Filters
total: 1128
filtered: 517
-
Catalog
- Publications 517 available results
- Journals 153 available results
- Conferences 160 available results
- Publishing Houses 1 available results
- People 24 available results
- Projects 3 available results
- e-Learning Courses 8 available results
- Events 1 available results
- Open Research Data 261 available results
Chosen catalog filters
Search results for: VOLUNTEER%20COMPUTING
-
Detection of Face Position and Orientation Using Depth Data
PublicationIn this paper an original approach is presented for real-time detection of user's face position and orientation based only on depth channel from a Microsoft Kinect sensor which can be used in facial analysis on scenes with poor lighting conditions where traditional algorithms based on optical channel may have failed. Thus the proposed approach can support, or even replace, algorithms based on optical channel or based on skeleton...
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
Automatic Detection of Nerves in Confocal Corneal Images with Orientation-Based Edge Merging
PublicationThe paper presents an algorithm for improving results of automatic nerve detections in confocal microscopy images of human corneal. The method is designed as a postprocessing step of regular detection. After the nerves are initially detected, the algorithms attempts to improve the results by filling unde-sired gaps between single nerves detections in order to correctly mark the entire nerve instead of only parts of it. This approach...
-
Hazard Control in Industrial Environments: A Knowledge-Vision-Based Approach
PublicationThis paper proposes the integration of image processing techniques (such as image segmentation, feature extraction and selection) and a knowledge representation approach in a framework for the development of an automatic system able to identify, in real time, unsafe activities in industrial environments. In this framework, the visual information (feature extraction) acquired from video-camera images and other context based gathered...
-
Smart Innovation Engineering (SIE): Experience-Based Product Innovation System for Industry 4.0
PublicationThis paper presents a semi-automatic system capable of facilitating product innovation process. This system, known as Smart Innovation Engineering (SIE) system, helps in decision-making by using the explicit knowledge of formal decision events. The SIE system carries the promise to support the innovation processes of manufactured products in a quick and efficient way. It stores and reuses the past decisional events or sets of experiences...
-
Impact of Cyclist Facility Availability at Work on the Number of Bike Commuters
PublicationThe article describes the results of research designed to establish whether cycle provision can influence the number of employees commuting by bike. To that end, employee surveys were conducted in three IT companies in 2012 and 2016. The questionnaire asked about travel behaviour and what the staff thought about their company’s provision of cyclist facilities. Since 2012 each of the companies has moved its head office and the...
-
Interdisciplinary Design Teams in Poland - Architecture as a Tool for Preventing Hospital-Acquired Infections
PublicationHospital-acquired infections pose a problem, which directly affects the safe usage of healthcare facilities. On a global scale, the level of hospital-acquired infections (HAI) is estimated to affect 5–15% of those hospitalised. The World Health Organization (WHO) estimates that, on an annual basis, procedures preventing hospital-acquired infections consume 80 billion dollars [1]. In this context, it becomes important to create...
-
Modelling and simulation of GPU processing in the MERPSYS environment
PublicationIn this work, we evaluate an analytical GPU performance model based on Little's law, that expresses the kernel execution time in terms of latency bound, throughput bound, and achieved occupancy. We then combine it with the results of several research papers, introduce equations for data transfer time estimation, and finally incorporate it into the MERPSYS framework, which is a general-purpose simulator for parallel and distributed...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Ergonomic Aspects of Development of Architecture in the Context of Sanitary and Hygiene Safety
PublicationAbstract Ergonomics answers the need of safe development of space by creating spatial forms which help to implement the safety procedures and limit the threats involved both in ordinary use of the spaces and in case of unforeseen events. Using the knowledge of ergonomics and architecture on the basis of defining the routes of germ transmission, allows to limit the spread of those organisms. Ergonomics of developing architectural...
-
Towards Understanding of Mechanics of Hernia Managed by Synthetic Mesh in Laparoscopic Operation: A Single Case Study
PublicationIn this paper a research towards understanding of mechanics of ventral hernia operated with the use of Physiomesh Open image in new window implant and SecureStrap Open image in new window staples is described. Experimental and numerical studies are conducted for that purpose. Experimental works cover uni-axial tension tests of the implant samples and of the implant-staples-tissue system. Also experiments on implant-staples-tissue...
-
Path planning algorithm for ship collisions avoidance in environment with changing strategy of dynamic obstacles
PublicationIn this paper a path planning algorithm for the ship collision avoidance is presented. Tested algorithm is used to determine close to optimal ship paths taking into account changing strategy of dynamic obstacles. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of evolutionary algorithm and based on it dedicated application...
-
Selected Aspect of IT Tools Application in Process Improvement in Industrial Laundry Services
PublicationThe laundry services sector in Poland is growing dynamically and currently has around 13,000 enterprises, mainly micro, small and medium size. The increasing competitiveness of this industry, causes more emphasis on solutions that can in-crease the efficiency of laundry processes and thereby strengthen the market position. One of the methods that can be used for this purpose is Lean Six Sigma, aided by specialized computer software....
-
Cognition and Decisional Experience to Support Safety Management in Workplaces
PublicationHazards are present in all workplaces and can result in serious injuries, short and long-term illnesses, or death. In this context, management of safety is essential to ensure the occupational health of workers. Aiming to assist the safety management process, especially in industrial environments, a Cognitive Vision Platform for Hazard Control (CVP-HC) is proposed. This platform is a Cyber Physical system, capable of identifying...
-
From Sequential to Parallel Implementation of NLP Using the Actor Model
PublicationThe article focuses on presenting methods allowing easy parallelization of an existing, sequential Natural Language Processing (NLP) application within a multi-core system. The actor-based solution implemented with the Akka framework has been applied and compared to an application based on Task Parallel Library (TPL) and to the original sequential application. Architectures, data and control flows are described along with execution...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Smart Innovation Management in Product Life Cycle
PublicationThe present paper proposes a framework for smart innovation management of the product using a Smart Knowledge Management System comprising Set of Experience Knowledge Structure (SOEKS) and Decisional DNA. This proposed system will allow the entrepreneurs and organizations to perform the innovation process technically and quickly as this framework will store knowledge as well as experiences of the past innovations done in various...
-
Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model
PublicationIn this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...
-
Decisional DNA Based Conceptual Framework for Smart Manufacturing
PublicationThis paper presents the conceptual framework for systematic knowledge representation, storage and reuse of manufacturing information in a production scenario. This knowledge structure is designed for three levels in a manufacturing set up viz. first at the engineering objects level, second at process and finally at factory level. Virtual engineering object (VEO) deals with knowledge at the individual object/component/machine level...
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublicationA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
Reduction of Computational Complexity in Simulations of the Flow Process in Transmission Pipelines
PublicationThe paper addresses the problem of computational efficiency of the pipe-flow model used in leak detection and identification systems. Analysis of the model brings attention to its specific structure, where all matrices are sparse. With certain rearrangements, the model can be reduced to a set of equations with tridiagonal matrices. Such equations can be solved using the Thomas algorithm. This method provides almost the same values...
-
Evolutionary music composition system with statistically modeled criteria
PublicationThe paper concerns an original evolutionary music composition system. On the basis of available solutions, we have selected a finite set of music features which appear to have a key impact on the quality of composed musical phrases. Evaluation criteria have been divided into rule-based and statistical sub-sets. Elements of the cost function are modeled using a Gaussian distribution defined by the expected value and variance obtained...
-
Analysis of IMS/NGN Call Processing Performance Using Phase-Type Distributions Based on Experimental Histograms
PublicationThe paper describes our further research done with the proposed analytical and simulation traffic models of the Next Generation Network (NGN), which is standardized for delivering multimedia services with strict quality and includes elements of the IP Multimedia Subsystem (IMS). The aim of our models of a single IMS/NGN domain is to evaluate two standardized call processing performance parameters, which appropriate values are very...
-
Application of Support Vector Machine for Determination of Impact of Traffic-Induced Vibrations on Buildings
PublicationThe aim of the article is to present an algorithm of Support Vector Machine created to forecast the impact of traffic-induced vibrations on residential buildings. The method is designed to classify the object into one of two classes. The classification into the first class means that there is no impact of vibrations on the building, while classification to the second class indicates the possible influence and suggests the execution...
-
Centralized and Distributed Structures of Intelligent Systems for Aided Design of Ship Automation
PublicationA design process and accepted solutions made during this process, often base on non-formalized knowledge, obtained from designer (expert) intuition and practice. There are no formalized rules assuring the correctness of design solutions. The analysis of design process of ship automation, including ship power system, shows that this process can be supported by application of the artificial intelligence elements. The article presents...
-
Extending Continuous Integration with Post-mortem Debug Automation of Unhandled Exceptions Occurred in Kernel or User Mode Applications
PublicationThe paper proposes extension of the Continuous Integration practices with debug automation of unhandled exceptions. Goal of this improvement is to reduce the amount of redundant work when inspecting hundreds of failed tests from possibly the same reason, and to decrease time necessary to provide a fix to the codebase. The suitable CI infrastructure is proposed and an automatic method how to eliminate duplicated bugs is discussed....
-
Low-Cost Flight Simulator with Possibility of Modeling of Flight Controls Failures
PublicationThe goal of this paper is to present a development of a low cost flight simulator, that allows to simulate flight controls failures. Cessna 172 has been chosen as an example of a general aviation aircraft and the flight model has been implemented in Simulink. The model allows for easy integration of an experimental autopilot, using various strategies. Aerodynamic coefficients have been calculated using software called DATCOM. Such...
-
Modelling, Simulation and Optimization of the Wavemaker in a Towing Tank
PublicationThe paper analyses the problem of experimental identification (frequency response), modelling and optimization of the towing tank wavemaker in the Scilab/Xcos environment. The experimental identification of the objects (the towing tank wavemaker placed in the hydrodynamic laboratory of the CTO S.A. Ship Design and Research Centre (CTO)) and the implementation of the models in the simulation environment, enable to perform: 1. tuning...
-
Parallelization of Selected Algorithms on Multi-core CPUs, a Cluster and in a Hybrid CPU+Xeon Phi Environment
PublicationIn the paper we present parallel implementations as well as execution times and speed-ups of three different algorithms run in various environments such as on a workstation with multi-core CPUs and a cluster. The parallel codes, implementing the master-slave model in C+MPI, differ in computation to communication ratios. The considered problems include: a genetic algorithm with various ratios of master processing time to communication...
-
DBpedia and YAGO as Knowledge Base for Natural Language Based Question Answering—The Evaluation
PublicationThe idea of automatic question answering system has a very long history. Despite constant improvement of the systems asking questions in the natural language requires very complex solutions. In this paper the DBpedia and YAGO are evaluated as a knowledge bases for simple class 1 and 2 question answering system. For this purpose a question answering system was designed and implemented. The proposed solution and the knowledge bases...
-
Identification of Continuous Systems - Practical Issues of Insensitivity to Perturbations
PublicationIn this paper the issue of continuous systems estimation, insensitive to certain perturbations, is discussed. Such an approach has rational advantages, especially when robust schemes are used to assist a target system responsible for industrial diagnostics. This requires that estimated model parameters are generated on-line, and their values are reliable and to a great extent accurate. Practical hints are suggested to challenge...
-
River Flow Simulation Based on the HEC-RAS System
PublicationThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
System for tracking multiple trains on a test railway track
PublicationSeveral problems may arise when multiple trains are to be tracked using two IP camera streams. In this work, real-life conditions are simulated using a railway track model based on the Pomeranian Metropolitan Railway (PKM). Application of automatic clustering of optical flow is investigated. A complete tracking solution is developed using background subtraction, blob analysis, Kalman filtering, and a Hungarian algorithm. In total,...
-
A Survey on Identifying and Addressing Business Analysis Problems
PublicationDespite the growing body of knowledge on requirements engineering and business analysis, these areas of software project are still considered problematic. The paper focuses on problems reported by business analysts and on applicability of available business analysis techniques as solutions to such problems. A unified set of techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification...
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublicationResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Real-Time Basic Principles Nuclear Reactor Simulator Based on Client-Server Network Architecture with WebBrowser as User Interface
PublicationThe real-time simulator of nuclear reactor basic processes (neutron kinetics, heat generation and its exchange, poisoning and burn- ing up fuel) build in a network environment is presented in this paper. The client-server architecture was introduced, where the server is a pow- erful computing unit and the web browser application is a client for user interface purposes. The challenge was to develop an application running under the...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublicationThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA
PublicationVisual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism
PublicationThe paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...
-
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
PublicationThe paper presents an evaluation of all-reduce collective MPI algorithms for an environment based on a geographically-distributed compute cluster. The testbed was split into two sites: CI TASK in Gdansk University of Technology and ICM in University of Warsaw, located about 300 km from each other, both connected by a fast optical fiber Ethernet-based 100 Gbps network (900 km part of the PIONIER backbone). Each site hosted a set...
-
Selection Pressure in the Evolutionary Path Planning Problem
PublicationThis article compares an impact of using various post-selection methods on the selection pressure and the quality of the solution for the problem of planning the path for a moving object using the evolutionary method. The concept of selection pressure and different methods of post-selection are presented. Article analyses behaviour of post-selection for four options of evolutionary algorithms. Based on the results achieved, waveform...
-
Self-stabilizing algorithm for edge-coloring of graphs
PublicationReferat ten poświęcony jest kolorowaniu grafów w modelu rozproszonym.Podano samostabilizujący się algorytm kolorowania krawędzi grafu wraz z dowodem poprawności oraz oszacowaniem jego czasu działania.
-
Adipokine and cytokine levels in patients with adrenocortical cancer, subclinical Cushing's syndrome and healthy controls
PublicationIntroduction In recent years researchers have focused at hormonal activity in Cushing’s syndrome (CS) in connection with metabolic disorders and the role of adipokines and cytokines secreted by the adipose tissue. The aim of the study was to investigate levels of adipokines and cytokines in patients with: subclinical CS (SCS) – in relation to hormonal parameters of hypercortisolemia, and, adrenocortical cancer (ACC). Materials...
-
Combinatorial scheme of finding minimal number of periodic points for smooth self-maps of simply connected manifolds
PublicationLet M be a closed smooth connected and simply connected manifold of dimension m at least 3, and let r be a fixed natural number. The topological invariant D^m_r [f], defined by the authors in [Forum Math. 21 (2009), 491-509], is equal to the minimal number of r-periodic points in the smooth homotopy class of f, a given self-map of M. In this paper, we present a general combinatorial scheme of computing D^m_r [f] for arbitrary dimension...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...