displaying 1000 best results Help
Search results for: GESTURE%20RECOGNITION
-
Hybrid Algorithm to Protect Java’s Code from Reverse Engineering
Publication -
Supercomputing Grid-Based Services for Hearing Protection and Acoustical Urban Planning, Research and Education
PublicationSpecific computational environments, so-called domain grids, are developed within the PLGrid Plus project in order to prepare specialized IT solutions, i.e., dedicated software implementations and hardware (infrastructure adaptation), suited for particular research group demands. One of the PLGrid Plus domain grids, presented in this paper, is Acoustics. The article describes in detail two kinds of the acoustic domain services....
-
Computer-Supported Polysensory Integration Technology for Educationally Handicapped Pupils
PublicationIn this paper, a multimedia system providing technology for hearing and visual attention stimulation is shortly presented. The system aims to support the development of educationally handicapped pupils. The system has been presented in the context of its configuration, architecture, and therapeutic exercise implementation issues. Results of pupils’ improvements after 8 weeks of training with the system are also provided. Training...
-
Fast Collaborative Graph Exploration
PublicationWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Big Data Paradigm Developed in Volunteer Grid System with Genetic Programming Scheduler
PublicationArtificial intelligence techniques are capable to handle a large amount of information collected over the web. In this paper, big data paradigm has been studied in volunteer and grid system called Comcute that is optimized by a genetic programming scheduler. This scheduler can optimize load balancing and resource cost. Genetic programming optimizer has been applied for finding the Pareto solu-tions. Finally, some results from numerical...
-
Object serialization and remote exception pattern for distributed C++/MPI application
PublicationMPI is commonly used standard in development of scientific applications. It focuses on interlanguage operability and is not very well object oriented. The paper proposes a general pattern enabling design of distributed and object oriented applications. It also presents its sample implementations and performance tests.
-
Increasing the Efficiency of Ontology Alignment by Tracking Changes in Ontology Evolution
PublicationIn this paper we present a development of our ontology alignment framework based on varying semantics of attributes. Emphasising the analysis of explicitly given descriptions of how attributes change meanings they entail while being included within different concepts have been proved useful. Moreover, we claim that it is consistent with the intuitive way how people see the real world and how they find similarities and correspondences...
-
Terminological and Assertional Queries in KQL Knowledge Access Language
PublicationOne of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...
-
Interactive cognitive-behavioural decision making system
PublicationPraca przedstawia wyniki przekształcenia modelu psychologicznego człowieka w interaktywny, poznawczo-behawioralny, system podejmowania decyzji, uwarunkowany zarówno środowiskowo, jak i ze względu na stany spełnienia założonych potrzeb. Model ludzkiej psychologii oparty jest na psychologii poznawczej i psychologii osobowości. Zawiera on emocje, potrzeby i struktury ludzkich procesów poznawczych. Opracowany model i sposób realizacji...
-
Smaller Representation of Finite State Automata
PublicationThis paper is a follow-up to Jan Daciuk's experiments on space-effcient finite state automata representation that can be used directly for traversals in main memory. We investigate several techniques of reducing memory footprint of minimal automata, mainly exploiting the fact that transition labels and transition pointer offset values are not evenly distributed and so are suitable for compression. We achieve a gain of around 20-30%...
-
Decisional DNA applied to digital TV
PublicationPrzedstawiono nowoczesną koncepcje integracji decyzyjnego DNA z telewizją cyfrową w celu pozyskiwania wiedzy o oglądalności poszczególnych programów.
-
Decisional DNA digitral TV: concept and initial experiments
PublicationPrzedstawiono pierwsze wyniki eksperymentalnej integracji telewizji cyfrowej z decyzyjnym DNA reprezentujacym wiedze o odbiorcy programow.
-
Application of decisional DNA in web data mining
PublicationPrzedstawiono pilotową koncepcję i aplikację integracji reprezentacji wiedzy opartej na decyzyjnym DNA oraz systemów pozyskiwania wiedzy i danych z Internetu. Wskazano na zalety proponowanej integracji oraz przedstawiono kierunki przyszłych badań w tym zakresie.
-
Knowledge Management Challenges in Collaborative Design of a Virtual Call Centre
PublicationThis paper presents the analysis of knowledge management issues for an user interface consulting project relevant during the development of a Virtual Call Centre. Experiences gathered by the team of designers and team of usability consultants have been described and evaluated from the knowledge management viewpoint. A concept of a knowledge-based system, potentially supporting usability consulting in subsequent IT projects has...
-
IT Business Standards as an Ontology Domain
PublicationThe aim of this paper is to report a selection of Semantic Web aspects pertaining to ontology development activities in the domain of the IT business standard (TOGAF 9) such as formulating competency questions, conceptualization of the domain, resolution of the source knowledge deficiency and applying common design patterns in the OWL formalization. Authors also try to determine target groups that may benefit from such ontology...
-
The role and concept of sub-models in the smart fuzzy model of the internet mortgage market
PublicationThe paper introduces some challenges of the fast growing mortgage market in Poland. One of these challenges is the need for a model development that could be used for various predictions related to this market. At the current stage of the model evelopment process our main goal is to propose and introduce sub-models the role of which would be to describe three different economic environments: stable, fast growing, and recession....
-
Kernel PCA in Application to Leakage Detection in Drinking Water Distribution System
PublicationMonitoring plays an important role in advanced control of complex dynamic systems. Precise information about system's behaviour, including faults detection, enables efficient control. Proposed method- Kernel Principal Component Analysis (KPCA), a representative of machine learning, skilfully takes full advantage of the well known PCA method and extends its application to nonlinear case. The paper explains the general idea of KPCA...
-
Measurement of the Development of a Learning IT Organization Supported by a Model of Knowledge Acquisition and Processing
PublicationThe paper presents a model of knowledge acquisition and processing for the development of learning organizations. The theory of a learning organization provides neither metrics nor tools to measure its development The authors' studies in this field are based on their experience gathered after projects realized in real IT organizations. The authors have described the construction of the model and the methods of its verification...
-
A concept for comprehensive knowledge management system
PublicationPrzedstawiono kluczowe elementy koncepji uogólnionego modelu zarządzania wiedzą w oparciu o przepływy pracy w procesowym widzeniu organizacji.
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...
-
A novel genetic approach to provide differentiated levels of service resilience in IP-MPLS/WDM networks
PublicationThis paper introduces a novel class-based method of survivable routing for connection-oriented IP-MPLS/WDM networks, called MLS-GEN-H. The algorithm is designed to provide differentiated levels of service survivability in order to respond to varying requirements of end-users. It divides the complex problem of survivable routing in IP-MPLS/WDM networks into two subproblems, one for each network layer, which enables finding the...
-
Conceptual fuzzy model of the polish internet mortgage market
PublicationThe aim of this paper is to present the conceptual structure of basic fuzzy model representing Polish Internet mortgage market. The paper starts with introduction describing the market complexities and challenges, and description of previously created rule based model. Then the steps of the process of proposed model fuzzyfication are presented. Final part of the paper consists of conclusions and directions for future research.
-
Drawing maps with advice
PublicationW pracy podejmujemy temat konstrukcji algorytmu dla agenta, który zostaje umieszczony w dowolnym wierzchołku grafu (wierzchołki są nierozróżnialne, krawędzie mają etykiety portów), po czym realizuje algorytm zmierzający do znalezienia drzewa spinającego grafu lub izomorficznej kopii grafu. Dla obu problemów podajemy asymptotycznie dokładne lub prawie dokładne oszacowania na ilość bitów dodatkowej informacji, którą agent musi otrzymać...
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Binocular Vision Impairments Therapy Supported By Contactless Eye-gaze Tracking System
PublicationBinocular vision impairments often result in partial or total loss of stereoscopic vision. The lack of binocular vision is a serious vision impairment that deserves more attention. Very important result of the binocular vision impairments is a binocular depth perception. This paper describes also a concept of a measurement and therapy system for the binocular vision impairments by using eye-gaze tracking system.
-
Connected searching of weighted trees
PublicationW artykule rozważamy problem spójnego przeszukiwania drzew obciążonych. Autorzy w [L. Barriere i inni, Capture of an intruder by mobile agents, SPAA'02 (2002) 200-209] twierdzą, że istnieje wielomianowy algorytm dla problemu obliczania optymalnej strategii przeszukiwania obciążonego drzewa. W niniejszej pracy pokazano, że problem ten jest obliczeniowo trudny nawet dla wierzchołkowo-obciążonych drzew (wagi krawędzi równe 1) oraz...
-
Distributed MIND - A New Processing Model Based on Mobile Interactive Documents
PublicationObliczenia w trybie zespołowym pozwalają na integrację działań ludzi i agentów systemowych w otwartym środowisku rozproszonym w celu rozwiązywania problemów formułowanych dynamicznie w trakcie pracy systemu. Problemy te najczęściej nie mają charakteru algorytmicznego, tzn. generowane rozwiązania nie mogłyby zostać wyliczone w skończonej liczbie kroków na podstawie danych charakteryzujących uczestników obliczeń. Autorzy proponują...
-
Agent System for Managing Distributed Mobile Interactive Documents
PublicationThe MIND architecture of distributed mobile interactive document is a new processing model defined for facilitate informed decision-making in non-algorithmic decision-making processes carried out by knowledge-based organizations. The aim of this architecture is to change the static document to mobile agents, which are designed to implement the structure of the organization through autonomous migration between knowledge workers...
-
Ranking decision variants by subjective paird comparisons in cases with incomplete data.
PublicationMetoda porównań parami wykorzystywana jest do szeregowania skończonej,zwykle niewielkiej liczby wariantów decyzyjnych. W metodzie tej ekspert lub grupa ekspertów proszona jest o wyrażenie swojej opinii dotyczącej każdej pary wariantów w postaci względnej preferenecji jednego wariantu nad drugim.Zdarza się jednak często, że ekspert nie jest w stanie ocenić pary lub par wiariantów i mamy wtedy do czynienia z sytuacją...
-
Comparison of construction algorithms for minimal, acyclic, deterministicfinite state automata from sets of strings.
PublicationArtykuł porównuje różne metody tworzenia minimalnych, acyklicznych, deterministycznych automatów skończonych ze zbiorów słów. Wdrożone i porównane zostały metody przyrostowe, prawie przyrostowe i nieprzyrostowe.
-
Admission control method based on effective delay for flows using EF PHB.
Publication.
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublicationProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Remote exception handling for PVM processes.
PublicationArtykuł przedstawia model lokalnej i zdalnej obsługi wyjątków w bibliotece PVM. Działający proces zostaje rozszerzony o możliwość zgłaszania zdalnych wyjątków do procesu nadrzędnego lub otrzymania akcji związanych z obsługą wyjątków. Przedstawiono wzorce obsługi wyjątków w aplikacjach rozproszonych oraz wprowadzono pojęcie Zdalnego Nadzorcy Wyjątków. Nadzorca może kontrolować każdy proces w maszynie wirtualnej (PVM).
-
PVM Web Cluster: integration of PVM clusters using Web services and CORBA.
PublicationProponujemy nową architekturę i jej implementację PVM Web Cluster, która umożliwia łatwe zrównoleglanie wykonania zadań PVM zarówno na geograficznie rozproszone klastry PVM jak i wewnątrz nich. Uruchamianie zadań jest wykonywane poprzez wywołanie usługi sieciowej (Web service), która negocjuje najlepszy klaster (klastry) dla danego zadania i komunikuje się z klastrami za pomocą standardu CORBA.
-
Exception handling model influence factors for discributed systems. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. 5th In- ternational Conference. Częstochowa, 7-10 September 2003.Model obsługi wyjątków uwzględniający wpływ czynników systemu rozproszonego.
PublicationSpecyfikacja programu jest jasno określona w systemach sekwencyjnych, gdzie posiada standardowe i wyjątkowe przejścia. Praca przedstawia rozszerzony model specyfikacji systemu w środowiskach rozproszonych uwzględniający szereg specyficznych czynników. Model zawiera analizę specyfikacji pod kątem obsługi wyjątków dla rozproszonych danych oraz komunikacji międzyprocesorowej. Ogólny model został zaimplementowany w środowisku...
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublicationThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
Testing for conformance of parallel programming pattern languages
PublicationThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublicationWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...
-
Improving flexibility and performance of PVM applications by distributed partial evaluation
PublicationA new framework for developing both flexible and efficient PVM applications is described. We propose Architecture Templates Interface (ATI) that allows to control application granularity and parallelism. To ensure high application efficiency we extend partial evaluation strategy into domain of distributed applications obtaining Distributed Partial Evaluation (DPE). Both ATI and DPE were implemented using a new distributed programming...
-
Capabilities and limitations of the disabled in remote access to information
PublicationArtykuł poświęcony jest możliwościom zdalnego dostępu do źródeł informacji przez osoby niepełnosprawne. Przedstawia urządzenia i aparaty umożliwiające grupom osób niepełnosprawnych najłatwiejsze w ich sytuacji psychofizycznej sposoby zdalnego dostępu do Centrum Informacyjnego, precyzyjnego określenia potrzebnej informacji, jej odbiorze i zapisu odpowiedzi z punktu widzenia dysfunkcji organizmu inwalidy proszącego o informację.
-
Finite automata for compact representation of language models in NLP
PublicationPrzedstawiona zostaje technika reprezentacji modeli języka w przetwarzaniu języka naturalnego wymagająca mało pamięci. Po krótkim omówieniu przyczyn poszukiwania oszczędnej reprezentacji takich modeli języka, pokazane jest, jak automaty skończone mogą być użyte w tym celu. Technika może być postrzegana jako zastosowanie i rozszerzenie doskonałej funkcji mieszającej z wykorzystaniem automatów skończonych. Pierwsze doświadczenia...
-
Dedicated scheduling of tasks to minimize mean flow time
PublicationThis paper investigates the complexity of scheduling biprocessor tasks on dedicated processors to minimize mean flow time. Since the general problem is strongly NP-hard, we assume some restrictions on task lengths and the structure of associated scheduling graphs. Of particular interest are acyclic graphs. In this way we identify a borderline between NP-hard and polynomially solvable special cases.
-
An Efficient Noisy Binary Search in Graphs via Median Approximation
PublicationConsider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...
-
Tensor Decomposition for Imagined Speech Discrimination in EEG
PublicationMost of the researches in Electroencephalogram(EEG)-based Brain-Computer Interfaces (BCI) are focused on the use of motor imagery. As an attempt to improve the control of these interfaces, the use of language instead of movement has been recently explored, in the form of imagined speech. This work aims for the discrimination of imagined words in electroencephalogram signals. For this purpose, the analysis of multiple variables...
-
Pursuing the Deep-Learning-Based Classification of Exposed and Imagined Colors from EEG
PublicationEEG-based brain-computer interfaces are systems aiming to integrate disabled people into their environments. Nevertheless, their control could not be intuitive or depend on an active external stimulator to generate the responses for interacting with it. Targeting the second issue, a novel paradigm is explored in this paper, which depends on a passive stimulus by measuring the EEG responses of a subject to the primary colors (red,...
-
A Clustering-Based Methodology for Selection of Fault Tolerance Techniques
PublicationDevelopment of dependable applications requires selection of appropriate fault tolerance techniques that balance efficiency in fault handling and resulting consequences, such as increased development cost or performance degradation. This paper describes an advisory system that recommends fault tolerance techniques considering specified development and runtime application attributes. In the selection process, we use the K-means...
-
The Use of Mobile Devices in the Care and Home Monitoring of the Elderly and the Sick
Publication...
-
Gaze pattern lock for elders and disabled
Publication...