Filters
total: 245
filtered: 233
Search results for: LEARNING-BY-DOING METHOD
-
Transformational leadership for researcher’s innovativeness in the context of tacit knowledge and change adaptability
PublicationThis study explores how a learning culture supported by transformational leadership influences tacit knowledge sharing and change adaptability in higher education and how these relations impact this sector’s internal and external innovativeness. The empirical model was tested on a sample of 368 Polish scientific staff using the structural equation modeling (SEM) method. Then results were expanded by applying OLS regression using...
-
Toward Intelligent Recommendations Using the Neural Knowledge DNA
PublicationIn this paper we propose a novel recommendation approach using past news click data and the Neural Knowledge DNA (NK-DNA). The Neural Knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for news recommendation tasks on the MIND benchmark dataset. By taking advantages of NK-DNA, deep...
-
Hybrid Laboratory of Radio Communication With Online Simulators and Remote Access
PublicationContribution: Two toolsets for the remote teaching of radio communication laboratory classes: 1) online simulators for individual work of students and 2) a remote access system to laboratory workstations for group work. Initial assumptions and method of implementation of both tools are presented. Background: The COVID-19 pandemic has forced a change in teaching at all levels of education. The specificity of practical classes, such...
-
Comparative Analysis of Text Representation Methods Using Classification
PublicationIn our work, we review and empirically evaluate five different raw methods of text representation that allow automatic processing of Wikipedia articles. The main contribution of the article—evaluation of approaches to text representation for machine learning tasks—indicates that the text representation is fundamental for achieving good categorization results. The analysis of the representation methods creates a baseline that cannot...
-
Switched-capacitor DC-DC converters in arbitrary switching mode - topologically derived resistive models based on incremental graph approach.
PublicationIn the preceding paper we reviewed some of modeling approaches aimed at systematic formulation and solution of switched capacitor DC-DC converters. In our review, special attention was paid to computationally efficient and mathematically elegant methods. In so doing we had tried to demonstrate the virtues of unified Incremental Graph (IG) approach. Incremental Graph is, in concept, a tool originally created for analysis and synthesis...
-
Context of Digitalized Employment for Older Adults with Autism Spectrum Disorder in the New Normal
PublicationEmployers are actively considering how to normalize remote work technology across different industries. The residual risk of coronavirus disease-19 (COVID-19) will necessarily lower the bar for allowing some workers to stay remote on a more permanent basis. This is based on the realization that many essential jobs can be teleworked while retaining or enhancing productivity. The decisions employers make regarding future work arrangements...
-
Optical glyphs based localization and identification system
PublicationThe paper presents a description of functioning of a platform supporting the detection of obstructive diseases in the respiratory system education process. A 16-parameter model of the respiratory system simulated in the MATLAB/Simulink environment was set in the role of the tested patient. It has been linked to the control layer, developed in the LabVIEW environment, using the SIT library (Simulation Interface Toolkit). This layer...
-
An application supporting the educational process of the respiratory system obstructive diseases detection
PublicationThe paper presents a description of functioning of a platform supporting the detection of obstructive diseases in the respiratory system education process. A 16-parameter model of the respiratory system simulated in the MATLAB/Simulink environment was set in the role of the tested patient. It has been linked to the control layer, developed in the LabVIEW environment, using the SIT library (Simulation Interface Toolkit). This layer...
-
Will NILM Technology Replace Multi-Meter Telemetry Systems for Monitoring Electricity Consumption?
PublicationThe estimation of electric power utilization, its baseload, and its heating, light, ventilation, and air-conditioning (HVAC) power component, which represents a very large portion of electricity usage in commercial facilities, are important for energy consumption controls and planning. Non-intrusive load monitoring (NILM) is the analytical method used to monitor the energy and disaggregate total electrical usage into appliance-related...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Identification of category associations using a multilabel classifier
PublicationDescription of the data using categories allows one to describe it on a higher abstraction level. In this way, we can operate on aggregated groups of the information, allowing one to see relationships that do not appear explicit when we analyze the individual objects separately. In this paper we present automatic identification of the associations between categories used for organization of the textual data. As experimental data...
-
Concurrent Video Denoising and Deblurring for Dynamic Scenes
PublicationDynamic scene video deblurring is a challenging task due to the spatially variant blur inflicted by independently moving objects and camera shakes. Recent deep learning works bypass the ill-posedness of explicitly deriving the blur kernel by learning pixel-to-pixel mappings, which is commonly enhanced by larger region awareness. This is a difficult yet simplified scenario because noise is neglected when it is omnipresent in a wide...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Autoencoder application for anomaly detection in power consumption of lighting systems
PublicationDetecting energy consumption anomalies is a popular topic of industrial research, but there is a noticeable lack of research reported in the literature on energy consumption anomalies for road lighting systems. However, there is a need for such research because the lighting system, a key element of the Smart City concept, creates new monitoring opportunities and challenges. This paper examines algorithms based on the deep learning...
-
Detection of Anomalies in the Operation of a Road Lighting System Based on Data from Smart Electricity Meters
PublicationSmart meters in road lighting systems create new opportunities for automatic diagnostics of undesirable phenomena such as lamp failures, schedule deviations, or energy theft from the power grid. Such a solution fits into the smart cities concept, where an adaptive lighting system creates new challenges with respect to the monitoring function. This article presents research results indicating the practical feasibility of real‐time...
-
Classification of Covid-19 using Differential Evolution Chaotic Whale Optimization based Convolutional Neural Network
PublicationCOVID-19, also known as the Coronavirus disease-2019, is an transferrable disease that spreads rapidly, affecting countless individuals and leading to fatalities in this worldwide pandemic. The precise and swift detection of COVID-19 plays a crucial role in managing the pandemic's dissemination. Additionally, it is necessary to recognize COVID-19 quickly and accurately by investigating chest x-ray images. This paper proposed a...
-
Proposition of the methodology for Data Acquisition, Analysis and Visualization in support of Industry 4.0
PublicationIndustry 4.0 offers a comprehensive, interlinked, and holistic approach to manufacturing. It connects physical with digital and allows for better collaboration and access across departments, partners, vendors, product, and people. Consequently, it involves complex designing of highly specialized state of the art technologies. Thus, companies face formidable challenges in the adoption of these new technologies....
-
A Numerical Study on Baseline-Free Damage Detection Using Frequency Steerable Acoustic Transducers
PublicationIn structural health monitoring (SHM) a considerable amount of damage detection algorithms based on guided waves (GW) have been developed. Most of them rely on extensive transducer networks, besides preliminary reference measurements of the structures. This originated a growing demand for hardware simplification and cost reduction of the wave-based SHM methods, driving the conception of new solutions enabling both: the reduction...
-
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublicationThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Topological-numerical analysis of a two-dimensional discrete neuron model
PublicationWe conduct computer-assisted analysis of a two-dimensional model of a neuron introduced by Chialvo in 1995 [Chaos, Solitons Fractals 5, 461–479]. We apply the method of rigorous analysis of global dynamics based on a set-oriented topological approach, introduced by Arai et al. in 2009 [SIAM J. Appl. Dyn. Syst. 8, 757–789] and improved and expanded afterward. Additionally, we introduce a new algorithm to analyze the return times...
-
Multiplicative Long Short-Term Memory with Improved Mayfly Optimization for LULC Classification
PublicationLand Use and Land Cover (LULC) monitoring is crucial for global transformation, sustainable land control, urban planning, urban growth prediction, and the establishment of climate regulations for long-term development. Remote sensing images have become increasingly important in many environmental planning and land use surveys in recent times. LULC is evaluated in this research using the Sat 4, Sat 6, and Eurosat datasets. Various...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Leveraging spatio-temporal features for joint deblurring and segmentation of instruments in dental video microscopy
PublicationIn dentistry, microscopes have become indispensable optical devices for high-quality treatment and micro-invasive surgery, especially in the field of endodontics. Recent machine vision advances enable more advanced, real-time applications including but not limited to dental video deblurring and workflow analysis through relevant metadata obtained by instrument motion trajectories. To this end, the proposed work addresses dental...
-
Individual entrepreneurial orientation: comparison of business and STEM students
PublicationAbstract Purpose – The purpose of this study is to determine whether there are differences in Individual Entrepreneurial Orientation (IEO) between students who are doing their major in business studies and the ones whose areas of study are science, technology, engineering, and mathematics (STEM). Design/methodology/approach – The current research investigates which factors and components contribute to EO orientation development...
-
Leadership, culture, intellectual capital and knowledge processes for organizational innovativeness across industries: the case of Poland
PublicationPurpose – This study aims to present the overview of intellectual capital creation micro-mechanisms concerning formal and informal knowledge processes. The organizational culture, transformational leadership and innovativeness are also included in the investigation as ascendants and consequences of the focal relation of intellectual capital and knowledge processes. Design/methodology/approach – Based on a sample of 1,418 Polish...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Application of autoencoder to traffic noise analysis
PublicationThe aim of an autoencoder neural network is to transform the input data into a lower-dimensional code and then to reconstruct the output from this code representation. Applications of autoencoders to classifying sound events in the road traffic have not been found in the literature. The presented research aims to determine whether such an unsupervised learning method may be used for deploying classification algorithms applied to...
-
Managing Unemployment under COVID-19 Conditions (States of Emergency or Crisis)
PublicationRising unemployment is one of the consequences of the COVID-19 pandemic in many countries. This, in turn, has forcedpolicymakers to respond immediately with policy tools to minimize unemployment. The purpose of our study is to contribute toempirical knowledge by looking at activities of 40 local government units to counteract unemployment in the cross-border regionon the Polish side. In doing this, our study contributes to the...
-
Beyond quid pro quo: good soldiers and characteristics of their helping behaviours
PublicationPurpose – Good soldiers are people who engage in citizenship behaviours “to do good” instead of “to look good”. The purpose of this article is to explore the motivations behind and the specific characteristics of behaviours of the good soldiers in the context of work using social exchange theory (SET) as a theoretical framework. Design/methodology/approach – 47 dyadic interviews with 94 individuals from three organisations...
-
Neurodiversity and remote work in times of crisis: lessons for HR
PublicationPurpose The rich qualitative study builds on 11 semi-structured interviews with nine neurodivergent employees and two business professionals supportive of neurodiversity to understand the lived experiences of dealing with crisis in a remote working environment. Design/methodology/approach The purpose of the reported research is to understand how neurominorities experience remote working in the times of crisis and what the implications...
-
A New Rehabilitation Device for Balance Impaired Individuals
PublicationIn the paper authors present a device designed to improve the rehabilitation process of people with balance impairment. The discussed device (JStep) utilizes a commercially available static standing frame (stander) modified in order to fit force sensing units under the feet and in the pillows around the hips of a patient. While executing rehabilitation tasks, the patient may compensate his balance deficiency by leaning on the pillows...
-
Creating Shared Value by the University
PublicationPurpose Works that link creating shared value (CSV) with the university are arising, and there is a hope for a great future of this combination. The main problem with these works is that they are based on the wrong assumptions of what CSV is. The aim of the paper is to properly explain the concept of CSV and match it with university social responsibility (USR) at a strategic level. Design/methodology/approach A literature review...
-
Comparing the Effectiveness of ANNs and SVMs in Forecasting the Impact of Traffic-Induced Vibrations on Building
PublicationTraffic - induced vibrations may cause damage to structural elements and may even lead to structural collapse. The aim of the article is to compare the effectiveness of algorithms in forecasting the impact of vibrations on buildings using the Machine Learning (ML) methods. The paper presents two alternative approaches by using Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). Factors that may affect traffic-induced...
-
Convolutional Neural Networks for C. Elegans Muscle Age Classification Using Only Self-Learned Features
PublicationNematodes Caenorhabditis elegans (C. elegans) have been used as model organisms in a wide variety of biological studies, especially those intended to obtain a better understanding of aging and age-associated diseases. This paper focuses on automating the analysis of C. elegans imagery to classify the muscle age of nematodes based on the known and well established IICBU dataset. Unlike many modern classification methods, the proposed...
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
Buried Object Characterization Using Ground Penetrating Radar Assisted by Data-Driven Surrogate-Models
PublicationThis work addresses artificial-intelligence-based buried object characterization using 3-D full-wave electromagnetic simulations of a ground penetrating radar (GPR). The task is to characterize cylindrical shape, perfectly electric conductor (PEC) object buried in various dispersive soil media, and in different positions. The main contributions of this work are (i) development of a fast and accurate data driven surrogate modeling...
-
Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks
PublicationThe construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....
-
Architectural Modifications to Enhance Steganalysis with Convolutional Neural Networks
PublicationThis paper investigates the impact of various modifications introduced to current state-of-the-art Convolutional Neural Network (CNN) architectures specifically designed for the steganalysis of digital images. Usage of deep learning methods has consistently demonstrated improved results in this field over the past few years, primarily due to the development of newer architectures with higher classification accuracy compared to...
-
The Education of Analytical Chemists in Polish Universities
PublicationAnalytical Chemistry plays a very important role in the modern world. The main reasons are; the need of environmental monitoring, quality of food and water control, human health, quality of industrial production control, nanotechnologies and material science. Together with Inorganic Chemistry, Organic Chemistry and Physical Chemistry, Analytical Chemistry is a fundamental chemical course. The education of Analytical Chemists is...
-
How do responsible universities perceive their social engagement? In search of signs of Creating Shared Value by the University
PublicationObjectives: University social responsibility still lacks legitimisation and is perceived as a burden that hinders academics from doing research and teaching. Creating Shared Value by the University may serve as a tool to motivate universities to engage in initiatives for society, as this is beneficial for both parties. Yet, some researchers perceive the creation of economic value as inappropriate for academia. Thus, it was interesting...
-
Voice command recognition using hybrid genetic algorithm
PublicationAbstract: Speech recognition is a process of converting the acoustic signal into a set of words, whereas voice command recognition consists in the correct identification of voice commands, usually single words. Voice command recognition systems are widely used in the military, control systems, electronic devices, such as cellular phones, or by people with disabilities (e.g., for controlling a wheelchair or operating a computer...
-
Computer-Aided Diagnosis of COVID-19 from Chest X-ray Images Using Hybrid-Features and Random Forest Classifier
PublicationIn recent years, a lot of attention has been paid to using radiology imaging to automatically find COVID-19. (1) Background: There are now a number of computer-aided diagnostic schemes that help radiologists and doctors perform diagnostic COVID-19 tests quickly, accurately, and consistently. (2) Methods: Using chest X-ray images, this study proposed a cutting-edge scheme for the automatic recognition of COVID-19 and pneumonia....
-
Two-Step Model Based Adaptive Controller for Dissolved Oxygen Control in Sequencing Wastewater Batch Reactor
PublicationDissolved Oxygen (DO) concentration is a crucial parameter for efficient operation of biological processes taking place in the activated sludge Wastewater Treatment Plant (WWTP). High-quality DO control is difficult to achieve because of complex nonlinear behavior of the plant and substantial influent disturbances. A method to improve the Direct Model Reference Adaptive Control (DMRAC) technology in application to DO tracking for...
-
The Efficiency of Public and Private Higher Education Institutions in Poland
PublicationChanges introduced to Poland’s education system in 2011 and 2014 amid efforts to adjust it to the needs of the labour market had an effect on the country’s institutions of higher learning. This paper provides an analysis of the efficiency of public and private Polish universities and examines the impact of selected factors in the years that followed. To estimate this efficiency, a Banker, Charnes and Cooper (BCC) model of the...
-
A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention
PublicationTogether with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublicationThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Longitudinal drug synergy assessment using convolutional neural network image-decoding of glioblastoma single-spheroid cultures
PublicationAbstract Background In recent years, drug combinations have become increasingly popular to improve therapeutic outcomes in various diseases, including difficult to cure cancers such as the brain cancer glioblastoma. Assessing the interaction between drugs over time is critical for predicting drug combination effectiveness and minimizing the risk of therapy resistance. However, as viability readouts of drug combination experiments...
-
Train the trainer course
PublicationThis chapter presents the concept, evaluation and evaluation results for the train the trainer. This concept of train the trainers is prepared within Workpackage 5 of EU-funded project: MASTER BSR (Erasmus+ Strategic Partnership Programme). Due to the nature of adult learning the content is designed for the use of participatory methods (involved, active). This method uses various techniques of active learning e.g. group work,...
-
Computer-assisted pronunciation training—Speech synthesis is almost all you need
PublicationThe research community has long studied computer-assisted pronunciation training (CAPT) methods in non-native speech. Researchers focused on studying various model architectures, such as Bayesian networks and deep learning methods, as well as on the analysis of different representations of the speech signal. Despite significant progress in recent years, existing CAPT methods are not able to detect pronunciation errors with high...