Search results for: computer - Bridge of Knowledge

Search

Search results for: computer

Filters

total: 2329
filtered: 1311

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: computer

  • Connected searching of weighted trees

    Publication

    W pracy pokazano, że problem spójnego przeszukiwania drzew ważonych jest silnie NP-zupełny. Problem pozostaje trudnym dla drzew z jednym wierzchołkiem o stopniu większym niż 2. Ponadto, przedstawiony został wielomianowy optymalny algorytm dla klasy drzew z ograniczonym stopniem.

    Full text available to download

  • Implementing Virtual Engineering Objects (VEO) with the Set of Experience Knowledge Structure (SOEKS)

    Publication

    - Procedia Computer Science - Year 2014

    This paper illustrates the idea of Virtual Engineering Object (VEO) powered by Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). A VEO is the knowledge representation of an engineering object, having embodiment of all its associated knowledge and experience within it. Moreover, VEO is a specialization of Cyber-Physical System (CPS) in terms of that its extension in knowledge gathering and reuse, whereas CPS...

    Full text available to download

  • Brushing with additional cleaning restrictions

    Publication

    In graph cleaning problems, brushes clean a graph by traversing it subject to certain rules. We consider the process where at each time step, a vertex that has at least as many brushes as incident, contaminated edges, sends brushes down these edges to clean them. Various problems arise, such as determining the minimum number of brushes (called the brush number) that are required to clean the entire graph. Here, we study a new variant...

    Full text available to download

  • Viability of decisional DNA in robotics

    Publication

    - Procedia Computer Science - Year 2014

    The Decisional DNA is an artificial intelligence system that uses prior experiences to shape future decisions. Decisional DNA is written in the Set Of Experience Knowledge Structure (SOEKS) and is capable of capturing and reusing a broad range of data. Decisional DNA has been implemented in several fields including Alzheimer’s diagnosis, geothermal energy and smart TV. Decisional DNA is well suited to use in robotics due to the...

    Full text available to download

  • The Hybrid Fuzzy - SOEKS Approach to the Polish Internet Mortgage Market

    The paper presents the hybrid fuzzy- SOEKS approach to the Polish Internet mortgage market, which is treated as an example of a fast changing market. Firstly, the market and market problems are described. Then, the first approach to the market problems is presented: the complete fuzzy model which was built basing on the rules. The fuzzy model is presented on one real data case. Next, the new approach, called Set of Experience Knowledge...

    Full text available to download

  • Optimization model of agile team’s cohesion

    Publication

    - Procedia Computer Science - Year 2014

    Team’s cohesion is one of the most important factors of IT project execution effectiveness. Optimization of team’s cohesion gives the possibility of reducing the risk of project failure. It also allows to increase the teamwork efficiency and thus optimize time of tasks execution, increase the guarantee of maintaining the scope of the project and the chance of achieving a given level of products quality. This article presents determination...

    Full text available to download

  • VIBRATION DIAGNOSTICS OF FOOTBRIDGE WITH USE OF ROTATION SENSOR

    Publication

    The benefits of the additional measurement of rotational degrees of free-dom on the performance of the vibration diagnosis of bridges are studied in this paper. The common vibrational diagnostics that uses translational degrees of freedom is extended by measurements of rotations. The study is curried out on a footbridge and the presence of damage as well as its location and size is determined with use of FEM updating procedure....

    Full text available to download

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Publication

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Full text available to download

  • The complexity of zero-visibility cops and robber

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the zero-visibility cops & robber game restricted to trees. We produce a characterisation of trees of copnumber k and We consider the computational complexity of the zero-visibility Cops and Robber game. We present a heavily modified version of an already-existing algorithm that computes the zero-visibility copnumber of a tree in linear time and we show that the corresponding decision problem is NP-complete on a nontrivial...

    Full text available to download

  • Tools, Methods and Services Enhancing the Usage of the Kepler-based Scientific Workflow Framework

    Publication
    • M. Płóciennik
    • S. Winczewski
    • P. Ciecieląg
    • F. Imbeaux
    • B. Guillerminet
    • P. Huynh
    • M. Owsiak
    • P. Spyra
    • T. Aniel
    • B. Palak... and 3 others

    - Procedia Computer Science - Year 2014

    Scientific workflow systems are designed to compose and execute either a series of computational or data manipulation steps, or workflows in a scientific application. They are usually a part of a larger eScience environment. The usage of workflow systems, however very beneficial, is mostly not irrelevant for scientists. There are many requirements for additional functionalities around scientific workflows systems that need to be...

    Full text available to download

  • Universal Augmentation Schemes for Network Navigability

    Publication
    • P. Fraigniaud
    • C. Gavoille
    • A. Kosowski
    • E. Lebhar
    • Z. Lotker

    - THEORETICAL COMPUTER SCIENCE - Year 2009

    Rozważano problem uzupełniania grafu (reprezentującego np. sieci społeczne) poprzez dodanie w każdym węźle jednego dodatkowego skierowanego połączenia (długodystansowego). Dokładniej, dla każdego węzła definiuje się listę prawdopodobieństw istnienia połączenia wychodzącego z danego węzła do wszystkich pozostałych węzłów; wartości tych prawdopodobieństw muszą sumować się do jedności. Routing zachłanny w takiej sieci polega na przekazywaniu...

    Full text available to download

  • Three levels of fail-safe mode in MPI I/O NVRAM distributed cache

    The paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...

    Full text available to download

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download

  • Designing Intelligent Factory: Conceptual Framework and Empirical Validation

    Publication

    - Procedia Computer Science - Year 2016

    This paper presents a framework for monitoring, analysing and decision making for a smart manufacturing environment. We maintain that this approach could play a vital role in developing an architecture and implementation of Industry 4.0. The proposed model has features like experience based knowledge representation and semantic analysis of engineering objects and manufacturing process. It is also capable of continuous real time...

    Full text available to download

  • 2-Coloring number revisited

    2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...

    Full text available to download

  • Proposition of the methodology for Data Acquisition, Analysis and Visualization in support of Industry 4.0

    Publication

    - Procedia Computer Science - Year 2019

    Industry 4.0 offers a comprehensive, interlinked, and holistic approach to manufacturing. It connects physical with digital and allows for better collaboration and access across departments, partners, vendors, product, and people. Consequently, it involves complex designing of highly specialized state of the art technologies. Thus, companies face formidable challenges in the adoption of these new technologies....

    Full text available to download

  • Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2010

    One of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...

    Full text available to download

  • TISAX - optimization of IT risk management in the automotive industry

    Publication
    • T. Królikowski
    • A. Ubowska

    - Procedia Computer Science - Year 2021

    Full text to download in external service

  • ChatGPT - opportunities or threats in the educational process

    Publication
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Year 2023

    Full text to download in external service

  • Building a cybersecurity culture of public administration system in Poland

    Publication
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Year 2022

    Full text to download in external service

  • An extended basis inexact shift–invert Lanczos for the efficient solution of large-scale generalized eigenproblems

    This paper proposes a technique, based on the Inexact Shift–Invert Lanczos (ISIL) method with Inexact Jacobi Orthogonal Component Correction (IJOCC) refinement, and a preconditioned conjugate-gradient (PCG) linear solver with multilevel preconditioner, for finding several eigenvalues for generalized symmetric eigenproblems. Several eigenvalues are found by constructing (with the ISIL process) an extended projection basis. Presented...

    Full text to download in external service

  • Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey

    Publication

    In its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...

    Full text to download in external service

  • Industry 4.0 Implementation Challenges in Manufacturing Industries: an Interpretive Structural Modelling Approach

    Publication

    - Procedia Computer Science - Year 2020

    For the last few years, the fourth industrial revolution, known as Industry 4.0, has been a hot topic among academics. Industry 4.0 literature involves researches presenting studies related to its different aspects including challenges, opportunities, implementation and adoption. However, a detailed study of challenges and barriers towards the Industry 4.0 implementation in manufacturing industries is missing. Hence, this paper...

    Full text available to download

  • Smart Virtual Product Development (SVPD) System to Support Product Inspection Planning in Industry 4.0

    Publication

    - Procedia Computer Science - Year 2020

    This paper presents the idea of supporting product inspection planning process during the early stages of product life cycle for the experts working on product development. Aim of this research is to assist a collaborative product development process by using Smart Virtual Product Development (SVPD) system, which is based on Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). The proposed system is developed...

    Full text available to download

  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey

    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

  • Improving the Performance of Ontological Querying by using a Contextual Approach

    In the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...

    Full text available to download

  • Contextual ontology for tonality assessment

    Publication

    classification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...

    Full text available to download

  • Microscopic traffic simulation models for connected and automated vehicles (CAVs) – state-of-the-art

    Publication
    • P. Gora
    • C. Kartakazas
    • A. Drabicki
    • F. Islam
    • P. Ostaszewski

    - Procedia Computer Science - Year 2020

    Research on connected and automated vehicles (CAVs) has been gaining substantial momentum in recent years. However, thevast amount of literature sources results in a wide range of applied tools and datasets, assumed methodology to investigate thepotential impacts of future CAVs traffic, and, consequently, differences in the obtained findings. This limits the scope of theircomparability and applicability and calls for a proper standardization...

    Full text available to download

  • Modeling and Simulation for Exploring Power/Time Trade-off of Parallel Deep Neural Network Training

    Publication

    In the paper we tackle bi-objective execution time and power consumption optimization problem concerning execution of parallel applications. We propose using a discrete-event simulation environment for exploring this power/time trade-off in the form of a Pareto front. The solution is verified by a case study based on a real deep neural network training application for automatic speech recognition. A simulation lasting over 2 hours...

    Full text available to download

  • A distributed system for conducting chess games in parallel

    This paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...

    Full text available to download

  • Airfoil Design Under Uncertainty Using Non-Intrusive Polynomial Chaos Theory and Utility Functions

    Publication

    - Procedia Computer Science - Year 2017

    Fast and accurate airfoil design under uncertainty using non-intrusive polynomial chaos (NIPC) expansions and utility functions is proposed. The NIPC expansions provide a means to efficiently and accurately compute statistical information for a given set of input variables with associated probability distribution. Utility functions provide a way to rigorously formulate the design problem. In this work, these two methods are integrated...

    Full text available to download

  • Pareto Ranking Bisection Algorithm for EM-Driven Multi-Objective Design of Antennas in Highly-Dimensional Parameter Spaces

    Publication

    - Procedia Computer Science - Year 2017

    A deterministic technique for fast surrogate-assisted multi-objective design optimization of antennas in highly-dimensional parameters spaces has been discussed. In this two-stage approach, the initial approximation of the Pareto set representing the best compromise between conflicting objectives is obtained using a bisection algorithm which finds new Pareto-optimal designs by dividing the line segments interconnecting previously...

    Full text available to download

  • MobileNet family tailored for Raspberry Pi

    With the advances in systems-on-a-chip technologies, there is a growing demand to deploy intelligent vision systems on low-cost microcomputers. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity of contemporary convolutional neural networks (CNNs). The state-of-the-art lightweight CNN is MobileNetV3. However, it was designed to achieve a good trade-off between...

    Full text available to download

  • Towards Use of OntoClean for Ontology Contextualization

    Publication

    Ontologies are formal systems of concepts used to describe numerous domains of interest. Ontologies are usually very expressive, but it comes at a price of computationally expensive reasoning over them. In our previous work we discussed the possible performance benefits that can be obtained by decomposing an ontology into contexts. While the benefits are appealing, we discovered that, in our case, the main obstacle against using...

    Full text available to download

  • Weighted 2-sections and hypergraph reconstruction

    Publication

    In the paper we introduce the notion of weighted 2-sections of hypergraphs with integer weights and study the following hypergraph reconstruction problems: (1) Given a weighted graph , is there a hypergraph H such that is its weighted 2-section? (2) Given a weighted 2-section , find a hypergraph H such that is its weighted 2-section. We show that (1) is NP-hard even if G is a complete graph or integer weights w does not exceed...

    Full text to download in external service

  • Digitalization of High Speed Craft Design and Operation Challenges and Opportunities

    Publication

    - Procedia Computer Science - Year 2022

    In recent years, global demands for safe and sustainable ships led to dramatic changes in the maritime industry. Digitalization is expected to play an important part in the future. This is supported by analysis of the autonomous ships market which shows that digitalization of large ship types such as tankers and container ships is well on track. Although to date designs of autonomous High-Speed Craft (HSC) have been developed,...

    Full text available to download

  • Jamming and jamming mitigation for selected 5G military scenarios

    Publication
    • P. Skokowski
    • J. M. Kelner
    • K. Malon
    • K. Maślanka
    • A. Birutis
    • M. A. Vazquez
    • S. Saha
    • W. Low
    • A. Czapiewska
    • J. Magiera... and 2 others

    - Procedia Computer Science - Year 2022

    This paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....

    Full text available to download

  • Machine learning applied to acoustic-based road traffic monitoring

    The motivation behind this study lies in adapting acoustic noise monitoring systems for road traffic monitoring for driver’s safety. Such a system should recognize a vehicle type and weather-related pavement conditions based on the audio level measurement. The study presents the effectiveness of the selected machine learning algorithms in acoustic-based road traffic monitoring. Bases of the operation of the acoustic road traffic...

    Full text available to download

  • The complexity of bicriteria tree-depth

    Publication

    The tree-depth problem can be seen as finding an elimination tree of minimum height for a given input graph G. We introduce a bicriteria generalization in which additionally the width of the elimination tree needs to be bounded by some input integer b. We are interested in the case when G is the line graph of a tree, proving that the problem is NP-hard and obtaining a polynomial-time additive 2b-approximation algorithm. This particular...

    Full text to download in external service

  • Gossiping by energy-constrained mobile agents in tree networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2021

    Every node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...

    Full text to download in external service

  • Integrating Experience-Based Knowledge Representation and Machine Learning for Efficient Virtual Engineering Object Performance

    Publication

    - Procedia Computer Science - Year 2021

    Machine learning and Artificial Intelligence have grown significant attention from industry and academia during the past decade. The key reason behind interest is such technologies capabilities to revolutionize human life since they seamlessly integrate classical networks, networked objects and people to create more efficient environments. In this paper, the Knowledge Representation technique of Set of Experience...

    Full text available to download

  • Implementation of high-precision computation capabilities into the open-source dynamic simulation framework YADE

    Publication

    - COMPUTER PHYSICS COMMUNICATIONS - Year 2022

    This paper deals with the implementation of arbitrary precision calculations into the open-source discrete element framework YADE published under the GPL-2+ free software license. This new capability paves the way for the simulation framework to be used in many new fields such as quantum mechanics. The implementation details and associated gains in the accuracy of the results are discussed. Besides the "standard" double (64 bits)...

    Full text available to download

  • ARIMA vs LSTM on NASDAQ stock exchange data

    Publication

    - Procedia Computer Science - Year 2022

    This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...

    Full text available to download

  • Finding small-width connected path decompositions in polynomial time

    Publication

    A connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...

    Full text available to download

  • Visual content representation and retrieval for Cognitive Cyber Physical Systems

    Publication

    - Procedia Computer Science - Year 2019

    Cognitive Cyber Physical Systems have gained significant attention from academia and industry during the past few decade. One of the main reasons behind this interest is the potential of such technologies to revolutionize human life since they intend to work robustly under complex visual scenes, which environmental conditions may vary, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior...

    Full text available to download

  • Cops, a fast robber and defensive domination on interval graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Full text available to download

  • Smart Virtual Product Development (SVPD) to Enhance Product Manufacturing in Industry 4.0

    Publication

    - Procedia Computer Science - Year 2019

    This paper presents a system capable of enhancing product development process for industrial manufactured products. This system is known as Smart Virtual Product Development (SVPD), and it helps in decision making by using explicit knowledge of formal decision events. It stores and reuses the past decisional events or sets of experiences related to different activities involved in industrial product development process i.e. product...

    Full text available to download

  • Sustainable Waste Management for Implementation of a Circular Economy Model in a Port

    Publication

    - Procedia Computer Science - Year 2023

    The manuscript presents the management of waste from marine vessels and cargo handling companies in a selected European Union port. The main objective of the paper is to analyse and evaluate the existing waste management model in the port of Szczecin in the context of circular economy. The expert research carried out is aimed, inter alia, at identifying which of the solutions currently in use need to be improved from an environmental...

    Full text available to download

  • Extension of selected ADFA construction algorithms to the case of cyclic automata.

    Publication

    - Year 2004

    W niedawnym artykule Rafael Carrasco i Mikel Forcada przedstawiają przyrostowy algorytm dodawania słów do minimalnego, acyklicznego automatu skończonego. Ten algorytm jest uogólnieniem przyrostowego algorytmu tworzenia acyklicznych deterministycznych automatów skończonych (ADFAs). Przedstawiamy podobne uogólnienia dwóch innych algorytmów tworzenia ADFAs. Chociaż te ougólnienia zostały już opublikowane w maju i czerwcu 2004 r.,...

  • Computerized control and protection systems in technical objects and installations = Komputerowe systemy sterowania i zabezpieczeń w obiektach oraz instalacjach technicznych

    Artykuł przedstawia zagadnienia dotyczące systemów komputerowych sterowania i układów automatyki bezpieczeństwa. Rozwój automatyki i informatyki na przestrzeni ostatnich lat wymusił wprowadzenie szeregu nowych rozwiązań technicznych, dotyczących procesów sterowania i kontroli instalacji technicznych. Dąży się do automatyzacji kompleksowej instalacji technicznych, rozumianej, jako możliwość sterowania wszystkimi układami i urządzeniami...