Search results for: computer networks
-
BETWEEN IDEA AND INTERPRETATION - DESIGN PROCESS AUGMENTATION
PublicationThe following paper investigates the idea of reducing the human digital intervention to a minimum during the advanced design process. Augmenting the outcome attributes beyond the designer's capabilities by computational design methods, data collection, data computing and digital fabrication, altogether imitating the human design process. The primary technical goal of the research was verification of restrictions and abilities used...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
Magdalena Młynarczuk dr inż.
People -
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 3 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 1 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 10 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
Andrzej Marczak dr inż.
People -
Agnieszka Czapiewska dr inż.
People -
Marcin Narloch dr inż.
People -
Jarosław Magiera dr inż.
PeopleJarosław Magiera od 2009 r. jest pracownikiem Katedry Systemów i Sieci Radiokomunikacyjnych PG, aktualnie na stanowisku adiunkta. W 2015 uzyskał stopień dr inż. w dyscyplinie telekomunikacja za rozprawę pt. „Analiza i badania systemu antyspoofingowego GPS”. Jego zainteresowania naukowe obejmują zagadnienia takie jak m.in. wieloantenowe przetwarzanie sygnałów, detekcja i przeciwdziałanie zakłóceniom radiowym, estymacja parametrów...
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublicationProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
Oprogramowanie Systemów Elektronicznych 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Oprogramowanie Systemów Elektronicznych 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Infosystemy Elektroniczne 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Infosystemy Elektroniczne 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Vehicle detector training with minimal supervision
PublicationRecently many efficient object detectors based on convolutional neural networks (CNN) have been developed and they achieved impressive performance on many computer vision tasks. However, in order to achieve practical results, CNNs require really large annotated datasets for training. While many such databases are available, many of them can only be used for research purposes. Also some problems exist where such datasets are not...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Open Research DataNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Jacek Stefański prof. dr hab. inż.
PeopleJJacek Stefański received M.Sc., Ph.D. and D.Sc. degrees in telecommunications engineering from Gdansk University of Technology (GUT), Poland, in 1993, 2000 and 2012, respectively. Awarded title of Professor by the President of Poland in 2020. Currently, he works as a professor at the Department of Radio Communication Systems and Networks (DRCSN) in GUT. From 2005 to 2009, he worked as an assistant professor in the National Institute...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublicationThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Jacek Andrzej Litka mgr inż.
People -
Mariusz Dzwonkowski dr inż.
People -
Olga Błaszkiewicz mgr inż.
People -
Alicja Olejniczak mgr inż.
People -
Electrical and noise responses of carbon nanotube networks enhanced by UV light for detection of organic gases (ethanol, acetone)
Open Research DataCarbon nanotube networks of different optical transparencies were investigated via resistance and 1/f noise measurements for detection of ethanol and acetone. The sensor resistive and noise responses were collected for dark and UV-assisted conditions, revealing the improvement in sensor sensitivity and limit of detection after applying UV light (275...
-
Przygotowanie, realizacja i ocena pomiarów terenowych do identyfikacji oporności hydraulicznej sieci wodociągowej
PublicationW procesie tworzenia komputerowego modelu przepływów (KMP) jednym z wiodących zadań jest przygotowanie i realizacja pomiarów terenowych w celu identyfikacji oporności hydraulicznej czynnej sieci wodociągowej. Motywacją autora do przedstawienia zasad postępowania w tym zakresie jest narastająca niefrasobliwość twórców KMP, którzy w nieuprawniony sposób używają paramodeli do rozwiązywania problemów inżynierskich. W pracy zdefiniowano...
-
Wojciech Siwicki dr inż.
People -
A Special Section on Intelligent User Interfaces in Healthcare (IUIH)
PublicationA concept of interface has evolved from the first appearance in the form of a command line interface to the established use of direct manipulation or WIMP (windows, icons, menus and pointing) interfaces in nearly all applications. Intelligent user interfaces (IUI) form a subfield of Human-Computer Interaction research. Optimal human-computer interactions are defined as ones where users are able to perform complex tasks more quickly...
-
DevEmo—Software Developers’ Facial Expression Dataset
PublicationThe COVID-19 pandemic has increased the relevance of remote activities and digital tools for education, work, and other aspects of daily life. This reality has highlighted the need for emotion recognition technology to better understand the emotions of computer users and provide support in remote environments. Emotion recognition can play a critical role in improving the remote experience and ensuring that individuals are able...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
An attempt to develop a model selection algorithm of computer simulation during the design process of mechanical response of any mechanical body
Publicationn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This article...
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublicationIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
Hip endhoprothesis development using rapid prototyping methods
PublicationIntegrated product development based on Rapid Prototyping methods, connected with computer aided 3D design and computer aided engineering enables fast and full new product verification and validation. A case study derived from clinical and technological practice using hip implant construction is also included.
-
Application of auto calibration and linearization algorithms to improve sound quality of computer devices
PublicationAn application of auto calibration and linearization algorithms designed for correcting acoustic characteristics of selected computer devices was presented in the paper. The functionality of the algorithms were presented for two kind of computer devices: ultrabook class computer and portable device of All-In-One type. The algorithms were adjusted for the given type of the device on the basis of series of measurements conducted...
-
Gesture-based computer control system
PublicationIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Michał Hoeft dr inż.
PeopleMichał Hoeft graduated with distinction form Gdansk University of Technology (GUT), Gdansk, Poland in 2011. His main areas of research interest contain: effective mobility management and handover optimisation in 802.11 networks. Michał Hoeft has been involved in major communication-oriented projects including the EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 and netBaltic projects. He has served as a reviewer...
-
Eye-tracking everywhere - software supporting disabled people in interaction with computers
PublicationIn this paper we present comprehensive system for communication with computer by gaze. One of the main assumptions behind this work was to provide solution that can be used with standard RGB webcam. The proposed comprehensive system included the eye tracking module and user interface for convenient gaze interaction with computer. As a result a fully functional application was developed. The average accuracy of the eye tracking...
-
ASON/GMPLS connection control servers in virtual computer environment
PublicationIn the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...
-
Virtual touchpad - video-based multimodal interface
PublicationA new computer interface named Virtual-Touchpad (VTP) is presented. The Virtual-Touchpad provides a multimodal interface which enables controlling computer applications by hand gestures captured with a typical webcam. The video stream is processed in the software layer of the interface. Hitherto existing video-based interfaces analyzing frames of hand gestures are presented. Then, the hardware configuration and software features...
-
A graphical approach to yield and boundary surfaces of selected hypoplastic constitutive equations
PublicationThe article describes how to identify the boundary and yield surface for hypoplastic constitutive equations proposed by Wu, Gudehus and Bauer. It is shown how to identify and plot the surfaces for any equation in this class. Calculation errors are analyzed characteristic for appleid set of numerical formulas. In the paper there are computer links to the source code prepared in the MATLAB system, based on istructions in the article....
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Semantics for an Interdisciplinary Computation
PublicationSemantics for an interdisciplinary computation is becoming increasingly difficult to capture while dealing with multi-domain problems. Expertise from Computer Science, Computer Engineering, Electrical Engineering, and other disciplines merges as engineering challenges in modern systems, such as, Cyber-Physical Systems, Smart Cities, and Bionic Systems must be tackled in a methodological manner. In this paper, a paradigm for formalization...
-
Emotion Monitoring – Verification of Physiological Characteristics Measurement Procedures
PublicationThis paper concerns measurement procedures on an emotion monitoring stand designed for tracking human emotions in the Human-Computer Interaction with physiological characteristics. The paper addresses the key problem of physiological measurements being disturbed by a motion typical for human-computer interaction such as keyboard typing or mouse movements. An original experiment...
-
Software Tools to Measure the Duplication of Information
PublicationData stored in average computer system usually is not unique, portions of stored data are duplicated. When duplicated data are stored in separate files containing source code of computer program of student homework, a possibility of cheating should be seriously considered. This paper presents software tools built, in order to detect re-use of pieces of code in supplied text files. Three aspects of information atching are considered:...
-
Harmonics produced by traction substations – computer modelling and experimental verification
PublicationVoltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion include traction rectifiers. This paper presents results of the computer investigation of...
-
Experimental Study of Silent Sonar
PublicationStealth is a frequent requirement in military applications and involves the use of devices whose signals are difficult to intercept or identify by the enemy. The silent sonar concept was studied and developed at the Department of Marine Electronic Systems of the Gdansk University of Technology. The work included a detailed theoretical analysis, computer simulations and some experimental research. The results of the theoretical...
-
Novel analysis methods of dynamic properties for vehicle pantographs
PublicationTransmission of electrical energy from a catenary system to traction units must be safe and reliable especially for high speed trains. Modern pantographs have to meet these requirements. Pantographs are subjected to several forces acting on their structural elements. These forces come from pantograph drive, inertia forces, aerodynamic effects, vibration of traction units etc. Modern approach to static and dynamic analysis should...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Blended Learning in Teaching Safety of Electrical Installations
PublicationBlended learning becomes more commonly used in teaching information technology or other subjects, which involve practice in computer laboratories. In case of subjects with no access to computer rooms blended learning supports lecturing and teaching classes e.g. interactive lessons. The article presents the use of blended learning forms in Gdansk University of Technology in teaching the subject of Safety of Electrical Installations....
-
From Knowledge based Vision Systems to Cognitive Vision Systems: A Review
PublicationComputer vision research and applications have their origins in 1960s. Limitations in computational resources inherent of that time, among other reasons, caused research to move away from artificial intelligence and generic recognition goals to accomplish simple tasks for constrained scenarios. In the past decades, the development in machine learning techniques has contributed to noteworthy progress in vision systems. However,...