Filters
total: 3452
-
Catalog
- Publications 2278 available results
- Journals 268 available results
- Conferences 189 available results
- People 275 available results
- Projects 4 available results
- Research Teams 1 available results
- e-Learning Courses 97 available results
- Events 9 available results
- Open Research Data 331 available results
displaying 1000 best results Help
Search results for: COMPUTER VISION ALGORITHMS
-
Image projection in Immersive 3D Visualization Laboratory
PublicationIn recent years, many centers in the world attempted to build a virtual reality laboratory. The main idea of such laboratory is to allow the user to “immerse” into and move in a computer-generated virtual world. In the paper, the underlying principles of the system of virtual reality (VR) are described. The selected implementations constructed by the research centers of the world are also presented. The cave automatic virtual environment...
-
Wojciech Gumiński dr inż.
PeopleWojciech Gumiński received his M.Sc. ad Ph.D. degrees from Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Poland in 1991 and 2003 respectively. His scientific and research interest include computer network architectures, communication protocols and digital signal processing. Hi participated as principal investigator in several projects including Future Internet Engineering, PL-LAB...
-
The Ellenbogen's "Matter as Software" Concept for Quantum Computer Implementation: II Bonding Between the C60 and X@C60 Molecules as Available Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Quantum Computing Devices
PublicationThe binding energy, BE of the X@C60-X@C60 homodimer and the X@C60-Y@C60 heterodimer resulting from the bond formation between the occupied X@C60 MBB and the C60 molecule was studied by means of semiempirical PM7 calculations, where X and Y denote atoms from H to Bi, excluding Tc and lanthanides. All possible combinations of N = 68 guest atoms were considered, which resulted in K = 2346 of different calculated dimers of (X@C60-Y@C60)...
-
Machine learning applied to acoustic-based road traffic monitoring
PublicationThe motivation behind this study lies in adapting acoustic noise monitoring systems for road traffic monitoring for driver’s safety. Such a system should recognize a vehicle type and weather-related pavement conditions based on the audio level measurement. The study presents the effectiveness of the selected machine learning algorithms in acoustic-based road traffic monitoring. Bases of the operation of the acoustic road traffic...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
International Journal of Computer Information Systems and Industrial Management Applications
Journals -
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
Journals -
APIS – Agent Platform for Integration of Services
PublicationThe paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Grzegorz Lentka dr hab. inż.
PeopleGrzegorz Lentka obtained his MSc title in electronics, specialization Measurement Systems at Gdańsk University of Technology, Faculty of Electronics, Telecommunications and Informatics in 1996. He obtained the PhD title in 2003 and habilitation in 2014, respectively. Currently he is an professor in Department of Metrology and Optoelectronics. His main scientific interests are focused on digital signal processing for metrology,...
-
Data Structures (Doctoral Studies) - New
e-Learning CoursesThe course is designed to provide students with the knowledge regarding basic data structures and associated algorithms used in broad range of applications. Students will also gain knowledge about how to evaluate the quality of algorithms in the context of time and space usage. Additionally, during seminars, students get familiar with biographies of most famous creators of the algorithms.
-
Computer Fraud & Security
Journals -
APPLIED COMPUTER SCIENCE
Journals -
Open Computer Science
Journals -
Piotr Odya dr inż.
PeoplePiotr Odya was born in Gdansk in 1974. He received his M.Sc. in 1999 from the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Poland. His thesis was related to the problem of sound quality improvement in the contemporary broadcasting studio. He is interested in video editing and multichannel sound systems. The goal of Mr. Odya Ph.D. thesis concerned methods and algorithms for correcting...
-
Joanna Raczek dr inż.
PeopleEmployment 2003 -- 2019: Faculty of Applied Physics and Mathematics, Gdańsk University of Technology. 2019 - present: Faculty of Electronic, Informatics and Telecominications, Gdańsk University of Technology. Education May 2007: Doctor of Philosophy in Mathematics, University of Gdańsk. Doctoral dissertation: "Paired domination and doubly domination in graphs". Supervisor: dr hab. Jerzy Topp. 2000 -- 2004 Bachelor of Science...
-
International Conference on Machine Vision
Conferences -
Image and Vision Computing Conference
Conferences -
Mechatronics and Machine Vision in Practice
Conferences -
Systematic Literature Review for Emotion Recognition from EEG Signals
PublicationResearchers have recently become increasingly interested in recognizing emotions from electroencephalogram (EEG) signals and many studies utilizing different approaches have been conducted in this field. For the purposes of this work, we performed a systematic literature review including over 40 articles in order to identify the best set of methods for the emotion recognition problem. Our work collects information about the most...
-
Krystyna Dziubich mgr inż.
PeopleKrystyna Dziubich obtained a Eng. degree in computer science granted by a council at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology in 1996. 1996-2005 employment in industry, as a computer scientist as specialist analyst in the Department of Management Systems Development; She is employed at ETI Faculty as a lecturer since 2005. She conducts lectures for full-time, extramural...
-
Mykola Lukianov mgr
PeopleMykola Lukianov received a B.Sc. and M.Sc degree in Electronics and Communications from the National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” in 2018 and 2020 respectively. He is currently a PhD student at the Gdansk University of Technology, Poland and a researcher group member in project SMARTGYsum “Research and Training Network for Smart and Green Energy Systems and Business Models”. His research...
-
Dependable Integration of Medical Image Recognition Components
PublicationComputer driven medical image recognition may support medical doctors in the diagnosis process, but requires high dependability considering potential consequences of incorrect results. The paper presentsa system that improves dependability of medical image recognition by integration of results from redundant components. The components implement alternative recognition algorithms of diseases in thefield of gastrointestinal endoscopy....
-
Task Allocation and Scalability Evaluation for Real-Time Multimedia Processing in a Cluster Envirinment
PublicationAn allocation algorithm for stream processing tasks is proposed (Modified best Fit Descendent, MBFD). A comparison with another solution (BFD) is provided. Tests of the algorithms in an HPC environment are descrobed and the results are presented. A proper scalability metric is proposed and used for the evaluation of the allocation algorithm.
-
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS
Journals -
Bulletin of the Transilvania University of Brasov, Series III: Mathematics and Computer Science
Journals -
Zbigniew Czaja dr hab. inż.
PeopleZbigniew Czaja was born in Czluchow, Poland, in 1970. He graduated from Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics in 1995. The Ph.D. degree in electronics was received in 2001 from the same university. He worked as assistant professor at this university from 2002 to 2013. In 2014, he qualified as an associate professor, and in 2017, as a professor. His research interests are in...
-
Igor Garnik dr inż.
PeopleIgor Garnik graduated from the Faculty of Electronics at the Gdańsk University of Technology (1992). He works at the Gdańsk University of Technology since 1997 - first employed as an assistant in the Department of Ergonomics and Maintenance of Technical Systems at the Faculty of Management and Economics, and then - after obtaining the degree of doctor in 2006 as an assistant professor. In the years 2009–2015 he was the coordinator...
-
Image Processing in Robotics (2021/2022)
e-Learning CoursesFor ISD M.Sc. (II degr.) 2 sem. Participants are to learn image processing algorithms related to transformation, filtration, feature detection (image descriptors), image processing algorithms in robotic industrial systems.
-
Serial control of CNC machines
PublicationIn this paper a new method of the serial control of CNC machines is proposed. Actuators are controlled locally and the role of the central computer is limited to sending commands to the controller instead of sending it directly to actuators. It has been achieved with the use of the serial protocol with the use of the USB port. The taken approach leads to more reliable operation because commands are buffered and no synchronization...
-
Application of IR UWB Spectrum Shaping to IEEE 802.15.4a Standard
PublicationCoexistence of existing narrowband systems and new ultra wideband devices in the same frequency range requires using some interference mitigation techniques, for example based on spectrum shaping. This paper presents efficiency of impulse radio spectrum shaping methods, applied to IEEE 802.15.4a UWB alternate physical layer signals. Basic parameters of 802.15.4a signal structure and outline of proposed spectrum shaping methods...
-
Algorithms and Experiments
Conferences -
Robert Janczewski dr hab. inż.
People -
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
An Overview of Image Analysis Techniques in Endoscopic Bleeding Detection
PublicationAuthors review the existing bleeding detection methods focusing their attention on the image processing techniques utilised in the algorithms. In the article, 18 methods were analysed and their functional components were identified. The authors proposed six different groups, to which algorithms’ components were assigned: colour techniques, reflecting features of pixels as individual values, texture techniques, considering spatial...
-
Kamil Andrzej Rybacki mgr inż.
PeopleBorn on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...
-
Ahmed Lakhdar Kouzou
PeoplePhd Student at Faculty of Electrical and Control Engineering, Gdansk University of Technology . His main areas of research and interests include he application of meta-heuristic optimization algorithms in electric power systems. He served as temporary researsh assitant at Texas A&M University at Qatar. He received his Bachalor’s degree in Electrical and Electronic Engineering in 2017 from the Institute of Electrical &...
-
Ewa Hermanowicz prof. dr hab. inż.
People -
Aleksander Jarzębowicz dr inż.
People -
The Backbone Coloring Problem for Small Graphs
PublicationIn this paper we investigate the values of the backbone chromatic number, derived from a mathematical model for the problem of minimization of bandwidth in radio networks, for small connected graphs and connected backbones (up to 7 vertices). We study the relationship of this parameter with the structure of the graph and compare the results with the solutions obtained using the classical graph coloring algorithms (LF, IS), modified...
-
A station strategy to deter backoff attacks in IEEE 802.11 LANs
PublicationDla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.
-
Constructing a map of an anonymous graph: applications of universal sequences
PublicationWe study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...
-
EEG data recorded in three mental states
Open Research DataElectroencephalographic (EEG) signals were acquired from 17 (14 males, 3 females) participants aged between 20 and 30 years.
-
On-line ranking of split graphs
PublicationA vertex ranking of a graph G is an assignment of positive integers (colors) to the vertices of G such that each path connecting two vertices of the same color contains a vertex of a higher color. Our main goal is to find a vertex ranking using as few colors as possible. Considering on-line algorithms for vertex ranking of split graphs, we prove that the worst case ratio of the number of colors used by any on-line ranking algorithm...
-
An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree
PublicationA 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...
-
Advanced Concepts for Intelligent Vision Systems
Conferences -
Intelligent multimedia solutions supporting special education needs.
PublicationThe role of computers in school education is briefly discussed. Multimodal interfaces development history is shortly reviewed. Examples of applications of multimodal interfaces for learners with special educational needs are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with facial expression and speech stretching audio interface representing audio modality....
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
New trends in development of micro heat exchangers for ORC's
PublicationIn the paper, new trends in development of micro heat exchangers for CHP are presented. Main attention is concentrated on the question, how channels size and thermal development lenght affect the heat transfer. New types of micro heat exchangers developed at the Institute of Fluid-Flow Machinery PAS and the methoda of their design are presented. The new experimental testing methods of the micro-channel heat exchangers, new algorithms...