Search results for: RANDOM BIPARTITE GRAPHS
-
Model of noise sources in supercapacitors
PublicationThe paper presents detailed model of noise sources in supercapacitors. Noise phenomena observed in supercapacitors may be used as a diagnostic tool for assessment of supercapacitor quality or degradation mechanisms (e.g. corrosion of the electrodes or cloggin g up the pores) during ageing. Therefore, it is important to consider where noise is generated. The equivalent circuit of noise sources existing...
-
Wpływ imperfekcji geometrycznych na bezpieczeństwo montażu i naprawy zbiorników cylindrycznych metoda podbudowy
PublicationW pracy zajęto się wyznaczeniem nośności granicznej zbiorników stalowych o osi pionowej montowanych lub naprawianych z zastosowaniem hydraulicznego systemu podnoszenia konstrukcji. Podniesiony zbiornik jest szczególnie narażony na utratę stateczności, a obciążenie wiatrem utrudnia prowadzenie prac. Jakiekolwiek deformacje blach, szczególnie w pobliżu zamocowań podnośników mogą w znacznym stopniu obniżyć obciążenie krytyczne konstrukcji....
-
Malignant neoplasm of unspecified ovary - Female, 66 - Tissue image [9020730024813501]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Probabilistic analysis of settlements under a pile foundation of a road bridge pylon
PublicationThe paper addresses the reliability change of a road bridge pile foundation due to the unpredictable increase of settlements in time. The analysis is based on the Rędziński Bridge in Wrocław, Poland, its design assumptions, and monitoring results. The bridge foundation rests on a multi-layered subsoil assumed random. The Finite Element model of the subgrade is generated in ZSoil® software. To simplify the probabilistic approach,...
-
Quantumness in Diagnostics of Marine Internal Combustion Engines and Other Ship Power Plant Machines
PublicationThe article provides proof that the diagnostics of marine internal combustion engines and other ship power plant machines should take into account the randomness and unpredictability of certain events, such as wear, damage, the variations of mechanical and thermal loads, etc., which take place during machine operation. In the article, the energy E, like the other forms (methods) that it can be converted into (heat and work), is...
-
Investigation method of large-volume tire with mobile test rig
PublicationThe goal of this research is to develop the tire test method and mobile tire test rig. The test rig enables measurement of tire properties as stiffness and viscous damping in vertical direction, and tire–ground characteristics on the asphalt rigid surface. The tire-ground characteristics are measured by force and a torque measurement hub. The design, calibration and the algorithm for calculating the forces in the wheel center are...
-
PTD4 Peptide Increases Neural Viability in an In Vitro Model of Acute Ischemic Stroke
PublicationIschemic stroke is a disturbance in cerebral blood flow caused by brain tissue ischemia and hypoxia. We optimized a multifactorial in vitro model of acute ischemic stroke using rat primary neural cultures. This model was exploited to investigate the pro-viable activity of cell-penetrating peptides: arginine-rich Tat(49–57)-NH2 (R49KKRRQRRR57-amide) and its less basic analogue, PTD4 (Y47ARAAARQARA57-amide). Our model included glucose...
-
Malignant neoplasm of unspecified ovary - Female, 66 - Tissue image [9020730024814211]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant neoplasm of unspecified ovary - Female, 66 - Tissue image [902073002481261]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Video of LEGO bricks on conveyor belt - Tiles with studs
Open Research DataThe set contains videos of LEGO bricks (tiles with studs) moving on a white conveyor belt. The videos were prepared for training neural network for recognition of LEGO bricks. The bricks were separated as much as possible and in most cases they should not overlap. The images were taken from different sides by stationary camera located over the final...
-
Video of LEGO bricks on conveyor belt - Tiles and panels
Open Research DataThe set contains videos of LEGO bricks (tiles, panels, etc.) moving on a white conveyor belt. The videos were prepared for training neural network for recognition of LEGO bricks. The bricks were separated as much as possible and in most cases they should not overlap. The images were taken from different sides by stationary camera located over the final...
-
Video of LEGO bricks on conveyor belt - Bricks with studs on the side
Open Research DataThe set contains videos of LEGO bricks (bricks with studs on the side) moving on a white conveyor belt. The videos were prepared for training neural network for recognition of LEGO bricks. The bricks were separated as much as possible and in most cases they should not overlap. The images were taken from different sides by stationary camera located over...
-
Video of LEGO bricks on conveyor belt - Plates with studs on the side
Open Research DataThe set contains videos of LEGO bricks (plates with studs on the side) moving on a white conveyor belt. The videos were prepared for training neural network for recognition of LEGO bricks. The bricks were separated as much as possible and in most cases they should not overlap. The images were taken from different sides by stationary camera located over...
-
Reliability-Based Stability Analysis of a Baltic Cliff by the Combined Response Surface Method
PublicationA simple, straightforward computational procedure was proposed, incorporating the Response Surface Method (RSM) linked with the standard Monte Carlo (MC) simulation method and the Point Estimate Method (PEM). PEM samples make it possible to analyse the sensitivity of the cliff’s stability to variation in subsoil parameters and to reduce the number of random variables of the problem. The proposed methods were tested in two cases:...
-
Tailoring the electrochemical degradation of iron protected with polypyrrole films for biodegradable cardiovascular stents
PublicationThe degradation of polypyrrole (PPy) coated iron is studied in phosphate buffer saline solution at 37 °C by odd random phase multisine electrochemical impedance spectroscopy (ORP-EIS). PPy is electropolymerized with anti-inflammatory salicylates incorporated in the film, as a drug release system. The modelling of EIS over time provides the quantitative description of the corrosion behaviour of the material. Thus, the reliable...
-
A method for testing the wide-sense stationary uncorrelated scattering assumption fulfillment for an underwater acoustic channel
PublicationWide-sense stationary and uncorrelated scattering (WSSUS) assumptions are often applied for the statistical description of wireless communication channels. However, in the case of underwater acoustic channels the WSSUS model is of limited value. The degree of similarity of in-phase and quadrature components of the channel impulse response, measured with the use of bandpass modulated signals, can be used as an indicator of WSSUS...
-
Impact of Initial Population on Evolutionary Path Planning Algorithm
PublicationIn this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal shippaths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....
-
Decoherence-free communication over multiaccess quantum channels
PublicationIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
Influence of image transformations and quality degradations on SURF detector efficiency
PublicationA method for task-oriented examination of SURF keypoint detector accuracy is presented in the paper. It consists of generating test images, based on a given exemplar, processed by affine transformations: random rotation and scaling, and varying degree of degradations: darkening, blurring, noising, and compression. Details of applied degradation procedure are presented, followed by essentials of SURF-based images matching. A distance...
-
Influence of Operation Conditions on Temperature Hazard of Lithium-Iron-Phosphate (LiFePO4) Cells
PublicationThe article presents and discusses the results of research on hazard, especially temperature, for selected lithium-ion-phosphate cells operated in accordance with the manufacturer’s recommendations but used under onerous mining conditions. This applies to the performance of cells in battery sets without the application of any management system (BMS). On the basis of the obtained test results, first of all, the influence of the...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
The complexity of bicriteria tree-depth
PublicationThe tree-depth problem can be seen as finding an elimination tree of minimum height for a given input graph G. We introduce a bicriteria generalization in which additionally the width of the elimination tree needs to be bounded by some input integer b. We are interested in the case when G is the line graph of a tree, proving that the problem is NP-hard and obtaining a polynomial-time additive 2b-approximation algorithm. This particular...
-
Hybrid Processing by Turning and Burnishing of Machine Components
PublicationThe paper presents a method of hybrid manufacturing process of long 5 shafts and deep holes by simultaneous turning and burnishing method. The tech- 6 nological results of the research focus on the influence of the basic technological 7 parameters of this process on the surface roughness of piston rods of hydraulic 8 cylinders. Research results are presented in the graphs as well as mathematical 9 formula. Set of samples were made...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...
-
Estimators of covariance matrices in Msplit(q) estimation
PublicationThis paper proposes methods for the determination of covariance matrices of Msplit(q) estimators. The solutions presented here allow Msplit(q) estimation to be supplemented by the operations from the domain of accuracy analysis (especially that concerning estimators of parameters). Theoretical forms of covariance matrices of Msplit(q) estimators were established using the empirical influence functions and the equivalent covariance...
-
Simplified probabilistic analysis of settlement of cyclically loaded soil stratum using point estimate method
PublicationThe paper deals with the probabilistic analysis of settlement of a non-cohesive soil layer subjected to cyclic loading. Originally, the settlement assessment is based on deterministic compaction model which requires integration of a set of differential equations. However, making use of the Bessel functions the settlement of the soil stratum can be calculated by means of simplified algorithm. The compaction model parameters were...
-
Regression points in non-intrusive polynomial chaos expansion method and D-optimal design
PublicationThe paper addresses selected issues of uncertainty quantification in the modelling of a system containing surgical mesh used in ventral hernia repair. Uncertainties in the models occur e.g. due to variability of abdominal wall properties among others. In order to include them, a non-intrusive regression-based polynomial chaos expansion method is employed. Its accuracy depends on the choice of regression points. In the study a relation...
-
Subsoil degradation effect in reliability analysis of the jack-up platform structure
PublicationStructural reliability analysis is considered, by FORM and SORM applied to a certain idealized soil-platform structure interaction problem due to cyclic water wave and wind loads. Wave and wind loads are random variables, whereas dead load is deterministic. Load parameters are typical for storm conditions in the Baltic Sea. The soil-structure interaction is idealized as a set of linear translational and rotational springs. Due...
-
Impact of Initial Population on Evolutionary Path Planning Algorithm
PublicationIn this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....
-
Calculation of an ultimate load value of a silo with geometric imperfections in the shape of eigenforms
PublicationThe ultimate load value of a silo with initial geometric imperfections was measured. The structure was loaded with wind. Imperfections were assumed as translations of the shell nodes from perfect geometry taken from eigenforms and their combinations. Two variants of the maximum deflection placement with respect to the direction of wind pressure were proposed. The first consists in applying the maximum wind pressure to the element...
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publicationgenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...
-
Extraction of information from born-digital PDF documents for reproducible research
PublicationBorn-digital PDF electronic documents might reasonably be expected to preserve useful data units of their source originals that suffice to produce executable papers for reproducible research. Unfortunately, developers of authoring tools may adopt arbitrary PDF generation strategies, producing a plethora of internal data representations. Such common information units as text paragraphs, tables, function graphs and flow diagrams,...
-
Security aspects in functional safety analysis
PublicationA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Isolation Number versus Domination Number of Trees
PublicationIf G=(VG,EG) is a graph of order n, we call S⊆VG an isolating set if the graph induced by VG−NG[S] contains no edges. The minimum cardinality of an isolating set of G is called the isolation number of G, and it is denoted by ι(G). It is known that ι(G)≤n3 and the bound is sharp. A subset S⊆VG is called dominating in G if NG[S]=VG. The minimum cardinality of a dominating set of G is the domination number, and it is denoted by γ(G)....
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
DESIGN OF THE DUAL CONSTELLATION GPS/GALILEO MOBILE DEVICE FOR IMPROVING NAVIGATION OF THE VISUALLY IMPAIRED IN AN URBAN AREA, POLISH MARITIME RESEARCH
PublicationThe article discusses damages of essential tribological associations in crankshaft and piston systems of large power two-stroke engines used as main engines, which take place during transport tasks performed by those ships. Difficulties are named which make preventing those damages impossible, despite the fact that the technical state of engines of this type is identified with the aid of complex diagnostic systems making use of...
-
IDENTIFICATION OF DAMAGES OF TRIBOLOGICAL ASSOCIATIONS IN CRANKSHAFT AND PISTON SYSTEMS OF TWO-STROKE INTERNAL COMBUSTION ENGINES USED AS MAIN PROPULSION IN SEA-GOING VESSELS AND PROPOSAL OF PROBABILISTIC DESCRIPTION OF LOADS AS CAUSES OF THESE DAMAGES
PublicationThe article discusses damages of essential tribological associations in crankshaft and piston systems of large power two-stroke engines used as main engines, which take place during transport tasks performed by those ships. Difficulties are named which make preventing those damages impossible, despite the fact that the technical state of engines of this type is identified with the aid of complex diagnostic systems making use of...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Adenocarcinoma, NOS - Female, 55 - Tissue image [9140730014143241]
Open Research DataThis is the histopathological image of BRONCHUS AND LUNG tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Adenocarcinoma, NOS - Female, 55 - Tissue image [9140730014133511]
Open Research DataThis is the histopathological image of BRONCHUS AND LUNG tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Nontoxic multinodular goitre - Female, 55 - Tissue image [9140730014138351]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Safety of erection and repair of steel tanks with geometric imperfections using heavylift jack-up system
PublicationSafety analysis is performed of cylindrical vertical steel tanks during erection using heavylift jack up system. During an assembly or repair process a set of hydraulic supports is used. It allows to use the in-place lifting of heavy steel constructions on the required height. Wind can strongly influence stability of the lifted tank. Any geometric imperfections can reduce the critical or limit load. In the work failures of the...
-
Relationship between semi- and fully-device-independent protocols
PublicationWe study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent...
-
Generalized adaptive comb filters/smoothers and their application to the identification of quasi-periodically varying systems and signals
PublicationThe problem of both causal and noncausal identification of linear stochastic systems with quasiharmonically varying parameters is considered. The quasi-harmonic description allows one to model nonsinusoidal quasi-periodic parameter changes. The proposed identification algorithms are called generalized adaptive comb filters/smoothers because in the special signal case they reduce down to adaptive comb algorithms used to enhance...
-
Wpływ wybranych parametrów środowiska na przebieg degradacji rur okładzinowych ze stali P110
PublicationMateriały używane na orurowanie odwiertów w poszukiwaniu i wydobyciu ropy i gazu poddawane są niekorzystnym warunkom eksploatacji takich jak: podwyższona temperatura, wysokie ciśnienie, turbulentny przepływ korozyjnych cieczy z zawieszonymi cząstkami stałymi. Jednym z gatunków stali używanych do produkcji rur okładzinowych jest stal P110 (za normą API 5CT) będąca stalą średnio-węglową, niskostopową o wysokiej wytrzymałości. Celem...
-
Application of genetic algorithms in graph searching problem
PublicationGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Searching by heterogeneous agents
PublicationIn this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs: once a search strategy initially assigns labels to the searchers, each searcher can be only present on an edge of its own label. We prove that this problem is not monotone even for trees and we give instances...