Filters
total: 323
filtered: 277
Search results for: PROBABILITY
-
Systems, environments, and soliton rate equations: A non-Kolmogorovian framework for population dynamics
PublicationSoliton rate equations are based on non-Kolmogorovian models of probability and naturally include autocatalytic processes. The formalism is not widely known but has great unexplored potential for applications to systems interacting with environments. Beginning with links of contextuality to non- Kolmogorovity we introduce the general formalism of soliton rate equations and work out explicit examples of subsystems interacting with...
-
Modelling of Objects Behaviour for Their Re-identification in Multi-camera Surveillance System Employing Particle Filters and Flow Graphs
PublicationAn extension of the re-identification method of modeling objects behavior in muti-camera surveillance systems, related to adding a particle filter to the decision-making algorithm is covered by the paper. A variety of tracking methods related to a single FOV (Field of Vision) are known, proven to be quite different for inter-camera tracking, especially in case of non-overlapping FOVs. The re-identification methods refer to the...
-
Wzory kreatywności. Koncepcja modelu prawdopodobieństwa działania kreatywnego jako narzędzie badania procesu twórczego w środowisku miejskim
PublicationWspółczesne koncepcje kształtowania miast, takie jak zrównoważony rozwój, miasto odporne, inteligentne miasto, miasto kreatywne, tworzą obecnie ramy urbanistyki o charakterze jednej uogólnionej idei kształtującej środowisko społeczno-materialne. Kontekstualne ujęcie badań kreatywności opisuje zależności między środowiskiem miejskim a twórczością w mieście kreatywnym. Ujęcie procesualne kreatywności stanowi hic et nunc urbanizmu,...
-
Reliability Analysis of Sea Cliff Slope Stability by Point Estimate Method
PublicationThe paper presents a reliability analysis of a sea cliff slope. The cliff, located in Jastrzębia Góra, is characterised by a complicated geological structure. Although currently stable, it is in fact close to the limit state. The objective of this paper is to present the point estimate method (PEM) of determining the mean value and standard deviation of the safety factor of the slope. Assuming its normal distribution, these statistical...
-
Risk Analysis by a Probabilistic Model of the Measurement Process
PublicationThe aim of the article is presentation of the testing methodology and results of examination the probabilistic model of the measurement process. The case study concerns the determination of the risk of an incorrect decision in the assessment of the compliance of products by measurement. Measurand is characterized by the generalized Rayleigh distribution. The model of the meas-urement process was tested in parallel mode by six risk...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Reliability Analysis of Sea Cliff Slope Stability by Point Estimate Method
PublicationThe paper presents a reliability analysis of a sea cliff slope. The cliff, located in Jastrzębia Góra, is characterised by a complicated geological structure. Although currently stable, it is in fact close to the limit state. The objective of this paper is to present the point estimate method (PEM) of determining the mean value and standard deviation of the safety factor of the slope. Assuming its normal distribution, these statistical...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublicationNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Effect of the integration into Global Value Chains on the employment contract in Central and Eastern European countries
PublicationResearch background: In the era of globalization, there is a need to address decent work deficits in Global Value Chains (GVCs). The forms of working conditions reveal a broad dispersion of contents. The literature review exposes hardly any Europe-focused research assessing the socioeconomic impact of global production links and going beyond their pure economic effects assessed in terms of employment, productivity or wages. Purpose...
-
Asymmetric Renyi Problem and > PATRICIA Tries
PublicationIn 1960 R´enyi asked for the number of random queries necessary to recover a hidden bijective labeling of n distinct objects. In each query one selects a random subset of labels and asks, what is the set of objects that have theselabels? Weconsider here anasymmetric version of the problem in which in every query an object is chosenwith probability p > 1/2 and we ignore “inconclusive” queries. We study the number of queries needed...
-
Human Factors and Functional Safety Analysis in Designing the Control Rooms of Industrial Hazardous Plants
PublicationIn this work some aspects of human factors and functional safety analysis in designing the control rooms of industrial hazardous plants are presented. The “defence in depth” (D-in-D) concept is outlined. Some designing issues of the alarm system (AS) with regard to human factors to be supported using the human reliability analysis (HRA) are discussed. The AS and decision support system (DSS), when properly designed, would contribute...
-
A Method of Object Re-identiciation Applicable to Multicamera Surveillance Systems
PublicationThe paper addresses some challenges pertaining to the methods for tracking of objects in multi-camera systems. The tracking methods related to a single Field of Vision (FOV) are quite different from inter-camera tracking, especially in case of non-overlapping FOVs. In this case, the processing is directed to determine the probability of a particular object’s identity seen in a pair of cameras in the presence of places non-observed...
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublicationAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...
-
The Conception of Decision-Making Support System for ComplexEnergetic System on Example of Ship Propulsion System
PublicationIn paper, the conception of decision-making support system for complex energetic system on example of ship propulsion system has been presented. Diversity of conditions, information overload and very often contradiction of decision-making criteria and time constraints result in difficulties in making right (rational) decision without using more or less expanded information processing systems (eg. database systems, expert systems,...
-
Providing Differentiated Levels of Service Availability in VANET Communications
PublicationInter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...
-
The hat problem on a union of disjoint graphs
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. In this version every player...
-
On the hat problem, its variations, and their applications
PublicationThe topic of our paper is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of a win. There are known many...
-
Viewpoint independent shape-based object classification for video surveillance
PublicationA method for shape based object classification is presented.Unlike object dimension based methods it does not require any system calibration techniques. A number of 3D object models are utilized as a source of training dataset for a specified camera orientation. Usage of the 3D models allows to perform the dataset creation process semiautomatically. The background subtraction method is used for the purpose of detecting moving objects...
-
Hat problem on the cycle C4
PublicationThe topic of our paper is the hat problem. In that problem, each of n people is randomly tted with a blue or red hat. Then everybody can try to guess simultanously his own hat color looking at the hat colors of the other people. The team wins if at least one person guesses his hat color correctly and no one guesses his hat color wrong, otherwise the team loses. The aim is to maximize the probability of win. In this version every...
-
Modeling and analysis of the effectiveness of the guard systemswith dynamic graphs
PublicationIn the following paper it will be presented a new model for analysis (in polynomial time) of the effectiveness of the guard systems. Therewill be presented its practical applications in problems such as searching for the weakest points of the system, planning guards' paths or cameras deployment, switching image from multiple cameras on several monitors, or interception of the intruder. This model is based on describing the guarded...
-
Examining Ownership Equity as a Psychological Factor on Tourism Business Failure Forecasting
PublicationThis paper examines ownership equity as a predictor of future business failure within the tourism and hospitality sectors. The main goals of this study were to examine which ratios are the most important for a tourism business failure forecasting model and how significant is the “total percentage of equity ownership by company directors” ratio compared with other ratios associated with the probability of bankruptcy. A stepwise...
-
Building Project and Project Team Characteristics For Creating Hybrid Management Processes
PublicationThis paper introduces a method of building the characteristic of Software Development Project. Project characteristic is determined on the basis of several factors such as the complexity of Software Development Project and Project Team, results of historical projects and information on processes and methodologies, which are implemented in analyzed organizations. Information on project complexity can be applied to many different...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublicationThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Design centering of compact microwave components using response features and trust regions
PublicationFabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...
-
Deep learning for recommending subscription-limited documents
PublicationDocuments recommendation for a commercial, subscription-based online platform is important due to the difficulty in navigation through a large volume and diversity of content available to clients. However, this is also a challenging task due to the number of new documents added every day and decreasing relevance of older contents. To solve this problem, we propose deep neural network architecture that combines autoencoder with...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
A more colorful hat problem
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. We consider a generalized hat...
-
The hat problem on cycles on at least nine vertices
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. In this version every player...
-
Reliability model of slide bearings with particular attention given to lubricating oil
PublicationThe paper presents the slide bearing with circulating lubrication as a system of series three-element structure, where lubricating oil is the weakest link. In accordance with the Pierce statement that ''strength of chain is the strength of its weakest link'', a bearing reliability model has been developed. It allows to use the lubricating oil to evaluate the probability of correct working of the whole slide bearing, i.e. the reliability....
-
Earthquake-induced pounding between superstructure segments of isolated bridge
PublicationThe use of seismic isolation in bridges is considered as one of the most promising advanced technologies to enhance the structural safety during earthquakes. However, the method results in larger displacements of superstructure segments increasing the probability of pounding between them. Reports after severe ground motions show that the earthquake-induced structural pounding may lead to significant damage in isolated bridges....
-
Product Graph Invariants with Applications in the Theory of Information
PublicationThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
FPGA-Based System for Electromagnetic Interference Evaluation in Random Modulated DC/DC Converters
PublicationField-Programmable Gate Array (FPGA) provides the possibility to design new “electromagnetic compatibility (EMC) friendly” control techniques for power electronic converters. Such control techniques use pseudo-random modulators (RanM) to control the converter switches. However, some issues connected with the FPGA-based design of RanM, such as matching the range of fixed-point numbers, might be challenging. The modern programming...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Development of tools for road infrastructure safety management for the provinces (voivodeships) in Poland
PublicationThe development of modern tools for road infrastructure safety management will help to reduce the number of fatalities and serious injuries as one of the main objectives adopted in 2013 in the National Road Safety Programme 2014-2020 and the new Road Safety Programme 2011-2020 in the EU. Risk Management in Highway Engineering can be applied in developing tools essential in the process of safety management. Risk Management in Highway...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
A Framework for Searching in Graphs in the Presence of Errors
PublicationWe consider a problem of searching for an unknown target vertex t in a (possibly edge-weighted) graph. Each vertex-query points to a vertex v and the response either admits that v is the target or provides any neighbor s of v that lies on a shortest path from v to t. This model has been introduced for trees by Onak and Parys [FOCS 2006] and for general graphs by Emamjomeh-Zadeh et al. [STOC 2016]. In the latter, the authors provide...
-
Analiza niezawodności człowieka-operatora w kontekście bezpieczeństwa funkcjonalnego.
PublicationArtykuł przedstawia niektóre kwestie analizy warstwowego systemu zabezpieczeń instalacji podwyższonego ryzyka z uwzględnieniem analizy niezawodności człowieka HRA (human reliability analysis). Działania człowieka operatora w odniesieniu do systemu operatorskiego HSI (human system interface), w tym systemu alarmowego i potencjalnych błędów człowieka mogą mieć istotny wpływ na wyniki analiz probabilistycznych w procesie weryfikacji...
-
AN ALGORITHM FOR PORTAL HYPERTENSIVE GASTROPATHY RECOGNITION ON THE ENDOSCOPIC RECORDINGS
PublicationSymptoms recognition of portal hypertensive gastropathy (PHG) can be done by analysing endoscopic recordings, but manual analysis done by physician may take a long time. This increases probability of missing some symptoms and automated methods may be applied to prevent that. In this paper a novel hybrid algorithm for recognition of early stage of portal hypertensive gastropathy is proposed. First image preprocessing is described....
-
Możliwość oszacowania niezawodności silników o zapłonie samoczynnym z zastosowaniem teorii procesów semi-Markowa oraz podejmowania decyzji eksploatacyjnych z uwzględnieniem wiarygodności diagnozy o stanie technicznym tego rodzaju silników spalinowych = Possibility of estimating the reliability of diesel engines by applying the theory of semi-Markov processes and making operational decisions by considering reliability of diagnosis on technical state of this sort of combustion engines/
PublicationThe paper presents semi-Markov models of technical state transitions for diesel engines, useful for determining reliability of the engines. A possibility of application of a three-state model with a simplified matrix function, or even a two-state model, to determine reliability of the engines, has been described herein on examples of known from literature semi-Markov models, for the case when appropriate diagnosing systems (SDG)...
-
Effects of subfilter velocity modelling on dispersed phase in LES of heated channel flow
PublicationA non-isothermal turbulent flow with the dispersed phase is modelled using the Large Eddy Simulation (LES) approach for fluid, one-way coupled with the equations of point-particle evolution. The channel is heated at both walls and isoflux boundary conditions are applied for fluid. Particle velocity and thermal statistics are computed. Of particular interest are the r.m.s. profiles and the probability density function of particle...
-
A non-adiabatic wavepacket dynamical study of the low energy chargetransfer process in the S3+ + H collision
PublicationThe collisional system S3+ + H?S2+ + H+ has been studied using a time-dependent wavepacket methodologyin two-dimensions. Using available potential energy surfaces and coupling matrix elementsobtained from multireference ab initio calculations, five non-adiabatically coupled electronic states of1P symmetry have been included in the dynamical simulations. The collision has been studied in thelow energy regime of 1-10 eV. The wavepacket...
-
The point estimate method in a reticulated shell reliability analysis
PublicationThe objective of this paper is to present an application of the point estimate method (PEM) that can determine the probabilistic moments for engineering structures. The method is reasonably robust and adequately accurate for a wide range of practical problems. It is a special case of numerical quadrature based on orthogonal polynomials. The main advantage of this method is that, unlike FORM or SORM, it is not necessary to carry...
-
Airfoil Design Under Uncertainty Using Non-Intrusive Polynomial Chaos Theory and Utility Functions
PublicationFast and accurate airfoil design under uncertainty using non-intrusive polynomial chaos (NIPC) expansions and utility functions is proposed. The NIPC expansions provide a means to efficiently and accurately compute statistical information for a given set of input variables with associated probability distribution. Utility functions provide a way to rigorously formulate the design problem. In this work, these two methods are integrated...
-
Toward Human Chromosome Knowledge Engine
PublicationHuman chromosomes carry genetic information about our life. Chromosome classification is crucial for karyotype analysis. Existing chromosome classification methods do not take into account reasoning, such as: analyzing the relationship between variables, modeling uncertainty, and performing causal reasoning. In this paper, we introduce a knowledge engine for reasoning-based human chromosome classification that stores knowledge...
-
Investor confidence and high financial literacy jointly shape investments in risky assets
PublicationHouseholds consistently invest less in equities and bonds than predicted by economic theory. We explain this from a behavioral economics perspective and distributional analysis using rich US survey microdata. We find that higher investor self-confidence in her financial abilities and financial literacy jointly increase the probability of investing in equities. Conditional on participation, confidence in the macroeconomy additionally...
-
Application of Bayesian Networks in risk diagnostics arising from the degree of urban regeneration area degradation
PublicationUrban regeneration as a complex project, generates many extremely specific threats affecting the increase of investment risk. Its unique nature causes that probability parameter, normally applied in the process of risk quantification, is extremely difficult to estimate. Due to lack of historical data urban regeneration related activities are therefore associated with uncertainty. According to the authors, a useful tool for resolving...
-
Application of BN in Risk Diagnostics Arising from the Degree of Urban Regeneration Area Degradation
PublicationUrban regeneration as a complex project, generates many extremely specific threats affecting the increase of investment risk. Its unique nature causes that probability parameter, normally applied in the process of risk quantification, is extremely difficult to estimate. Due to lack of historical data urban regeneration related activities are therefore associated with uncertainty. According to the authors, a useful tool for resolving...
-
Predicting the impact of traffic–induced vibrations on buildings using artificial neural networks
PublicationTraffic–induced vibrations may constitute a considerable load to a building, cause cracking of plaster, cracks in load–bearing elements or even a global structural collapse of the whole structure [1-4]. Vibrations measurements of real structures are costly and laborious, not justified in all cases. The aim of the paper is to create an original algorithm, to predict the negative dynamic impact on the examined residential building...
-
Probabilistic Methods in Reliability Assessment of Engineering Lightweight Structures
PublicationThe paper considers the probability-based analysis of structural safety measures. Two different numerical examples of representative lightweight structures are considered – a submerged truss tower supporting an offshore platform, and an overhead power line support truss tower. On the basis of these examples, the importance of a motivated selection of analysis method and a proper choice of the number of important variables is shown....
-
Convex set of quantum states with positive partial transpose analysed by hit and run algorithm
PublicationThe convex set of quantum states of a composite K×K system with positive partial transpose is analysed. A version of the hit and run algorithm is used to generate a sequence of random points covering this set uniformly and an estimation for the convergence speed of the algorithm is derived. For K >3 or K=3 this algorithm works faster than sampling over the entire set of states and verifying whether the partial transpose is positive....