Filters
total: 2333
filtered: 1313
-
Catalog
- Publications 1313 available results
- Journals 283 available results
- Conferences 142 available results
- People 245 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 86 available results
- Events 5 available results
- Open Research Data 256 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: computer
-
Large-scale multimedia content delivery over optical networks for interactive TV services
Publication -
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Architecture Design of a Networked Music Performance Platform for a Chamber Choir
PublicationThis paper describes an architecture design process for Networked Music Performance (NMP) platform for medium-sized conducted music ensembles, based on remote rehearsals of Academic Choir of Gdańsk University of Technology. The issues of real-time remote communication, in-person music performance, and NMP are described. Three iterative steps defining and extending the architecture of the NMP platform with additional features to...
-
An Efficient Noisy Binary Search in Graphs via Median Approximation
PublicationConsider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...
-
Dynamic Signature Vertical Partitioning Using Selected Population-Based Algorithms
PublicationThe dynamic signature is a biometric attribute used for identity verification. It contains information on dynamics of the signing process. There are many approaches to the dynamic signature verification, including the one based on signature partitioning. Partitions are the regions created on the basis of signals describing the dynamics of the signature. They contain information on the shape of the signature characteristic of a...
-
The ICTBioMed NCIP Hub: Cancer research in a science gateway consortium
Publication -
mechanical engineering education via projects in multibody dynamics
PublicationPraca prezentuje rozważania nad wykorzystaniem interdyscyplinarnych projektów bazujących na zasadach dynamiki układów wieloczłonowych, traktowanych tu jako rozwinięcie kursu klasycznej mechaniki. Celem dydaktycznym jest zebranie w jednym procesie dydaktycznym takich aspektów jak: możliwość wykorzystania poznanych teoretycznie równań do modelowania i analizy znanego mu obiektu rzeczywistego; umożliwienie formułowania i testowania...
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
A Clustering-Based Methodology for Selection of Fault Tolerance Techniques
PublicationDevelopment of dependable applications requires selection of appropriate fault tolerance techniques that balance efficiency in fault handling and resulting consequences, such as increased development cost or performance degradation. This paper describes an advisory system that recommends fault tolerance techniques considering specified development and runtime application attributes. In the selection process, we use the K-means...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
The passive operating mode of the linear optical gesture sensor
PublicationThe study evaluates the influence of natural light conditions on the effectiveness of the linear optical gesture sensor, working in the presence of ambient light only (passive mode). The orientations of the device in reference to the light source were modified in order to verify the sensitivity of the sensor. A criterion for the differentiation between two states - "possible gesture" and "no gesture" - was proposed. Additionally,...
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
Design and Evaluation of the Platform for Weight-Shifting Exercises with Compensatory Forces Monitoring
PublicationDetails of a platform for the rehabilitation of people with severe balance impairment are discussed in the paper. Based upon a commercially available static parapodium, modified to fit force sensors, this device is designed to give a new, safe tool to physiotherapists. It is designed for the patients who cannot maintain equilibrium during a bipedal stance and need to hold to or lean on something during the rehabilitation. Visual,...
-
NLP Questions Answering Using DBpedia and YAGO
PublicationIn this paper, we present results of employing DBpedia and YAGO as lexical databases for answering questions formulated in the natural language. The proposed solution has been evaluated for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference). Our method uses dependency trees generated from the user query. The trees are browsed for paths leading from the root of the tree to the question...
-
Searching by heterogeneous agents
PublicationIn this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs: once a search strategy initially assigns labels to the searchers, each searcher can be only present on an edge of its own label. We prove that this problem is not monotone even for trees and we give instances...
-
KEYSTONE WG2: Activities and Results Overview on Keyword Search
PublicationIn this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.
-
A Framework for Enhancing Supplier Selection Process by Using SOEKS and Decisional DNA
PublicationAbstract. Supplier selection process is one of the significant stages in supply chain management for industrial manufactured products. It plays an integral role in the success of any manufacturing organization and is an important part starting right from selecting raw material to dispatch of finished products. This paper contributes to enhance the supplier selection process by proposing a multi-criteria decision making framework...
-
Clearing directed subgraphs by mobile agents
PublicationWe study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset S of vertices of a digraph D and a positive integer k, the objective is to determine whether there is a subgraph H=(V,A) of D such that (a) S is a subset of V, (b) H is the union of k directed...
-
Three dimensional fluid equations from distribution function with discontinuity in velocity space
PublicationUkład równań typu hydrodynamicznego dla rozwarstwionego gazu w polu grawitacyjnym jest wyprowadzony z równania BKG przy użyciu metody kawałków ciągłej funkcji dystrybucji. Otrzymany układ równań uogólnia układ Naviera-Stokesa dla dowolnych liczb Knudsena.
-
Finite automata for compact representation of language models in NLP
PublicationPrzedstawiona zostaje technika reprezentacji modeli języka w przetwarzaniu języka naturalnego wymagająca mało pamięci. Po krótkim omówieniu przyczyn poszukiwania oszczędnej reprezentacji takich modeli języka, pokazane jest, jak automaty skończone mogą być użyte w tym celu. Technika może być postrzegana jako zastosowanie i rozszerzenie doskonałej funkcji mieszającej z wykorzystaniem automatów skończonych. Pierwsze doświadczenia...
-
Capabilities and limitations of the disabled in remote access to information
PublicationArtykuł poświęcony jest możliwościom zdalnego dostępu do źródeł informacji przez osoby niepełnosprawne. Przedstawia urządzenia i aparaty umożliwiające grupom osób niepełnosprawnych najłatwiejsze w ich sytuacji psychofizycznej sposoby zdalnego dostępu do Centrum Informacyjnego, precyzyjnego określenia potrzebnej informacji, jej odbiorze i zapisu odpowiedzi z punktu widzenia dysfunkcji organizmu inwalidy proszącego o informację.
-
Dedicated scheduling of tasks to minimize mean flow time
PublicationThis paper investigates the complexity of scheduling biprocessor tasks on dedicated processors to minimize mean flow time. Since the general problem is strongly NP-hard, we assume some restrictions on task lengths and the structure of associated scheduling graphs. Of particular interest are acyclic graphs. In this way we identify a borderline between NP-hard and polynomially solvable special cases.
-
Ranking decision variants by subjective paird comparisons in cases with incomplete data.
PublicationMetoda porównań parami wykorzystywana jest do szeregowania skończonej,zwykle niewielkiej liczby wariantów decyzyjnych. W metodzie tej ekspert lub grupa ekspertów proszona jest o wyrażenie swojej opinii dotyczącej każdej pary wariantów w postaci względnej preferenecji jednego wariantu nad drugim.Zdarza się jednak często, że ekspert nie jest w stanie ocenić pary lub par wiariantów i mamy wtedy do czynienia z sytuacją...
-
Comparison of construction algorithms for minimal, acyclic, deterministicfinite state automata from sets of strings.
PublicationArtykuł porównuje różne metody tworzenia minimalnych, acyklicznych, deterministycznych automatów skończonych ze zbiorów słów. Wdrożone i porównane zostały metody przyrostowe, prawie przyrostowe i nieprzyrostowe.
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublicationProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Remote exception handling for PVM processes.
PublicationArtykuł przedstawia model lokalnej i zdalnej obsługi wyjątków w bibliotece PVM. Działający proces zostaje rozszerzony o możliwość zgłaszania zdalnych wyjątków do procesu nadrzędnego lub otrzymania akcji związanych z obsługą wyjątków. Przedstawiono wzorce obsługi wyjątków w aplikacjach rozproszonych oraz wprowadzono pojęcie Zdalnego Nadzorcy Wyjątków. Nadzorca może kontrolować każdy proces w maszynie wirtualnej (PVM).
-
PVM Web Cluster: integration of PVM clusters using Web services and CORBA.
PublicationProponujemy nową architekturę i jej implementację PVM Web Cluster, która umożliwia łatwe zrównoleglanie wykonania zadań PVM zarówno na geograficznie rozproszone klastry PVM jak i wewnątrz nich. Uruchamianie zadań jest wykonywane poprzez wywołanie usługi sieciowej (Web service), która negocjuje najlepszy klaster (klastry) dla danego zadania i komunikuje się z klastrami za pomocą standardu CORBA.
-
Exception handling model influence factors for discributed systems. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. 5th In- ternational Conference. Częstochowa, 7-10 September 2003.Model obsługi wyjątków uwzględniający wpływ czynników systemu rozproszonego.
PublicationSpecyfikacja programu jest jasno określona w systemach sekwencyjnych, gdzie posiada standardowe i wyjątkowe przejścia. Praca przedstawia rozszerzony model specyfikacji systemu w środowiskach rozproszonych uwzględniający szereg specyficznych czynników. Model zawiera analizę specyfikacji pod kątem obsługi wyjątków dla rozproszonych danych oraz komunikacji międzyprocesorowej. Ogólny model został zaimplementowany w środowisku...
-
Admission control method based on effective delay for flows using EF PHB.
Publication.
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublicationThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
Testing for conformance of parallel programming pattern languages
PublicationThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Automated network control and supervision
PublicationPrzedstawiono ogólne problemy związane z postępem w zakresie integracji systemów informatycznych w elektroenergetyce. Podano zasady budowy struktury systemów sterowania i nadzoru.
-
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublicationWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...
-
Improving flexibility and performance of PVM applications by distributed partial evaluation
PublicationA new framework for developing both flexible and efficient PVM applications is described. We propose Architecture Templates Interface (ATI) that allows to control application granularity and parallelism. To ensure high application efficiency we extend partial evaluation strategy into domain of distributed applications obtaining Distributed Partial Evaluation (DPE). Both ATI and DPE were implemented using a new distributed programming...
-
Optimal linear control theory in power system application
PublicationPrzedstawiono syntezę stabilizatora systemowego przy wykorzystaniu metodyki Hinf. Zaprojektowany regulator umożliwia uzyskanie lepszych rezultatów w porównaniu z regulatorem odniesienia w szerokim zakresie zmian punktu pracy.
-
Task Allocation and Scalability Evaluation for Real-Time Multimedia Processing in a Cluster Envirinment
PublicationAn allocation algorithm for stream processing tasks is proposed (Modified best Fit Descendent, MBFD). A comparison with another solution (BFD) is provided. Tests of the algorithms in an HPC environment are descrobed and the results are presented. A proper scalability metric is proposed and used for the evaluation of the allocation algorithm.
-
The complexity of minimum-length path decompositions
PublicationWe consider a bi-criteria generalization of the pathwidth problem, where, for given integers k, l and a graph G, we ask whether there exists a path decomposition P of G such that the width of P is at most k and the number of bags in P, i.e., the length of P, is at most l. We provide a complete complexity classification of the problem in terms of k and l for general graphs. Contrary to the original pathwidth problem, which is fixed-parameter...
-
Fast Collaborative Graph Exploration
PublicationWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Comparison of induction motor bearing diagnostic test results through vibration and stator current measurement
PublicationThe paper discusses results of tests performed by authors, related to the angine bearings diagnostic using vibration and stator current measurements. The paper contains the description of an automatic measurement system, developed for measurement of those harmonics and processing that to obtain bearing diagnostic information. System was tested on objects with intentionally made defects in bearings, results of this test was also...
-
The Use of Mobile Devices in the Care and Home Monitoring of the Elderly and the Sick
Publication...
-
Gaze pattern lock for elders and disabled
Publication...
-
Emotion Monitor - Concept, Construction and Lessons Learned
PublicationThis paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...
-
Supporting Gastroesophageal Reflux Disease Diagnostics by Using Wavelet Analysis in Esophageal pH-Metry
PublicationThis paper presents a new approach to computer supported esophageal pH-metry measurement analysis performed in order to diagnose gastroesophageal reflux disease. In this approach wavelet analysis was used to analyse the esophageal pH-metry course. The research was performed on three groups of pH-metry courses: whole 24-hour pH-metry course, sleep only pH-metry course and 20 minutes after the end of a meal pH-metry course. After...