Filters
total: 32141
filtered: 7755
-
Catalog
- Publications 7755 available results
- Journals 1635 available results
- Conferences 255 available results
- Publishing Houses 2 available results
- People 1072 available results
- Projects 93 available results
- Laboratories 1 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 194 available results
- Events 18 available results
- Open Research Data 21114 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: applied information technology
-
Decoherence-free communication over multiaccess quantum channels
PublicationIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Radionuclides activity and effective doses referred to geological formations
PublicationNaturally occurring radioactive materials (NORM) are present in Earth’s crust and they caused natural background radiation, variable in different regions. Liquid, gas and solid radionuclides emit three types of radiation – alpha, beta and gamma. Fluctuations of natural radioactivity in different geological formations in the world and in Poland were compared in relation to radiological hazard. Also drilling cuttings from boreholes...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
ИНФОРМАЦИОННО-АНАЛИТИЧЕСКАЯ СИСТЕМА ДЛЯ КОМПЛЕКСНОГО ГРАДОСТРОИТЕЛЬНОГО АНАЛИЗА
Publicationстатье приводится описание программного инструмента, предназначенного для анализа пространственных данных с использованием BI-платформы нового поколения PROGNOZ PLATFORM (РР). Описывается структура хранилища данных, подсистемы мониторинга, моделирования, аналитики и прогнозирования. Приводится набор тестовых параметров и примеры интерфейса Информационно-аналитической системы (ИАС), построенной на основе ГИС и PROGNOZ PLATFORM (РР),...
-
Multimedia polysensory integration training system dedicated to children with educational difficulties
PublicationThis paper aims at presenting a multimedia system providing polysensory train- ing for pupils with educational difficulties. The particularly interesting aspect of the system lies in the sonic interaction with image projection in which sounds generated lead to stim- ulation of a particular part of the human brain. The system architecture, video processing methods, therapeutic exercises and guidelines for children’s interaction...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Isomerization and Decomposition of 2-Methylfuran with External Forces
Publication -
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publication -
Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field
Publication -
Use of Restraints from Consensus Fragments of Multiple Server Models To Enhance Protein-Structure Prediction Capability of the UNRES Force Field
Publication -
A Maximum-Likelihood Approach to Force-Field Calibration
Publication -
Improved Consensus-Fragment Selection in Template-Assisted Prediction of Protein Structures with the UNRES Force Field in CASP13
Publication -
Contextualizing a Knowledge Base by Approximation – A Case Study
PublicationModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Reasoning with Projection in Multimodular Description Logics Knowledge Bases
PublicationWe present an approach to reasoning with projection, i.e. reasoning in which it is possible to focus on a selected part of knowledge (by neglecting some non-interesting fragments). Projection is most useful for modular knowledge bases in which only parts of knowledge have to be exchanged or imported to other modules. In this paper we present an optimized method of reasoning over results of projection. The tests indicate that the...
-
Role of Glycosaminoglycans in Procathepsin B Maturation: Molecular Mechanism Elucidated by a Computational Study
Publication -
Role of Oligosaccharide Chain Polarity in Protein–Glycosaminoglycan Interactions
Publication -
Multi-Objective Genetic Algorithm (MOGA) As a Feature Selecting Strategy in the Development of Ionic Liquids’ Quantitative Toxicity–Toxicity Relationship Models
Publication -
Metadata harvesting in regional digital libraries in the PIONIER network
Publication -
Free Energies of the Disassembly of Viral Capsids from a Multiscale Molecular Simulation Approach
Publication -
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Intelligent video and audio applications for learning enhancement
PublicationThe role of computers in school education is briefly discussed. Multimodal interfaces development history is shortly reviewed. Examples of applications of multimodal interfaces for learners with special educational needs are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with facial expression and speech stretching audio interface representing audio modality....
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
Vacuum Rabi oscillation in nonzero-temperature open cavity
PublicationPorównania teorii oscylacji Rabiego z eksperymentem [M. Wilczewski, M. Czachor, Phys. Rev. A 79, 0333836 (2009)] sugerują, że parametry wnęki doświadczeniu z dużą ilością fotonów mogą być znacznie mniejsze niż te otrzymane dla stanów prawie próżniowych. W tym kontekście pokazujemy, że wniosek pozostaje bez zmian, nawet jeśli do opisu stanu początkowego wnęki zastosuje się bardziej realistyczny opis.
-
Two examples of Quantum Dynamical Semigroups
PublicationThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
Chirality Measures of α-Amino Acids
Publication -
Intelligent processing of stuttered speech.
PublicationW artykule zaprezentowano kilka metod analizy i automatycznego zliczania potknięć artykulacyjnych, związanych z jąkaniem się, opartych na wykorzystaniu algorytmów uczących się sztucznych sieci neuronowych i zbiorów przybliżonych.
-
Estimation of musical sound separation algorithm effectiveness employing neural networks.
PublicationŚlepa separacja dźwięków sygnałów muzycznych zawartych w zmiksowanym materiale jest trudnym zadaniem. Jest to spowodowane tym, że dźwięki znajdujące się w relacjach harmonicznych mogą zawierać kolidujące składowe sinusoidalne (składowe harmoniczne). Ewaluacja wyników separacji jest również problematyczna, gdyż analiza błędu energetycznego często nie odzwierciedla subiektywnej jakości odseparowanych sygnałów. W tej publikacji zostały...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Tacit knowledge acquisition & sharing, and its influence on innovations: A Polish/US cross-country study
PublicationThis study measures the relationship between tacit knowledge sharing and innovation in the Polish (n=350) and US (n=379) IT industries. Conceptually, the study identifies the potential sources of tacit knowledge development by individuals. That is, the study examines how “learning by doing” and “learning by interaction” lead to a willingness to share knowledge and, as a consequence, to support process and product/service innovation....
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
On the Characteristic Graph of a Discrete Symmetric Channel
PublicationWe present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
An audio-visual corpus for multimodal automatic speech recognition
Publicationreview of available audio-visual speech corpora and a description of a new multimodal corpus of English speech recordings is provided. The new corpus containing 31 hours of recordings was created specifically to assist audio-visual speech recognition systems (AVSR) development. The database related to the corpus includes high-resolution, high-framerate stereoscopic video streams from RGB cameras, depth imaging stream utilizing Time-of-Flight...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublicationThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
The Role of Electrostatics in Enzymes: Do Biomolecular Force Fields Reflect Protein Electric Fields?
PublicationPreorganization of large, directionally oriented, electric fields inside protein active sites has been proposed as a crucial contributor to catalytic mechanism in many enzymes, and it may be efficiently investigated at the atomistic level with molecular dynamics simulations. Here, we evaluate the ability of the AMOEBA polarizable force field, as well as the additive Amber ff14SB and Charmm C36m models, to describe the electric...
-
Automated Classifier Development Process for Recognizing Book Pages from Video Frames
PublicationOne of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...
-
System for monitoring road slippery based on CCTV cameras and convolutional neural networks
PublicationThe slipperiness of the surface is essential for road safety. The growing number of CCTV cameras opens the possibility of using them to automatically detect the slippery surface and inform road users about it. This paper presents a system of developed intelligent road signs, including a detector based on convolutional neural networks (CNNs) and the transferlearning method employed to the processing of images acquired with video...
-
A Framework for Enhancing Supplier Selection Process by Using SOEKS and Decisional DNA
PublicationAbstract. Supplier selection process is one of the significant stages in supply chain management for industrial manufactured products. It plays an integral role in the success of any manufacturing organization and is an important part starting right from selecting raw material to dispatch of finished products. This paper contributes to enhance the supplier selection process by proposing a multi-criteria decision making framework...
-
Calculating the Partition Coefficients of Organic Solvents in Octanol/Water and Octanol/Air
PublicationPartition coefficients define how a solute is distributed between two immiscible phases at equilibrium. The experimental estimation of partition coefficients in a complex system can be an expensive, difficult, and time-consuming process. Here a computational strategy to predict the distributions of a set of solutes in two relevant phase equilibria is presented. The octanol/water and octanol/air partition coefficients are predicted...
-
Dithering strategy applied to tinnitus masking.
PublicationW referacie przedstawiono teorię wyjaśniającą zjawisko szumów usznych na gruncie akustyki, elektroniki i telekomunikacji. Spostrzeżenie, że słuch jest w istocie akustycznym układem transmisyjnym, skłania do poszukiwania interpretacji powstawania szumów usznych w ogólnej teorii spontanicznego generowania szumu w układach transmisyjnych. Sformułowana hipoteza wskazuje na istnienie pasożytniczej kwantyzacji, która pojawia się w sytuacji...