Filters
total: 144
filtered: 90
Search results for: computer networks
-
Industrial computer networks and functional safety
PublicationW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Knowledge management in the IPv6 migration process
PublicationThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most obvious. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed an application that supports the migration process. Its main purpose is to help less experienced network administrators to facilitate the migration process with a particular target...
-
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publication -
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Deep learning approach on surface EEG based Brain Computer Interface
PublicationIn this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublicationIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublicationA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublicationRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
A review on computer‐aided chemogenomics and drug repositioning for rational COVID ‐19 drug discovery
PublicationApplication of materials capable of energy harvesting to increase the efficiency and environmental adaptability is sometimes reflected in the ability of discovery of some traces in an environment―either experimentally or computationally―to enlarge practical application window. The emergence of computational methods, particularly computer-aided drug discovery (CADD), provides ample opportunities for the rapid discovery and development...
-
Computer-assisted pronunciation training—Speech synthesis is almost all you need
PublicationThe research community has long studied computer-assisted pronunciation training (CAPT) methods in non-native speech. Researchers focused on studying various model architectures, such as Bayesian networks and deep learning methods, as well as on the analysis of different representations of the speech signal. Despite significant progress in recent years, existing CAPT methods are not able to detect pronunciation errors with high...
-
Towards neural knowledge DNA
PublicationIn this paper, we propose the Neural Knowledge DNA, a framework that tailors the ideas underlying the success of neural networks to the scope of knowledge representation. Knowledge representation is a fundamental field that dedicates to representing information about the world in a form that computer systems can utilize to solve complex tasks. The proposed Neural Knowledge DNA is designed to support discovering, storing, reusing,...
-
Radio Simulcasting at a Glance: a New Look at Broadcasting and Streaming Services
PublicationRadio is by far one of the most popular and accessible medium. With its availability it attracts listeners all around the world. There are numerous ways of delivering content to consumers. The present situation is characterized by the convergence of acoustics, computer science and telecommunications. This paper reviews the current status of radio broadcasting and streaming services. It describes a subjective study concerning different...
-
More Just Measure of Fairness for Sharing Network Resources
PublicationA more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublicationThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Combining Road Network Data from OpenStreetMap with an Authoritative Database
PublicationComputer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...
-
Machine Learning Algorithm-Based Tool and Digital Framework for Substituting Daylight Simulations In Early- Stage Architectural Design Evaluation
PublicationThe aim of this paper is to examine the new method of obtaining the simulation-based results using backpropagation of errors artificial neural networks. The primary motivation to conduct the research was to determine an alternative, more efficient and less timeconsuming method which would serve to achieve the results of daylight simulations. Three daylight metrics: Daylight Factor, Daylight Autonomy and Daylight Glare Probability have...
-
Artificial intelligence support for disease detection in wireless capsule endoscopy images of human large bowel
PublicationIn the work the chosen algorithms of disease recognition in endoscopy images were described and compared for theirs efficiency. The algorithms were estimated with regard to utility for application in computer system's support for digestive system's diagnostics. Estimations were achieved in an advanced testing environment, which was built with use of the large collection of endoscopy movies received from Medical University in Gdańsk....
-
New trends in development of micro heat exchangers for ORC's
PublicationIn the paper, new trends in development of micro heat exchangers for CHP are presented. Main attention is concentrated on the question, how channels size and thermal development lenght affect the heat transfer. New types of micro heat exchangers developed at the Institute of Fluid-Flow Machinery PAS and the methoda of their design are presented. The new experimental testing methods of the micro-channel heat exchangers, new algorithms...
-
The searchlight problem for road networks
PublicationWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublicationWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Sztuczne sieci neuronowe oraz metoda wektorów wspierających w bankowych systemach informatycznych
PublicationW artykule zaprezentowano wybrane metod sztucznej inteligencji do zwiększania efektywności bankowych systemów informatycznych. Wykorzystanie metody wektorów wspierających czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwia znaczący wzrost konkurencyjności banku poprzez dodanie nowych funkcjonalności. W rezultacie możliwe jest także złagodzenie skutków kryzysu finansowego.
-
Optymalizacja treningu i wnioskowania sieci neuronowych
PublicationSieci neuronowe są jedną z najpopularniejszych i najszybciej rozwijających się dziedzin sztucznej inteligencji. Ich praktyczne wykorzystanie umożliwiło szersze użycie komputerów w wielu obszarach komunikacji, przemysłu i transportu. Dowody tego są widoczne w elektronice użytkowej, medycynie, a nawet w zastosowaniach militarnych. Wykorzystanie sztucznej inteligencji w wielu przypadkach wymaga jednak znacznej mocy obliczeniowej,...
-
How Can We Identify Electrophysiological iEEG Activities Associated with Cognitive Functions?
PublicationElectrophysiological activities of the brain are engaged in its various functions and give rise to a wide spectrum of low and high frequency oscillations in the intracranial EEG (iEEG) signals, commonly known as the brain waves. The iEEG spectral activities are distributed across networks of cortical and subcortical areas arranged into hierarchical processing streams. It remains a major challenge to identify these activities in...
-
JAKOŚĆ USŁUG W ARCHITEKTURZE SIECI ASON/GMPLS A MECHANIZMY REZERWACJI ZASOBÓW
PublicationW artykule przedstawiono mechanizmy rezerwacji zasobów w architekturze sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie siecią z gwarancją jakości usług. W artykule porównano dwa mechanizmy rezerwacji zasobów z gwarancją jakości i podejściem typu POOL. Efektywność prezentowanych mechanizmów zweryfikowano metodą symulacji komputerowej w środowisku OMNeT++.
-
Metody sztucznej inteligencji do wspomagania bankowych systemów informatycznych
PublicationW pracy opisano zastosowania nowoczesnych metod sztucznej inteligencji do wspomagania bankowych systemów informatycznych. Wykorzystanie w systemach informatycznych algorytmów ewolucyjnych, harmonicznych, czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwiają zasadniczy wzrost konkurencyjności banku. Dlatego w pracy omówiono wybrane zastosowania bankowe ze szczególnym uwzględnieniem zbliżeniowych...
-
Sterowanie optyczną siecią wielodomenową z hierarchiczną strukturą płaszczyzn sterowania
PublicationW artykule przedstawiono problem sterowania wielodomenową siecią optyczną z hierarchiczną strukturą płaszczyzn sterowania. Autorzy proponują wykorzystanie koncepcji sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie wielodomenową siecią z gwarancją jakości usług. W artykule zaproponowano algorytm sterowania z gwarancją jakości, którego efektywność zweryfikowano metodą symulacji...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublicationThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Deep Features Class Activation Map for Thermal Face Detection and Tracking
PublicationRecently, capabilities of many computer vision tasks have significantly improved due to advances in Convolutional Neural Networks. In our research, we demonstrate that it can be also used for face detection from low resolution thermal images, acquired with a portable camera. The physical size of the camera used in our research allows for embedding it in a wearable device or indoor remote monitoring solution for elderly and disabled...
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
DIAGNOSIS OF MALIGNANT MELANOMA BY NEURAL NETWORK ENSEMBLE-BASED SYSTEM UTILISING HAND-CRAFTED SKIN LESION FEATURES
PublicationMalignant melanomas are the most deadly type of skin cancer but detected early have high chances for successful treatment. In the last twenty years, the interest of automated melanoma recognition detection and classification dynamically increased partially because of public datasets appearing with dermatoscopic images of skin lesions. Automated computer-aided skin cancer detection in dermatoscopic images is a very challenging task...
-
Interval wavelength assignment in all-optical star networks
PublicationArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Hydrauliczna wiarygodność wyników pomiarów terenowych stosowanych do identyfikacji oporności hydraulicznej przewymiarowanych sieci wodociągowych
PublicationPublikacja zawiera zalecenia metodyczne dotyczące identyfikacji oporności hydraulicznej w przewymiarowanych sieciach wodociągowych na tle spotykanych nieprawidłowości. Krytycznie oceniono wyniki pomiarów terenowych, które zastosowano do tarowania komputerowych modeli przepływów (KMP) pomimo, że nie spełniały kryterium hydraulicznej wiarygodności. Ponadto zaproponowano spadek hydrauliczny jako obiektywny wskaźnik wiarygodności pomiarów,...
-
Diagnosis of damages in family buildings using neural networks
PublicationThe article concerns a problem of damages in family buildings, which result from traffic-induced vibrations. These vibrations arise from various causes and their size is influenced by many factors. The most important is the type of a road, type and weight of vehicles that run on the road, type and condition of the road surface, the distance from the house to the source of vibrations and many others which should be taken into account....
-
Initial Investigation of Wave Interactions During Simultaneous Valve Closures in Hydraulic Piping Systems
PublicationThe effects of interference of pressure waves in simple piping systems were studied. A freeware computer code Allievi developed at the University of Valencia was used to simulate dynamic waveforms in simple and complex networks. The tests were carried out according to three scenarios. No pressure increases significantly exceeding the Joukowsky pressure in simple cases were noticed. When the effects of the simultaneous closing of...
-
Optimization issues in distributed computing systems design
PublicationIn recent years, we observe a growing interest focused on distributed computing systems. Both industry and academia require increasing computational power to process and analyze large amount of data, including significant areas like analysis of medical data, earthquake, or weather forecast. Since distributed computing systems – similar to computer networks – are vulnerable to failures, survivability mechanisms are indispensable...
-
Computed aided system for separation and classification of the abnormal erythrocytes in human blood
PublicationThe human peripheral blood consists of cells (red cells, white cells, and platelets) suspended in plasma. In the following research the team assessed an influence of nanodiamond particles on blood elements over various periods of time. The material used in the study consisted of samples taken from ten healthy humans of various age, different blood types and both sexes. The markings were leaded by adding to the blood unmodified...
-
Music information retrieval—The impact of technology, crowdsourcing, big data, and the cloud in art.
PublicationThe exponential growth of computer processing power, cloud data storage, and crowdsourcing model of gathering data bring new possibilities to music information retrieval (mir) field. Mir is no longer music content retrieval only; the area also comprises the discovery of expressing feelings and emotions contained in music, incorporating other than hearing modalities for helping this issue, users’ profiling, merging music with social...
-
University Students’ Research on Artificial Intelligence and Knowledge Management. A Review and Report of Multi-case Studies
PublicationLeading technologies are very attractive for students preparing their theses as the completion of their studies. Such an orientation of students connected with professional experiences seems to be a crucial motivator in the research in the management and business areas where these technologies condition the development of professional activities. The goal of the paper is the analysis of students’ thesis topics defended in the last...
-
Analyzing the Effectiveness of the Brain–Computer Interface for Task Discerning Based on Machine Learning
PublicationThe aim of the study is to compare electroencephalographic (EEG) signal feature extraction methods in the context of the effectiveness of the classification of brain activities. For classification, electroencephalographic signals were obtained using an EEG device from 17 subjects in three mental states (relaxation, excitation, and solving logical task). Blind source separation employing independent component analysis (ICA) was...
-
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
-
Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks
PublicationRendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...
-
Adaptive prediction of stock exchange indices by state space wavelet networks
PublicationThe paper considers the forecasting of the Warsaw Stock Exchange price index WIG20 by applying a state space wavelet network model of the index price. The approach can be applied to the development of tools for predicting changes of other economic indicators, especially stock exchange indices. The paper presents a general state space wavelet network model and the underlying principles. The model is applied to produce one session...
-
A Highly Scalable, Modular Architecture for Computer Aided Assessment e-Learning Systems
PublicationIn this chapter, the authors propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. The authors' research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge...
-
Artificial Intelligence Aided Architectural Design
PublicationTools and methods used by architects always had an impact on the way building were designed. With the change in design methods and new approaches towards creation process, they became more than ever before crucial elements of the creation process. The automation of architects work has started with computational functions that were introduced to traditional computer-aided design tools. Nowadays architects tend to use specified tools...
-
Analysis of the Capability of Deep Learning Algorithms for EEG-based Brain-Computer Interface Implementation
PublicationMachine learning models have received significant attention for their exceptional performance in classifying electroencephalography (EEG) data. They have proven to be highly effective in extracting intricate patterns and features from the raw signal data, thereby contributing to their success in EEG classification tasks. In this study, we explore the possibilities of utilizing contemporary machine learning algorithms in decoding...
-
AUTOMATYCZNA KLASYFIKACJA MOWY PATOLOGICZNEJ
PublicationAplikacja przedstawiona w niniejszym rozdziale służy do automatycznego wykrywania mowy patologicznej na podstawie bazy nagrań. W pierwszej kolejności przedstawiono założenia leżące u podstaw przeprowadzonych badan wraz z wyborem bazy mowy patologicznej. Zaprezentowano również zastosowane algorytmy oraz cechy sygnału mowy, które pozwalają odróżnić mowę niezaburzoną od mowy patologicznej. Wytrenowane sieci neuronowe zostały następnie...
-
Large-scale multimedia content delivery over optical networks for interactive TV services
Publication -
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublicationInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
A novel genetic approach to provide differentiated levels of service resilience in IP-MPLS/WDM networks
PublicationThis paper introduces a novel class-based method of survivable routing for connection-oriented IP-MPLS/WDM networks, called MLS-GEN-H. The algorithm is designed to provide differentiated levels of service survivability in order to respond to varying requirements of end-users. It divides the complex problem of survivable routing in IP-MPLS/WDM networks into two subproblems, one for each network layer, which enables finding the...
-
Using Convolutional Neural Networks for Corneal Arcus Detection Towards Familial Hypercholesterolemia Screening
PublicationFamilial hypercholesterolemia (FH) is a highly undiagnosed disease. Among FH patients, the onset of premature coronary artery disease is 13 times higher than in the general population. Early diagnosis and treatment is essential to prevent cardiovascular diseases and their complications, and to prolong life. One of the clinical criteria of FH is the occurrence of a corneal arcus (CA) among patients, especially those under 45 years...
-
Robust and Efficient Machine Learning Algorithms for Visual Recognition
PublicationIn visual recognition, the task is to identify and localize all objects of interest in the input image. With the ubiquitous presence of visual data in modern days, the role of object recognition algorithms is becoming more significant than ever and ranges from autonomous driving to computer-aided diagnosis in medicine. Current models for visual recognition are dominated by models based on Convolutional Neural Networks (CNNs), which...
-
Set membership estimation of parameters and variables in dynamic networks by recursive algorithms with moving measurment window
PublicationW artykule rozważana jest łączna estymacja przedziałowa zmiennych i parametrów w złożonej sieci dynamicznej w oparciu niepewne modele parametryczne i ograniczoną liczbę pomiarów. Opracowany został rekursywny algorytm estymacji z przesuwnym oknem pomiarowym, odpowiedni dla monitorowania sieci on-line. Okno pomiarowe pozwala na stabilizowanie klasycznego algorytmu rekurencyjnego estymacji i znacznie poprawienie obcisłości estymat....
-
BETWEEN IDEA AND INTERPRETATION - DESIGN PROCESS AUGMENTATION
PublicationThe following paper investigates the idea of reducing the human digital intervention to a minimum during the advanced design process. Augmenting the outcome attributes beyond the designer's capabilities by computational design methods, data collection, data computing and digital fabrication, altogether imitating the human design process. The primary technical goal of the research was verification of restrictions and abilities used...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublicationProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
Vehicle detector training with minimal supervision
PublicationRecently many efficient object detectors based on convolutional neural networks (CNN) have been developed and they achieved impressive performance on many computer vision tasks. However, in order to achieve practical results, CNNs require really large annotated datasets for training. While many such databases are available, many of them can only be used for research purposes. Also some problems exist where such datasets are not...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublicationThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Przygotowanie, realizacja i ocena pomiarów terenowych do identyfikacji oporności hydraulicznej sieci wodociągowej
PublicationW procesie tworzenia komputerowego modelu przepływów (KMP) jednym z wiodących zadań jest przygotowanie i realizacja pomiarów terenowych w celu identyfikacji oporności hydraulicznej czynnej sieci wodociągowej. Motywacją autora do przedstawienia zasad postępowania w tym zakresie jest narastająca niefrasobliwość twórców KMP, którzy w nieuprawniony sposób używają paramodeli do rozwiązywania problemów inżynierskich. W pracy zdefiniowano...
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
The Backbone Coloring Problem for Small Graphs
PublicationIn this paper we investigate the values of the backbone chromatic number, derived from a mathematical model for the problem of minimization of bandwidth in radio networks, for small connected graphs and connected backbones (up to 7 vertices). We study the relationship of this parameter with the structure of the graph and compare the results with the solutions obtained using the classical graph coloring algorithms (LF, IS), modified...
-
On-Line Partitioning for On-Line Scheduling with Resource Conflicts
PublicationWithin this paper, we consider the problem of on-line partitioning the sequence of jobs which are competing for non-sharable resources. As a result of partitioning we get the subsets of jobs that form separate instances of the on-line scheduling problem. The objective is to generate a partition into the minimum number of instances such that the response time of any job in each instance is bounded by a given constant. Our research...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublicationThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
MobileNet family tailored for Raspberry Pi
PublicationWith the advances in systems-on-a-chip technologies, there is a growing demand to deploy intelligent vision systems on low-cost microcomputers. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity of contemporary convolutional neural networks (CNNs). The state-of-the-art lightweight CNN is MobileNetV3. However, it was designed to achieve a good trade-off between...
-
Integrating Experience-Based Knowledge Representation and Machine Learning for Efficient Virtual Engineering Object Performance
PublicationMachine learning and Artificial Intelligence have grown significant attention from industry and academia during the past decade. The key reason behind interest is such technologies capabilities to revolutionize human life since they seamlessly integrate classical networks, networked objects and people to create more efficient environments. In this paper, the Knowledge Representation technique of Set of Experience...
-
How to Sort Them? A Network for LEGO Bricks Classification
PublicationLEGO bricks are highly popular due to the ability to build almost any type of creation. This is possible thanks to availability of multiple shapes and colors of the bricks. For the smooth build process the bricks need to properly sorted and arranged. In our work we aim at creating an automated LEGO bricks sorter. With over 3700 different LEGO parts bricks classification has to be done with deep neural networks. The question arises...
-
Efficiency comparison of selected endoscopic video analysis algorithms
PublicationIn the paper, selected image analysis algorithms were examined and compared in the task of identifying informative frames, blurry frames, colorectal cancer and healthy tissue on endoscopic videos. In order to standardize the tests, the algorithms were modified by removing from them parts responsible for the classification, and replacing them with Support Vector Machines and Artificial Neural Networks. The tests were performed in...
-
Collaborative Data Acquisition and Learning Support
PublicationWith the constant development of neural networks, traditional algorithms relying on data structures lose their significance as more and more solutions are using AI rather than traditional algorithms. This in turn requires a lot of correctly annotated and informative data samples. In this paper, we propose a crowdsourcing based approach for data acquisition and tagging with support for Active Learning where the system acts as an...
-
Systematic Literature Review for Emotion Recognition from EEG Signals
PublicationResearchers have recently become increasingly interested in recognizing emotions from electroencephalogram (EEG) signals and many studies utilizing different approaches have been conducted in this field. For the purposes of this work, we performed a systematic literature review including over 40 articles in order to identify the best set of methods for the emotion recognition problem. Our work collects information about the most...
-
Benchmarking Deep Neural Network Training Using Multi- and Many-Core Processors
PublicationIn the paper we provide thorough benchmarking of deep neural network (DNN) training on modern multi- and many-core Intel processors in order to assess performance differences for various deep learning as well as parallel computing parameters. We present performance of DNN training for Alexnet, Googlenet, Googlenet_v2 as well as Resnet_50 for various engines used by the deep learning framework, for various batch sizes. Furthermore,...
-
Chained machine learning model for predicting load capacity and ductility of steel fiber–reinforced concrete beams
PublicationOne of the main issues associated with steel fiber–reinforced concrete (SFRC) beams is the ability to anticipate their flexural response. With a comprehensive grid search, several stacked models (i.e., chained, parallel) consisting of various machine learning (ML) algorithms and artificial neural networks (ANNs) were developed to predict the flexural response of SFRC beams. The flexural performance of SFRC beams under bending was...
-
MACHINE LEARNING–BASED ANALYSIS OF ENGLISH LATERAL ALLOPHONES
PublicationAutomatic classification methods, such as artificial neural networks (ANNs), the k-nearest neighbor (kNN) and selforganizing maps (SOMs), are applied to allophone analysis based on recorded speech. A list of 650 words was created for that purpose, containing positionally and/or contextually conditioned allophones. For each word, a group of 16 native and non-native speakers were audio-video recorded, from which seven native speakers’...
-
Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies
PublicationCyber Physical Systems and Internet of Things have grown significant attention from industry and academia during the past decade. The main reason behind this interest is the capabilities of such technologies to revolutionize human life since they appear as seamlessly integrating classical networks, networked objects and people to create more efficient environments. However, enhancing these technologies with intelligent skills becomes...
-
Dynamic GPU power capping with online performance tracing for energy efficient GPU computing using DEPO tool
PublicationGPU accelerators have become essential to the recent advance in computational power of high- performance computing (HPC) systems. Current HPC systems’ reaching an approximately 20–30 mega-watt power demand has resulted in increasing CO2 emissions, energy costs and necessitate increasingly complex cooling systems. This is a very real challenge. To address this, new mechanisms of software power control could be employed. In this...
-
Non-Satellite Broadband Maritime Communications for e-Navigation Services
PublicationThe development of broadband network access technologies available to users on land has triggered a rapid expansion of a diverse range of services provided by terrestrial networks. However, due to limitations of digital communication technologies in the off-shore area, the maritime ICT systems evolution so far has not followed that trend. Despite the e-navigation initiative defining the set of Maritime Services, the progress in...