width of the elimination tree needs to be bounded by some input integer b. We are interested in the case when G is the line graph of a tree, proving that the problem is NP-hard and obtaining a polynomial-time additive 2b-approximation algorithm. This particular...

    Full text to download in external service

  • TISAX - optimization of IT risk management in the automotive industry

    Publication
    • T. Królikowski
    • A. Ubowska

    - Procedia Computer Science - Year 2021

    Full text to download in external service

  • ChatGPT - opportunities or threats in the educational process

    Publication
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Year 2023

    Full text to download in external service

  • Building a cybersecurity culture of public administration system in Poland

    Publication
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Year 2022

    Full text to download in external service

  • Very accurate time propagation of coupled Schrödinger equations for femto- and attosecond physics and chemistry, with C++ source code

    Publication

    In this article, I present a very fast and high-precision (up to 33 decimal places) C++ implementation of the semi-global time propagation algorithm for a system of coupled Schrödinger equations with a time-dependent Hamiltonian. It can be used to describe time-dependent processes in molecular systems after excitation by femto- and attosecond laser pulses. It also works with an arbitrary user supplied Hamiltonian and can be used...

    Full text available to download

  • Self-standing Nanoarchitectures

    Publication

    - Year 2020

    Despite there are structures invisible for the human eye, they mastered the world of advanced electronic devices, sensors, novel cosmetics or drugs. When the dimensions of the materials go down to the nanometres scale, their properties change dramatically comparing to the observable objects. Because of their tiny size, they gained the name of nanomaterials but simultaneously their importance has significantly grown up. Nanomaterials...

    Full text available to download

  • Operational Enhancement of Numerical Weather Prediction with Data from Real-time Satellite Images

    Numerical weather prediction (NWP) is a rapidly expanding field of science, which is related to meteorology, remote sensing and computer science. Authors present methods of enhancing WRF EMS (Weather Research and Forecast Environmental Modeling System) weather prediction system using data from satellites equipped with AMSU sensor (Advanced Microwave Sounding Unit). The data is acquired with Department of Geoinformatics’ ground...

  • Syntactic modular decomposition of large ontologies with relational database

    Publication

    - Year 2009

    Support for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...

    Full text to download in external service

  • Scalable Maintenance of Address Mapping and Autodetecion in Environments Where Agents are Uncapable of Self-Registration

    Publication

    - Year 2013

    When working with multi-agent systems it is often desirable to manage the agent set. The existing methods of central monitoring stems from two different fields of application. The first has its roots in in computer network monitoring, the other in mutli-agent simulation environments. Both approaches are not general enough to cater for loosely controlled environments, where the total agent population is not known and often fluctuating,...

  • Testing A Novel Gesture-Based Mixing Interface

    With a digital audio workstation, in contrast to the traditional mouse-keyboard computer interface, hand gestures can be used to mix audio with eyes closed. Mixing with a visual representation of audio parameters during experiments led to broadening the panorama and a more intensive use of shelving equalizers. Listening tests proved that the use of hand gestures produces mixes that are aesthetically as good as those obtained using...

    Full text available to download

  • Software tool for modelling of mechatronic systems with elastic continua

    Publication

    - Year 2011

    The paper presents a systematic computational package for modelling and analysis of complex systems composed of multiple lumped and distributed parameter subsystems. The constructed computer program enables the frequency domain analysis of a class of linear systems and to obtain reduced order model in the form of bond graph. Obtained modal bond graph can be directly exported into 20-Sim package to further processing including nonlinear...

  • An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree

    A 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...

    Full text to download in external service

  • Self-Optimizing Adaptive Vibration Controller

    This paper presents a new approach to rejection of sinusoidal disturbances acting at the output of a discrete-time linear stable plant with unknown dynamics. It is assumed that the frequency of the sinusoidal disturbance is known, and that the output signal is contaminated with wideband measurement noise. The proposed controller, called SONIC (self-optimizing narrowband interference canceller), combines the coefficient fixing technique,...

    Full text available to download

  • OSC - domain oriented ontology creation system

    Publication

    Ontologies are, as part of semantic web, a basic component to enrich content available in the Internet with a meaning understandable for computers. In this publication an architecture and functionality of a domain oriented web portal for collaborative creation and storage of ontologies is presented. The system is being created by Gdańsk University of Technology Electronics, Telecommunications and Informatics faculty's Department...

  • HCI and the economics of user experience

    Publication

    - Year 2008

    Rodział przezentuje możliwości rozwinięcia zakresu tradycyjnych badań HCI (Human-Computer Interaction) o zagadnienia ekonomiczne, związane z jakością usług on-line, postrzeganą przez użytkownika/klienta. Praca zawiera modele jakości usług on-line oparte na elementach marketingu relacji i na wykorzystaniu ekonomicznych determinant zachowań konsumenckich w usługach on-line. Rozdział prezentuje modele projektowania i rozwoju przykładowych...

  • Platform Supporting the Esophageal Impedance Analysis

    The esophageal pH-impedance examination is one of the most popular diagnostic methods for identifying the upper gastrointestinal tract’s diseases. Inconclusive test evaluation criteria makes it difficult to state the definite diagnosis. In this paper, the computer platform supporting the research and teaching process in the area of pH-impedance analysis is presented. Users, having a variety of mathematical and statistical methods...

    Full text to download in external service

  • Design of power cable lines partially exposed to direct solar radiation – special aspects

    Publication

    - ENERGIES - Year 2020

    Power cable lines are usually buried in the ground. However, in some cases, their ending sections are mounted along the supports of overhead lines. This leads to a situation where the cables are exposed to direct solar radiation and, consequentially, overheat. The paper presents the advanced computer modelling of power cables’ heating, considering their insolation as well as the effect of wind. The temperature and current-carrying...

    Full text available to download

  • Minimising the Churn Out of the Service by Using a Fairness Mechanism

    Publication

    The paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...

    Full text to download in external service

  • ANALYSIS OF THE LOAD-CARRYING CAPACITY OF A HYDRODYNAMIC WATER-LUBRICATED BEARING IN A HYDROELECTRIC POwER PLANT

    Publication

    - TRIBOLOGIA - Year 2018

    The paper presents an analysis of the load-carrying capacity of a historic hydrodynamic water-lubricated radial bearing of an unconventional segment design installed in the Braniewo Hydroelectric Power Plant. The aim of the calculations was to determine whether the bearing operates in the conditions of hydrodynamic or mixed lubrication, as well as to establish the optimal geometry of the axial grooves allowing for the highest load-carrying...

    Full text available to download

  • Spin and Orbital Effects on Asymmetric Exchange Interaction in Polar Magnets: M(IO3)2 (M = Cu and Mn)

    Publication

    - INORGANIC CHEMISTRY - Year 2021

    Magnetic polar materials feature an astonishing range of physical properties, such as magnetoelectric coupling, chiral spin textures, and related new spin topology physics. This is primarily attributable to their lack of space inversion symmetry in conjunction with unpaired electrons, potentially facilitating an asymmetric Dzyaloshinskii–Moriya (DM) exchange interaction supported by spin–orbital and electron–lattice coupling. However,...

    Full text to download in external service

  • Kinetics of Cross-Linking Reaction of Epoxy Resin with Hydroxyapatite-Functionalized Layered Double Hydroxides

    Publication
    • Z. Karami
    • M. Ganjali
    • M. Zarghamidehaghani
    • M. Aghazadeh
    • M. Jouyandeh
    • A. Esmaeili
    • S. Habibzadeh
    • A. Mohaddespour
    • .. Inamuddin
    • K. Formela... and 2 others

    - Polymers - Year 2020

    The cure kinetics analysis of thermoset polymer composites gives useful information about their properties. In this work, two types of layered double hydroxide (LDH) consisting of Mg2+ and Zn2+ as divalent metal ions and CO32− as an anion intercalating agent were synthesized and functionalized with hydroxyapatite (HA) to make a potential thermal resistant nanocomposite. The curing potential of the synthesized nanoplatelets in the...

    Full text available to download

  • Analiza holenderskich doświadczeń w zakresie logistyki miejskiej

    Publication

    - Logistyka - Year 2014

    W artykule dokonano analizy holenderskich doświadczeń w zakresie logistyki miejskiej i organizacji systemu dostaw towarów na przykładzie Utrechtu. Wybór miasta podyktowany był ponad 20 letnim konsekwentnym zaangażowaniem i doświadczeniem w tej dziedzinie. Przedstawiono zmiany w podejściu do problemów miejskiego transportu ładunków z punktu widzenia polityki krajowej oraz przebieg procesu decentralizacji odpowiedzialności na poziom...

    Full text available to download

  • Properties and Formation of Mineralized Veins in an Organic-Rich Shale Formation

    Publication

    - Year 2017

    An earlier paper defined mineral and organic matter constituents in weak interfaces in shale formations (Ptaszynska, et. al., 2016). The formation studied in the earlier work and here is the Jurassic, early-Cretaceous Vaca Muerta formation in the Neuquen basin in Argentina. In this earlier work, mineralized "veins" were noted to be prevalent and complicated, sometimes being shear weak interfaces while in other cases they were not....

    Full text to download in external service