Filters
total: 2933
filtered: 1894
displaying 1000 best results Help
Search results for: call set-up delay
-
Benchmarking overlapping communication and computations with multiple streams for modern GPUs
PublicationThe paper presents benchmarking a multi-stream application processing a set of input data arrays. Tests have been performed and execution times measured for various numbers of streams and various compute intensities measured as the ratio of kernel compute time and data transfer time. As such, the application and benchmarking is representative of frequently used operations such as vector weighted sum, matrix multiplication etc....
-
REVIEW ON COMPETITION АОB AND NОВ AS AN IMPORTANT ELEMENT FOR COST EFFECTIVE METHODS OF REMOVING NITROGEN FROM WASTEWATER
PublicationThe aim of this paper is analysis of process principles and possible factors used to induce inhibition of nitrite oxidation by NOB (Nitrite Oxidizing Bacteria) which could be obtained during not very well understood processes: so called “shortcut” or “partial” nitrification as well deammonification, by qualitative/quantitative studies of AOB (Ammonium Oxidizing Bacteria) and NOB populations in activated...
-
Experimental research of the stability of steel cylindricalshell subjected to circumferential compression
PublicationAt the Department of Metal Structures Gdańsk University of Technology, experiments have been performed on the stability of shell of steel cylindrical models. The experiments have been carried on a test bench built at the Department. The design based on other test benches which were created in the past by other scientists, where modernized by the courtesy of companies that offer modern solutions. The test bench enables to generate...
-
Hard lessons learned: delivering usability in IT projects
PublicationEffective project management requires the development of a realistic plan which aims to ensure the success of the project and ultimately deliver a high quality product to customers. However, experience shows that the majority of software vendors managing projects suffer from numerous problems to provide usability in IT solutions and complete a project in a given time with success. In this paper we discuss, analyze and synthesize...
-
Simulation of the remanence influence on the transient states in a single-phase multiwinding transformer
PublicationThis paper presents the mathematical model of a single-phase multi-winding core type transformer taking into account magnetic hysteresis phenomenon based on the feedback Preisach model (FPM). The set of loop differential equations was developed for a K-th winding transformer model where the flux linkages of each winding includes flux Φ common to all windings as a function of magneto motive force Θ of all windings. The first purpose...
-
Poultry meat freshness evaluation using electronic nose technology and ultra-fast gas chromatography
PublicationTo ensure that chicken meat products are safe to consume, it is important to be able to reliably determine its shelf-life. To assess the applicability of ultra-fast gas chromatography and electronic nose technology in evaluation of poultry, an analysis of the headspace of ground chicken meat samples refrigerated over a period of 7 days was performed. Chemometric techniques were used to mine additional information from a multiparametric...
-
Entropy Measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublicationWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (Fuzzy En) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Video Analytics-Based Algorithm for Monitoring Egress from Buildings
PublicationA concept and practical implementation of the algorithm for detecting of potentially dangerous situations of crowding in passages is presented. An example of such situation is a crush which may be caused by obstructed pedestrian pathway. Surveillance video camera signal analysis performed on line is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of implemented algorithm which uses...
-
Multiacces quantum communication and product higher rank numerical range
PublicationIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Gaining knowledge through experience: developing decisional DNA applications in robotics
PublicationOmówiono nowatorskie podejscie do zastosowania wiedzy opartej na doświadczeniu i budowie decyzyjnego DNA w obszarach związanych z robotyką.In this article, we explore an approach that integrates Decisional DNA, a domain-independent, flexible, and standard knowledge representation structure, with robots in order to test the usability and suitability of this novel knowledge representation structure. Core issues in using this Decisional...
-
Wearable system supporting navigation of the blind
PublicationImproving blind people comfort of life is a problem ofgreat importance. Fortunately, new technolgies provide us withadditional methods to improve everyday life of the blind and visuallyimpaired. The paper presents experimental system made byresearchers from Department of Geoinformatics of Gdansk Universityof Technology, which is capable of finding the route from theindicated source to chosen destination, using dedicated digital...
-
Evaluation of sound event detection, classification and localization in the presence of background noise for acoustic surveillance of hazardous situations
PublicationAn evaluation of the sound event detection, classification and localization of hazardous acoustic events in the presence of background noise of different types and changing intensities is presented. The methods for separating foreground events from the acoustic background are introduced. The classifier, based on a Support Vector Machine algorithm, is described. The set of features and samples used for the training of the classifier...
-
Interactions with recognized objects
PublicationImplicit interaction combined with object recognition techniques opens a new possibility for gathering data and analyzing user behavior for activity and context recognition. The electronic eyewear platform, eGlasses, is being developed, as an integrated and autonomous system to provide interactions with smart environment. In this paper we present a method for the interactions with the recognized objects that can be used for electronic...
-
Zastosowanie metod analizy wielowymiarowej w rozpoznawaniu komórek nowotworowych
PublicationArtykuł przedstawia sposób zastosowania metody k-średnich (k-means) do analizy danych o komórkach nowotworu piersi pochodzących z Breast Cancer Wisconsin Data Set, pobranych podczas biopsji cienkoigłowej. Celem analizy jest sprawdzenie, czy na podstawie parametrów geometrycznych pobranych komórek istnieje możliwość automatycznego podziału pacjentek na grupy o podobnym ryzyku wystąpienia nowotworu złośliwego. Zastosowanie metody...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
SOCIAL ENTREPRENEURS – WHAT MAKES THEM DIFFERENT FROM BUSINESS UNDERTAKERS
PublicationSocial entrepreneurs, very often operate with highly limited resources, not to say with virtually nothing. They possess motivation, but apart from financial or technical resources very often they also need complex set of skills, especially those connected with leadership. Social entrepreneurship is similar to business entrepreneurship in many way, however there are some differences. Both similarities and differences can be find...
-
Parameters optimization in medicine supporting image recognition algorithms
PublicationIn this paper, a procedure of automatic set up of image recognition algorithms' parameters is proposed, for the purpose of reducing the time needed for algorithms' development. The procedure is presented on two medicine supporting algorithms, performing bleeding detection in endoscopic images. Since the algorithms contain multiple parameters which must be specified, empirical testing is usually required to optimise the algorithm's...
-
Comparison of Evaluation of Air Odour Quality in Vicinity of Petroleum Plant Using a Prototype of Electronic Nose Instrument and Fast GC Technique
PublicationThe paper presents the results of investigation on classification of the ambient air samples collected in a vicinity of the LOTOS Group S.A. petroleum plant with respect to odour. The investigations were carried out with an electronic nose prototype and a commercial electronic nose of Fast GC-type – HERACLES II. The prototype was equipped with a set of six semiconductor sensors by FIGARO Co. and a photoionization sensor of PID-type....
-
Entropy measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublicationWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (FuzzyEn) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Customized crossover in evolutionary sets of safe ship trajectories
PublicationThe paper presents selected aspects of evolutionary sets of safe ship trajectories-a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships, the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned within...
-
Robust identification of quadrocopter model for control purposes
PublicationThe paper addresses a problem of quadrotor unmanned aerial vehicle (so-called X4-flyer or quadrocopter) utility model identification for control design purposes. To that goal the quadrotor model is assumed to be composed of two abstracted subsystems, namely a rigid body (plant) and four motors equipped with blades (actuators). The model of the former is acquired based on a well-established dynamic equations of motion while the...
-
Ocena wpływu przejazdu pojazdów ponadnormatywnych na konstrukcje nawierzchni drogowych. Drogi krajowe i wojewódzkie klas technicznych A, S, GP, G
PublicationZagadnienie dotyczy dopuszczenia przejazdu po drogach publicznych zestawu specjalistycznego Girder Set AL 500, który służy do transportu ponadnormatywnego ładunku. Zestaw pojazdów składa się z naczepy AL 500 o maksymalnej masie całkowitej (wraz z ładunkiem) 715 ton oraz dwóch ciągników balastowych Trojan o masie 48 ton każdy. Zestaw pojazdów o tak dużej masie całkowitej będzie wywierać zdecydowanie większe oddziaływanie na konstrukcję...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
EFFICIENT LINE DETECTION METHOD BASED ON 2D CONVOLUTION FILTER
PublicationThe article proposes an efficient line detection method using a 2D convolution filter. The proposed method was compared with the Hough transform, the most popular method of straight lines detection. The developed method is suitable for local detection of straight lines with a slope from -45˚ to 45˚. Also, it can be used for curve detection which shape is approximated with the short straight sections. The new method is characterized...
-
Wpływ automatycznej kalibracji wizyjnego systemu pozycjonowania na dokładność lokalizacji elementu roboczego
PublicationW artykule przedstawiono strukturę i działanie automatycznego wizyjnego systemu pozycjonowania (PVS), który został zainstalowany na maszynie waterjet (WJ). Ponadto przeprowadzono analizę wpływu kalibracji na działanie PVS. Podstawę systemu stanowią dwie kamery internetowe zamontowane na przemysłowej maszynie WJ. W połączeniu z algorytmem identyfikacji, system przeznaczony jest do pozycjonowania WJ z dużą dokładnością. W tym celu...
-
Redukcja czasu analizy MZP przez ograniczenie rozmiaru rozwiązania
PublicationAnaliza drzew niezdatności jest uznaną metodą analizy bezpieczeństwa systemów. Notacja ECSDM pozwala definiować zależności czasowe między zdarzeniami drzewa oraz przeanalizować je w celu określenia zależności pomiędzy zdarzeniami z Minimalnych Zbiorów Przyczyn (MZP). Dzięki wprowadzeniu klasyfikacji zdarzeń z MZP można wyodrębnić zależności czasowe istotne dla zapobiegania wywoływania hazardu przez konkretny MZP. Pozostałe zależności...
-
TECHNIKI CAD W INŻYNIERII ELEKTRYCZNEJ - WYBRANE ZAGADNIENIA
PublicationW pracy przedstawiono różne techniki CAD (ang. Computer Aided Design) wykorzystywane w inżynierii elektrycznej dla potrzeb komputerowego modelowania 3D przetworników elektromechanicznych. Wirtualne modele 3D różnych urządzeń są użyteczne nie tylko przy opracowywaniu dokumentacji technicznej ale są także wykorzystywane w obliczeniach inżynierskich:...
-
Algorytmy wykrywania krawędzi w obrazie
PublicationWykrywanie krawędzi jest pierwszym etapem w cyfrowym przetwarzaniu obrazów. Operacja ta polega na usunięciu informacji takich jak kolor czy też jasność, a pozostawieniu jedynie krawędzi. Efektem tej operacji jest znaczna redukcja ilości danych do dalszej analizy. Pozwala to na zastosowanie w następnych etapach bardziej złożonych algorytmów rozpoznawania obiektów na podstawie kształtu. W artykule zaprezentowano zastosowanie algorytmów...
-
Fuzzy Multi-Regional Fractional PID controller for Pressurized Water nuclear Reactor
PublicationThe paper presents the methodology for the synthesis of a Fuzzy Multi-Regional Fractional Order PID controller (FMR-FOPID) used to control the average thermal power of a PWR nuclear reactor in the load following mode. The controller utilizes a set of FOPID controllers and the fuzzy logic Takagi-Sugeno reasoning system. The proposed methodology is based on two optimization parts. The first part is devoted to finding the optimal...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Analysis of 2D Feature Spaces for Deep Learning-based Speech Recognition
Publicationconvolutional neural network (CNN) which is a class of deep, feed-forward artificial neural network. We decided to analyze audio signal feature maps, namely spectrograms, linear and Mel-scale cepstrograms, and chromagrams. The choice was made upon the fact that CNN performs well in 2D data-oriented processing contexts. Feature maps were employed in the Lithuanian word recognition task. The spectral analysis led to the highest word...
-
MULTI-CRITERIA COMPARATIVE ANALYSIS OF THE USE OF SUBTRACTIVE AND ADDITIVE TECHNOLOGIES IN THE MANUFACTURING OF OFFSHORE MACHINERY COMPONENTS
PublicationThe dynamic development of additive manufacturing technologies, especially over the last few years, has increased the range of possible industrial applications of 3D printed elements. This is a consequence of the distinct advantages of additive techniques, which include the possibility of improving the mechanical strength of products and shortening lead times. Offshore industry is one of these promising areas for the application...
-
Improving Objective Speech Quality Indicators in Noise Conditions
PublicationThis work aims at modifying speech signal samples and test them with objective speech quality indicators after mixing the original signals with noise or with an interfering signal. Modifications that are applied to the signal are related to the Lombard speech characteristics, i.e., pitch shifting, utterance duration changes, vocal tract scaling, manipulation of formants. A set of words and sentences in Polish, recorded in silence,...
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublicationVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
An application of acoustic sensors for the monitoring of road traffic
PublicationAssessment of road traffic parameters for the developed intelligent speed limit setting decision system constitutes the subject addressed in the paper. Current traffic conditions providing vital data source for the calculation of the locally fitted speed limits are assessed employing an economical embedded platform placed at the roadside. The use of the developed platform employing a low-powered processing unit with a set of microphones,...
-
Hybrid Processing by Turning and Burnishing of Machine Components
PublicationThe paper presents a method of hybrid manufacturing process of long 5 shafts and deep holes by simultaneous turning and burnishing method. The tech- 6 nological results of the research focus on the influence of the basic technological 7 parameters of this process on the surface roughness of piston rods of hydraulic 8 cylinders. Research results are presented in the graphs as well as mathematical 9 formula. Set of samples were made...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublicationIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
Gdańsk: a City of Solidarity and Freedom
PublicationOnly a few cities can claim that they have changed Europe and indeed the World. Gdańsk is privileged to be one of them. It is not a “caprice of history” that the Solidarity movement which, in the end, got the iron curtain torn, was born in this particular place. It is a logical consequence of ten centuries of the collective wisdom of the people that built Gdańsk and the region of Pomerania. The tragic assassination of the Mayor...
-
Examining Feature Vector for Phoneme Recognition
PublicationThe aim of this paper is to analyze usability of descriptors coming from music information retrieval to the phoneme analysis. The case study presented consists in several steps. First, a short overview of parameters utilized in speech analysis is given. Then, a set of time and frequency domain-based parameters is selected and discussed in the context of stop consonant acoustical characteristics. A toolbox created for this purpose...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
A ROLE PLAYING GAME NAME GENERATOR LEARNING ITS CREATIVITY FROM ARKADIA MUD PLAYERS
PublicationThe paper proposes an approach to creative generation of new names for the purposes of Role Playing Games in fantasy realms. The generator based on an existing database of na mes is able to propose a set of new names with regard to demanded attributes, such as: length of the name, sex and race of the character, a given p hrase as the origin for the generated name as well as subjective evaluations from former users. The software...
-
Rigid finite elements and multibody modelling used in estimation and reduction of rod vibrations
PublicationIn the paper, a mechanical set composed of a robot (manipulator) and of an elastic beam is considered. The beam is fixed to the top of the robot structure. In most of the similar cases, undesired vibrations can be excited in the beam. They are especially significant, when dynamics in the robot braking period is examined. In the paper, estimation and modification of length of the braking period is proposed, in order to reduce the...
-
Ontologies vs. Rules — Comparison of Methods of Knowledge Representation Based on the Example of IT Services Management
PublicationThis text provides a brief overview of selected structures aimed at knowledge representation in the form of ontologies based on description logic and aims at comparing them with their counterparts based on the rule-based approach. Due to the limitations on the length of the article, only elements associated with the representation of concepts could be shown, without including roles. The formalisms of the OWL language were used...
-
Directed electromagnetic pulse dynamics: projecting operators method
PublicationIn this article, we consider a one-dimensional model of electromagnetic pulse propagation in isotropic media, takinginto account a nonlinearity of the third order. We introduce a method for Maxwell's equation transformation on thebasis of a complete set of projecting operators. The operators correspond to wave dispersion branches including thedirection of propagation. As the simplest result of applying the method, we derive a system...
-
Model of Rules for IT Organization Evolution
PublicationThe aim of this paper is to introduce the Model of Rules for IT Organization Evolution which shall be in compliance with the Generic IT Organization Evolution Model. Due to its general nature, a set of practical adjustments is proposed in order to adapt the Generic Model to the IT Service Management domain. Further, two sets of rules describing the evolution of the IT Service Management area are defined based on two types of rules...
-
Quantum mechanical which-way experiment with an internal degree of freedom
PublicationFor a particle travelling through an interferometer, the trade-off between the available which-way information and the interference visibility provides a lucid manifestation of the quantum mechanical wave-particle duality. Here we analyse this relation for a particle possessing an internal degree of freedom such as spin. We quantify the trade-off with a general inequality that paints an unexpectedly intricate picture of wave-particle...
-
Determination of authenticity of brand perfume using electronic nose prototypes
PublicationThe paper presents practical application of an electronic nose technique for fast and efficient discrimination between authentic and fake perfume samples. Two self-built electronic nose prototypes equipped with a set of semiconductor sensors were employed for that purpose. Additionally 10 volunteers took part in sensory analysis. The following perfumes and their fake counterparts were analysed: Dior – Fahrenheit, Eisenberg – J’ose,...
-
Fast Multi-Objective Antenna Optimization Using Sequential Patching and Variable-Fidelity EM Models
PublicationIn this work, a technique for fast multi-objective design optimization of antenna structures is presented. In our approach, the initial approximation of the Pareto set representing the best possible trade-offs between conflicting design objectives is obtained by means of sequential patching of the design space. The latter is a stencil-based search that aims at creating a path that connects the extreme Pareto-optimal designs (obtained...
-
Viewpoint independent shape-based object classification for video surveillance
PublicationA method for shape based object classification is presented.Unlike object dimension based methods it does not require any system calibration techniques. A number of 3D object models are utilized as a source of training dataset for a specified camera orientation. Usage of the 3D models allows to perform the dataset creation process semiautomatically. The background subtraction method is used for the purpose of detecting moving objects...
-
Analysis of Measurement Errors in Rail Vehicles’ Pantograph Inspection System
PublicationThe paper presents an approach to evaluation of height measurement errors in laser scanning inspection system. The system, consisting of a laser line generator and a specialized camera, is dedicated to diagnosing carbon contact strips of railway vehicles’ pantographs. While height measurement resolution is easily computable based on system parameters, determining the measurement error is troublesome due to numerous impacts. As...