Filters
total: 2446
-
Catalog
- Publications 2047 available results
- Journals 41 available results
- Conferences 23 available results
- Publishing Houses 1 available results
- People 68 available results
- Projects 7 available results
- e-Learning Courses 21 available results
- Events 8 available results
- Open Research Data 230 available results
displaying 1000 best results Help
Search results for: DEEP BELIEF NETWORK
-
Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation
Open Research DataThe dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...
-
Mariusz Figurski prof. dr hab. inż.
PeopleMariusz Józef Figurski (born 27 April 1964 in Łasinie, Poland) - Polish geodesist, professor of technical sciences, professor at the Gdańsk University of Technology. Early life and education He passed the matriculation examination in 1983 after he had finished Jan III Sobieski High school in Grudziądz. He graduated the Military University of Technology on an individual mode at the Faculty of Electromechanics and Civil Engineering...
-
Inauguracja roku akademickiego dla studentów zagranicznych
EventsW trakcie uroczystości będzie miało miejsce oficjalne powitanie studentów zagranicznych rozpoczynających naukę na PG.
-
Communication: Inside the water wheel: Intrinsic differences between hydrated tetraphenylphosphonium and tetraphenylborate ions
PublicationTetraphenylphosphonium tetraphenylborate (TPTB) is a common reference electrolyte in physical chemistry of solutions allowing for a convenient partitioning of thermodynamic properties into single-ion contributions. Here, we compute on the basis of ab initio molecular dynamics simulations the infrared (IR) spectra for hydrated constituent ions of the TPTB assumption. Using spectral decomposition techniques, we extract important...
-
Explainable machine learning for diffraction patterns
PublicationSerial crystallography experiments at X-ray free-electron laser facilities produce massive amounts of data but only a fraction of these data are useful for downstream analysis. Thus, it is essential to differentiate between acceptable and unacceptable data, generally known as ‘hit’ and ‘miss’, respectively. Image classification methods from artificial intelligence, or more specifically convolutional neural networks (CNNs), classify...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublicationIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
A Selection of Starting Points for Iterative Position Estimation Algorithms Using Feedforward Neural Networks
PublicationThis article proposes the use of a feedforward neural network (FNN) to select the starting point for the first iteration in well-known iterative location estimation algorithms, with the research objective of finding the minimum size of a neural network that allows iterative position estimation algorithms to converge in an example positioning network. The selected algorithms for iterative position estimation, the structure of the...
-
Analysis-by-synthesis paradigm evolved into a new concept
PublicationThis work aims at showing how the well-known analysis-by-synthesis paradigm has recently been evolved into a new concept. However, in contrast to the original idea stating that the created sound should not fail to pass the foolproof synthesis test, the recent development is a consequence of the need to create new data. Deep learning models are greedy algorithms requiring a vast amount of data that, in addition, should be correctly...
-
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublicationDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Tacit Knowledge Sharing and Personal Branding. How to Derive Innovation From Project Teams?
PublicationInnovation, relationships, cooperation, and knowledge are key factors which determine a competitive advantage in the networked economy. A network serves as a contemporary form of market process coordination. Network economy, according to the idea of prosumerism, is founded on collaboration of individual creators based on a network of values instead of hierarchical dependencies. Another feature of a network is that it imposes symmetry...
-
Nowoczesne technologie uszczelniania wałów przeciwpowodziowych.
PublicationOpisano zastosowanie wąskoszczelinowych przesłon przeciwfiltracyjnych wykonywanych w technologii WIPS wibracyjnie iniektowana przesłona szczelinowa oraz DSM ( ang. deep soil mixing - mieszanie wgłębne gruntu). Przedstawiono przykłady zastosowania w Polsce.
-
1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type
PublicationA network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....
-
Barbara Klaudel
People -
The Review of the Selected Challenges for an Incorporation of Daylight Assessment Methods into Urban Planning in Poland
PublicationThe main objectives of this research it to find out if modern daylight assessment and design methods can be useful for urban residential planning in Poland. The study gives a chance to describe and appraise modern daylight design techniques. The other purpose is to illustrate how daylight knowledge could be used as an incentive to rethink the way urban environments are created. Although daylight design is acknowledged in literature...
-
Slowly-closing valve behaviour during steam machine accelerated start-up
PublicationThe paper discusses the state of stress in a slowly-closing valve during accelerated start-up of a steam turbine. The valve is one of the first components affected by high temperature gradients and is a key element on which the power, efficiency and safety of the steam system depend. The authors calibrated the valve model based on experimental data and then performed extended Thermal-FSI analyses relative to experiment. The issue...
-
The Double Cognitive Bias of Mistakes: A Measurement Method
PublicationThere is no learning without mistakes. However, making mistakes among knowledge workers is s�ll seeing shameful. There is a clash between posi�ve a�tudes and beliefs regarding the power of gaining new (tacit) knowledge by ac�ng in new contexts and nega�ve a�tudes and beliefs toward accompanying mistakes that are sources of learning. These contradictory a�tudes create a bias that is doubled by the other shared solid belief...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
QoS Extensions for Flow-Awareness Networks
PublicationThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
How Integration of a Brain-Machine Interface and Obstacle Detection System Can Improve Wheelchair Control via Movement Image
PublicationThis study presents a human-computer interaction combined with a brain-machine interface (BMI) and obstacle detection system for remote control of a wheeled robot through movement imagery, providing a potential solution for individuals facing challenges with conventional vehicle operation. The primary focus of this work is the classification of surface EEG signals related to mental activity when envisioning movement and deep relaxation...
-
Pedestrian detection in low-resolution thermal images
PublicationOver one million people die in car accidents worldwide each year. A solution that will be able to reduce situations in which pedestrian safety is at risk has been sought for a long time. One of the techniques for detecting pedestrians on the road is the use of artificial intelligence in connection with thermal imaging. The purpose of this work was to design a system to assist the safety of people and car intelligence with the use...
-
Feature Weighted Attention-Bidirectional Long Short Term Memory Model for Change Detection in Remote Sensing Images
PublicationIn remote sensing images, change detection (CD) is required in many applications, such as: resource management, urban expansion research, land management, and disaster assessment. Various deep learning-based methods were applied to satellite image analysis for change detection, yet many of them have limitations, including the overfitting problem. This research proposes the Feature Weighted Attention (FWA) in Bidirectional Long...
-
Low-frequency noise in ZrS3 van der Waals semiconductor nanoribbons
PublicationWe report the results of the investigation of low-frequency electronic noise in ZrS3 van der Waals semiconductor nanoribbons. The test structures were of the back-gated field-effect-transistor type with a normally off n-channel and an on-to-off ratio of up to four orders of magnitude. The current–voltage transfer characteristics revealed significant hysteresis owing to the presence of deep levels. The noise in ZrS3 nanoribbons...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Transient detection for speech coding applications
PublicationSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Towards 5G — Cloud-based Radio Access Networks
PublicationIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublicationA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Water currents in Głębinka Passage in late spring of 1975
Open Research DataData set contains the results of the field measurements of horizontal water currents carried out in the Głębinka Passage in Puck Bay (Southern Baltic, Poland) in 1975 by Department of Physical Oceanography (Institute Oceanography, University of Gdańsk). Głębinka Passage is a narrow strait playing crucial role in water exchange between shallow and deep...
-
Abdalraheem Ijjeh Ph.D. Eng.
PeopleThe primary research areas of interest are artificial intelligence (AI), machine learning, deep learning, and computer vision, as well as modeling physical phenomena (i.e., guided waves in composite laminates). The research interests described above are utilized for SHM and NDE applications, namely damage detection and localization in composite materials.
-
A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios
PublicationThis article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...
-
Grzegorz Szwoch dr hab. inż.
PeopleGrzegorz Szwoch was born in 1972 in Gdansk. In 1991-1996 he studied at the Technical University of Gdansk. In 1996 he graduated as a student from the Sound Engineering Department. His thesis was related to physical modeling of musical instruments. Since that time he has been a member of the research staff at the Multimedia Systems Department as a PhD student (1996-2001), Assistant (2001-2004), Assistant professor (2004-2020) and...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Active Learning Based on Crowdsourced Data
PublicationThe paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...
-
Introduction to the ONDM 2022 special issue
PublicationThis JOCN special issue contains extended versions of selected papers presented at the 26th International Conference on Optical Network Design and Modeling (ONDM 2022), which took place 16–19 May 2022 at Warsaw University of Technology, Warsaw, Poland. The topics covered by the papers represent trends in optical networking research: application of machine learning to network management, cross-layer network performance optimization,...
-
Design and implementation of GEPON architecture in laboratory testbed
PublicationThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
Experience-Oriented Knowledge Management for Internet of Things
PublicationIn this paper, we propose a novel approach for knowledge management in Internet of Things. By utilizing Decisional DNA and deep learning technologies, our approach enables Internet of Things of experiential knowledge discovery, representation, reuse, and sharing among each other. Rather than using traditional machine learning and knowledge discovery methods, this approach focuses on capturing domain’s decisional events via Decisional...
-
Impact of Visual Image Quality on Lymphocyte Detection Using YOLOv5 and RetinaNet Algorithms
PublicationLymphocytes, a type of leukocytes, play a vital role in the immune system. The precise quantification, spatial arrangement and phenotypic characterization of lymphocytes within haematological or histopathological images can serve as a diagnostic indicator of a particular lesion. Artificial neural networks, employed for the detection of lymphocytes, not only can provide support to the work of histopathologists but also enable better...
-
On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience
PublicationNetwork communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublicationThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
Nina Rizun dr
PeopleNina Rizun is an assistant professor at the Faculty of Management and Economics at the Gdańsk University of Technology. In October 1999 she obtained a PhD degree in technical sciences in the Faculty of Enterprise Economy and Production Organization, National Mining Academy, Dnipropetrovsk, Ukraine. PhD thesis title: Development of Complex Subsystem of the Organization and Planning of Mining and Transport Processes. In the years...
-
Paweł Burdziakowski dr inż.
PeoplePaweł Burdziakowski, PhD, is a professional in low-altitude aerial photogrammetry and remote sensing, marine and aerial navigation. He is also a licensed flight instructor and software developer. His main areas of interest are digital photogrammetry, navigation of unmanned platforms and unmanned systems, including aerial, surface, underwater. He conducts research in algorithms and methods to improve the quality of spatial measurements...
-
Proposal of New Tracer Concentration Model in Lung PCT Study Comparison with Commonly Used Gamma-variate Model
PublicationPerfusion computed tomography (pCT) is one of the methods that enable non-invasive imaging of the hemodynamics of organs and tissues. On the basis of pCT measurements, perfusion parameters such as blood flow (BF), blood volume (BV), mean transit time (MTT) and permeability surface (PS) are calculated and then used for quantitative evaluation of the tissue condition. To calculate perfusion parameters it is necessary to approximate...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Endometrioid adenocarcinoma, NOS - Female, 70 - Tissue image [2270630026314431]
Open Research DataThis is the histopathological image of CORPUS UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Endometrioid adenocarcinoma, NOS - Female, 70 - Tissue image [2270630026311261]
Open Research DataThis is the histopathological image of CORPUS UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Endometrioid adenocarcinoma, NOS - Female, 70 - Tissue image [2270630026311781]
Open Research DataThis is the histopathological image of CORPUS UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Blue nevus, NOS - Female, 70 - Tissue image [7110729594544401]
Open Research DataThis is the histopathological image of SKIN tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Endometrioid adenocarcinoma, NOS - Female, 70 - Tissue image [2270630026313931]
Open Research DataThis is the histopathological image of CORPUS UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.