Filters
total: 23648
filtered: 2082
-
Catalog
- Publications 2082 available results
- Journals 358 available results
- Conferences 196 available results
- Publishing Houses 1 available results
- People 199 available results
- Projects 12 available results
- Research Teams 1 available results
- e-Learning Courses 104 available results
- Events 2 available results
- Open Research Data 20693 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION
-
Path-based methods on categorical structures for conceptual representation of wikipedia articles
PublicationMachine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....
-
Validating data acquired with experimental multimodal biometric system installed in bank branches
PublicationAn experimental system was engineered and implemented in 100 copies inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank client voice recognition and hand vein distribution verification. The main purpose of the presented research was to analyze questionnaire responses reflecting user opinions on: comfort, ergonomics, intuitiveness and other aspects of the biometric enrollment...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Radionuclides activity and effective doses referred to geological formations
PublicationNaturally occurring radioactive materials (NORM) are present in Earth’s crust and they caused natural background radiation, variable in different regions. Liquid, gas and solid radionuclides emit three types of radiation – alpha, beta and gamma. Fluctuations of natural radioactivity in different geological formations in the world and in Poland were compared in relation to radiological hazard. Also drilling cuttings from boreholes...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Music Recommendation System
PublicationThe paper focuses on optimization vector content feature for the music recommendation system. For the purpose of experiments a database is created consisting of excerpts of music les. They are assigned to 22 classes corresponding to dierent music genres. Various feature vectors based on low-level signal descriptors are tested and then optimized using correlation analysis and Principal Component Analysis (PCA). Results of the experiments...
-
Isomerization and Decomposition of 2-Methylfuran with External Forces
Publication -
Application of Graph Theory Algorithms in Non-disjoint Functional Decomposition of Specific Boolean Functions
Publication -
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publication -
Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field
Publication -
Use of Restraints from Consensus Fragments of Multiple Server Models To Enhance Protein-Structure Prediction Capability of the UNRES Force Field
Publication -
A Maximum-Likelihood Approach to Force-Field Calibration
Publication -
Improved Consensus-Fragment Selection in Template-Assisted Prediction of Protein Structures with the UNRES Force Field in CASP13
Publication -
Free Energies of the Disassembly of Viral Capsids from a Multiscale Molecular Simulation Approach
Publication -
Role of Glycosaminoglycans in Procathepsin B Maturation: Molecular Mechanism Elucidated by a Computational Study
Publication -
Role of Oligosaccharide Chain Polarity in Protein–Glycosaminoglycan Interactions
Publication -
Multi-Objective Genetic Algorithm (MOGA) As a Feature Selecting Strategy in the Development of Ionic Liquids’ Quantitative Toxicity–Toxicity Relationship Models
Publication -
Metadata harvesting in regional digital libraries in the PIONIER network
Publication -
Mining relations between wikipedia categories
PublicationOpisano metody indukcji powiązań pomiędzy kategoriami organizującymi zbiór dokumentów. Przedstawiono wyniki zastosowania proponowanego podejścia dla poprawy systemu kategorii Wikipedii.
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublicationCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Two-state dynamics for replicating two-strand systems
PublicationDynamika dwustanowa została zastosowana do opisów układów dwuniciowych, analogicznych do DNA.
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublicationZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublicationThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Propagation Path Loss Modeling in Container Terminal Environment
PublicationThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublicationThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublicationThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
A few steps more towards NPT bound entanglement
PublicationIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
On thermal stability of topological qubit in Kitaev's 4D model
PublicationWe analyse stability of the four-dimensional Kitaev model-a candidate for scalable quantum memory - in finite temperature within the weak coupling Markovian limit. It is shown that, below a critical temperature, certain topological qubit observables X and Z possess relaxation times exponentially long in the size of the system. Their construction involves polynomial in system size algorithm which uses as an input the results of...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
The Realization of NGN Architecture for ASON/GMPLS Network
PublicationFor the last decades huge efforts of telecommunication,Internet and media organizations have been focusingon creating standards and implementing one common networkdelivering multimedia services - Next Generation Network.One of the technologies which are very likely to beused in NGN transport layer is ASON/GMPLS optical network.The implementation of ASON/GMPLS technology usingopen source software and its results are the subject...
-
Chirality Measures of α-Amino Acids
Publication -
The Microwave Sources for EPR Spectroscopy
Publication -
Automatic Image and Speech Recognition Based on Neural Network
Publication -
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublicationThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Multi Queue Approach for Network Services Implemented for Multi Core CPUs
PublicationMultiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also computer networking. Since the key functionality of network core components is fast package servicing, multicore technology, due to multi tasking ability, seems useful to support packet processing. Dedicated...
-
Communication Platform for Evaluation of Transmitted Speech Quality
PublicationA voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....