Filters
total: 32141
-
Catalog
- Publications 7755 available results
- Journals 1635 available results
- Conferences 255 available results
- Publishing Houses 2 available results
- People 1072 available results
- Projects 93 available results
- Laboratories 1 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 194 available results
- Events 18 available results
- Open Research Data 21114 available results
displaying 1000 best results Help
Search results for: applied information technology
-
Biomedical Engineering at Gdansk University of Technology
PublicationShort history of education in Biomedical Engineering at Gdansk University of Technology is presented. The last initiative- implementation of the new programme, Biomedical Engineering - an interfaculty direction of study, supported by a grantfinanced by the European Social Fund is presented. Curricula of four specializations: Chemistry in Medicine, run by the Facultyof Chemistry; Electronics in Medicine and Informatics in Medicine,...
-
Karolina Lademann mgr
PeopleCurriculum vitae
-
Optical monitoring of electrochemical processes with ITO-based lossy-mode resonance optical fiber sensor applied as an electrode
PublicationIn this work we discuss the application of optical fiber sensors based on lossy-mode resonance (LMR) phenomenon for real-time optical monitoring of electrochemical processes. The sensors were obtained by a reactive high power impulse magnetron sputtering of indium tin oxide (ITO) on a 2.5 cm-long core of polymer-clad silica fibers. The LMR effect made monitoring of changes in optical properties of both ITO and its surrounding medium...
-
[15.02.2024] Information meeting for 2nd year PhD students
e-Learning CoursesInformation meeting on 15.02.2024 2nd year PhD students
-
Information retrieval with semantic memory model
PublicationPsycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
The use of LiFePO4 technology in autonomous PV systems
PublicationBattery manufacturing based on the flow of lithium ions is currently the fastest growing and the most promising technology. It is used in many applications - from the smallest electronic devices to the large-scale energy trays. However, in the PV systems lead-acid batteries are still the most commonly used. As they are much cheaper they also come with a number of significant disadvantages. It is anticipated that they will be replaced...
-
Perceived technostress while learning a new mobile technology: Do individual differences and the way technology is presented matter?
Publication -
Influence of an applied bearing system on behaviour of multi-span footbridge
PublicationThe cycle overpass in Gdynia is a box structure over 300 metres long, 10-span. It was opened for bicycle traffic in the second half of 2013. At the end of its construction, there was failure due to excessive horizontal displacement of the system. A number of bearings exceeded the range of permissible transverse shifts thus it was necessary to temporarily protect the spans from slipping. The FEM analysis of the original solution...
-
Basis of Chemical Technology
e-Learning Courses -
Technology brands in the digitally-based and network economy. Setting the background
PublicationThis chapter defines and draws a general picture on Digital Technologies and Technology Brands’ meaning in the current economy. It contextualises the role and channels of digital technology’s impact on their shaping technology brands in network economy. It briefly explains why digital, innovative technologies constitute a perfect background and environment for technology brands of global scope. It discusses the place of technology...
-
[soft skills] Scientific databases and information skills
e-Learning Courses{mlang pl} Dyscyplina: wszystkie dyscypliny Zajęcia obowiązkowe dla doktorantów I roku Prowadzący: Magdalena Szuflita-Żurawska, Biblioteka PG Liczba godzin: 5 Forma zajęć: wykład {mlang} {mlang en} Discipline: all disciplines Obligatory course for 1st-year PhD students Academic teacher: Magdalena Szuflita-Żurawska, GUT Library Total hours of training: 5 teaching hours Course type: lecture {mlang} Soft skills Area...
-
The efficiency of scientific activities and technology transfer in higher education in Poland
PublicationThe objective of the article is to measure and evaluate the efficiency of scientific activity and technology transfer to the economy by public higher education institutions (HEIs) in Poland and to formulate recommendations for state policy to increase the effectiveness of the technology transfer process by them. The study measured scientific activity and technology transfer separately in two groups of higher education institutions...
-
Product Graph Invariants with Applications in the Theory of Information
PublicationThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Decoherence-free communication over multiaccess quantum channels
PublicationIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Radionuclides activity and effective doses referred to geological formations
PublicationNaturally occurring radioactive materials (NORM) are present in Earth’s crust and they caused natural background radiation, variable in different regions. Liquid, gas and solid radionuclides emit three types of radiation – alpha, beta and gamma. Fluctuations of natural radioactivity in different geological formations in the world and in Poland were compared in relation to radiological hazard. Also drilling cuttings from boreholes...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
An audio-visual corpus for multimodal automatic speech recognition
Publicationreview of available audio-visual speech corpora and a description of a new multimodal corpus of English speech recordings is provided. The new corpus containing 31 hours of recordings was created specifically to assist audio-visual speech recognition systems (AVSR) development. The database related to the corpus includes high-resolution, high-framerate stereoscopic video streams from RGB cameras, depth imaging stream utilizing Time-of-Flight...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublicationThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
ИНФОРМАЦИОННО-АНАЛИТИЧЕСКАЯ СИСТЕМА ДЛЯ КОМПЛЕКСНОГО ГРАДОСТРОИТЕЛЬНОГО АНАЛИЗА
Publicationстатье приводится описание программного инструмента, предназначенного для анализа пространственных данных с использованием BI-платформы нового поколения PROGNOZ PLATFORM (РР). Описывается структура хранилища данных, подсистемы мониторинга, моделирования, аналитики и прогнозирования. Приводится набор тестовых параметров и примеры интерфейса Информационно-аналитической системы (ИАС), построенной на основе ГИС и PROGNOZ PLATFORM (РР),...
-
Multimedia polysensory integration training system dedicated to children with educational difficulties
PublicationThis paper aims at presenting a multimedia system providing polysensory train- ing for pupils with educational difficulties. The particularly interesting aspect of the system lies in the sonic interaction with image projection in which sounds generated lead to stim- ulation of a particular part of the human brain. The system architecture, video processing methods, therapeutic exercises and guidelines for children’s interaction...
-
Chirality Measures of α-Amino Acids
Publication -
Free Energies of the Disassembly of Viral Capsids from a Multiscale Molecular Simulation Approach
Publication -
Intelligent processing of stuttered speech.
PublicationW artykule zaprezentowano kilka metod analizy i automatycznego zliczania potknięć artykulacyjnych, związanych z jąkaniem się, opartych na wykorzystaniu algorytmów uczących się sztucznych sieci neuronowych i zbiorów przybliżonych.
-
Estimation of musical sound separation algorithm effectiveness employing neural networks.
PublicationŚlepa separacja dźwięków sygnałów muzycznych zawartych w zmiksowanym materiale jest trudnym zadaniem. Jest to spowodowane tym, że dźwięki znajdujące się w relacjach harmonicznych mogą zawierać kolidujące składowe sinusoidalne (składowe harmoniczne). Ewaluacja wyników separacji jest również problematyczna, gdyż analiza błędu energetycznego często nie odzwierciedla subiektywnej jakości odseparowanych sygnałów. W tej publikacji zostały...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Isomerization and Decomposition of 2-Methylfuran with External Forces
Publication -
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publication -
Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field
Publication -
Use of Restraints from Consensus Fragments of Multiple Server Models To Enhance Protein-Structure Prediction Capability of the UNRES Force Field
Publication -
A Maximum-Likelihood Approach to Force-Field Calibration
Publication -
Improved Consensus-Fragment Selection in Template-Assisted Prediction of Protein Structures with the UNRES Force Field in CASP13
Publication -
Contextualizing a Knowledge Base by Approximation – A Case Study
PublicationModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Reasoning with Projection in Multimodular Description Logics Knowledge Bases
PublicationWe present an approach to reasoning with projection, i.e. reasoning in which it is possible to focus on a selected part of knowledge (by neglecting some non-interesting fragments). Projection is most useful for modular knowledge bases in which only parts of knowledge have to be exchanged or imported to other modules. In this paper we present an optimized method of reasoning over results of projection. The tests indicate that the...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Intelligent video and audio applications for learning enhancement
PublicationThe role of computers in school education is briefly discussed. Multimodal interfaces development history is shortly reviewed. Examples of applications of multimodal interfaces for learners with special educational needs are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with facial expression and speech stretching audio interface representing audio modality....
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
Vacuum Rabi oscillation in nonzero-temperature open cavity
PublicationPorównania teorii oscylacji Rabiego z eksperymentem [M. Wilczewski, M. Czachor, Phys. Rev. A 79, 0333836 (2009)] sugerują, że parametry wnęki doświadczeniu z dużą ilością fotonów mogą być znacznie mniejsze niż te otrzymane dla stanów prawie próżniowych. W tym kontekście pokazujemy, że wniosek pozostaje bez zmian, nawet jeśli do opisu stanu początkowego wnęki zastosuje się bardziej realistyczny opis.
-
Two examples of Quantum Dynamical Semigroups
PublicationThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...