Search results for: probability distribution
-
Free randomness amplification using bipartite chain correlations
PublicationA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Invariant Measures for Uncountable Random Interval Homeomorphisms
PublicationA necessary and sufficient condition for the iterated function system { f (·, ω) | ω ∈ } with probability P to have exactly one invariant measure μ∗ with μ∗((0, 1)) = 1 is given. The main novelty lies in the fact that we only require the transformations f (·, ω) to be increasing homeomorphims, without any smoothness condition, nei- ther we impose conditions on the cardinality of . In particular, positive Lyapunov exponents conditions...
-
Application possibilities of LBN for civil engineering issues
PublicationBayesian Networks (BN) are efficient to represent knowledge and for the reasoning in uncertainty. However the classic BN requires manual definition of the network structure by an expert, who also defines the values entered into the conditional probability tables. In practice, it can be time-consuming, hence the article proposes the use of Learning Bayesian Networks (LBN). The aim of the study is not only to present LBN, which can...
-
Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs
PublicationIn this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...
-
Directed percolation effects emerging from superadditivity of quantum networks
PublicationEntanglement-induced nonadditivity of classical communication capacity in networks consisting of quantum channels is considered. Communication lattices consisting of butterfly-type entanglement-breaking channels augmented, with some probability, by identity channels are analyzed. The capacity superadditivity in the network is manifested in directed correlated bond percolation which we consider in two flavors: simply directed and...
-
Probabilistic sensitivity of the limit states of structures using Monte Carlom simulation
PublicationThe paper presents the concept of probabilistic sensitivity of structural limit states with respect to given design variables. A general idea is presented, illustrated by a simple case solved in an analytical way. More general approach is presented for the engineering structures, in this case a dedicated Monte Carlo simulation procedure is involved as part of the methodology. Illustration of the engineering case is done, by means...
-
Merton-type default risk and financial performance: the dynamic panel moderation of firm size
PublicationPurpose – The main purpose of this study is to evaluate the probability of default and examine the relationship between default risk and financial performance, with dynamic panel moderation of firm size. Design/methodology/approach – This study utilizes a total of 1,500 firm-year observations from 2013 to 2018 using dynamic panel data approach of generalized method of moments to test the relationship between default risk and financial...
-
Probabilistic seismic assessment of RC box-girder highway bridges with unequal-height piers subjected to earthquake-induced pounding
PublicationThis paper uses the probabilistic seismic assessment to study the effects of pounding and irregularity on the seismic behavior of typical concrete box-girder bridges with four levels of altitudinal irregularity. To extend the results for all bridges in the same class, uncertainty related to the earthquake, structural geometries, and materials are considered. Pounding is likely to take place in two cases: the first one concerns...
-
Equivalence of equicontinuity concepts for Markov operators derived from a Schur-like property for spaces of measures
PublicationVarious equicontinuity properties for families of Markov operators have been – and still are – used in the study of existence and uniqueness of invariant probability for these operators, and of asymptotic stability. We prove a general result on equivalence of equicontinuity concepts. It allows comparing results in the literature and switching from one view on equicontinuity to another, which is technically convenient in proofs....
-
Application of dynamic time warping and cepstrograms to text-dependent speaker verification
PublicationThis work provides a description of an automatic speaker verification (ASV) system. In particular, it documents the evolution of all individual stages of the proposed ASV system design from the phase of preprocessing to an operational decision making system. The aim of this research was to achieve the system of the best safety and ease of use in view of users. The objective estimation of this target has been accomplished by assessing...
-
Systems, environments, and soliton rate equations: A non-Kolmogorovian framework for population dynamics
PublicationSoliton rate equations are based on non-Kolmogorovian models of probability and naturally include autocatalytic processes. The formalism is not widely known but has great unexplored potential for applications to systems interacting with environments. Beginning with links of contextuality to non- Kolmogorovity we introduce the general formalism of soliton rate equations and work out explicit examples of subsystems interacting with...
-
Modelling of Objects Behaviour for Their Re-identification in Multi-camera Surveillance System Employing Particle Filters and Flow Graphs
PublicationAn extension of the re-identification method of modeling objects behavior in muti-camera surveillance systems, related to adding a particle filter to the decision-making algorithm is covered by the paper. A variety of tracking methods related to a single FOV (Field of Vision) are known, proven to be quite different for inter-camera tracking, especially in case of non-overlapping FOVs. The re-identification methods refer to the...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Effect of the integration into Global Value Chains on the employment contract in Central and Eastern European countries
PublicationResearch background: In the era of globalization, there is a need to address decent work deficits in Global Value Chains (GVCs). The forms of working conditions reveal a broad dispersion of contents. The literature review exposes hardly any Europe-focused research assessing the socioeconomic impact of global production links and going beyond their pure economic effects assessed in terms of employment, productivity or wages. Purpose...
-
Asymmetric Renyi Problem and > PATRICIA Tries
PublicationIn 1960 R´enyi asked for the number of random queries necessary to recover a hidden bijective labeling of n distinct objects. In each query one selects a random subset of labels and asks, what is the set of objects that have theselabels? Weconsider here anasymmetric version of the problem in which in every query an object is chosenwith probability p > 1/2 and we ignore “inconclusive” queries. We study the number of queries needed...
-
A Data-Driven Comparative Analysis of Machine-Learning Models for Familial Hypercholesterolemia Detection
PublicationThis study presents an assessment of familial hypercholesterolemia (FH) probability using different algorithms (CatBoost, XGBoost, Random Forest, SVM) and its ensembles, leveraging electronic health record data. The primary objective is to explore an enhanced method for estimating FH probability, surpassing the currently recommended Dutch Lipid Clinic Network (DLCN) Score. The models were trained using the largest Polish cohort...
-
Human Factors and Functional Safety Analysis in Designing the Control Rooms of Industrial Hazardous Plants
PublicationIn this work some aspects of human factors and functional safety analysis in designing the control rooms of industrial hazardous plants are presented. The “defence in depth” (D-in-D) concept is outlined. Some designing issues of the alarm system (AS) with regard to human factors to be supported using the human reliability analysis (HRA) are discussed. The AS and decision support system (DSS), when properly designed, would contribute...
-
A Method of Object Re-identiciation Applicable to Multicamera Surveillance Systems
PublicationThe paper addresses some challenges pertaining to the methods for tracking of objects in multi-camera systems. The tracking methods related to a single Field of Vision (FOV) are quite different from inter-camera tracking, especially in case of non-overlapping FOVs. In this case, the processing is directed to determine the probability of a particular object’s identity seen in a pair of cameras in the presence of places non-observed...
-
Providing Differentiated Levels of Service Availability in VANET Communications
PublicationInter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...
-
Modeling and analysis of the effectiveness of the guard systemswith dynamic graphs
PublicationIn the following paper it will be presented a new model for analysis (in polynomial time) of the effectiveness of the guard systems. Therewill be presented its practical applications in problems such as searching for the weakest points of the system, planning guards' paths or cameras deployment, switching image from multiple cameras on several monitors, or interception of the intruder. This model is based on describing the guarded...
-
The Conception of Decision-Making Support System for ComplexEnergetic System on Example of Ship Propulsion System
PublicationIn paper, the conception of decision-making support system for complex energetic system on example of ship propulsion system has been presented. Diversity of conditions, information overload and very often contradiction of decision-making criteria and time constraints result in difficulties in making right (rational) decision without using more or less expanded information processing systems (eg. database systems, expert systems,...
-
Examining Ownership Equity as a Psychological Factor on Tourism Business Failure Forecasting
PublicationThis paper examines ownership equity as a predictor of future business failure within the tourism and hospitality sectors. The main goals of this study were to examine which ratios are the most important for a tourism business failure forecasting model and how significant is the “total percentage of equity ownership by company directors” ratio compared with other ratios associated with the probability of bankruptcy. A stepwise...
-
Building Project and Project Team Characteristics For Creating Hybrid Management Processes
PublicationThis paper introduces a method of building the characteristic of Software Development Project. Project characteristic is determined on the basis of several factors such as the complexity of Software Development Project and Project Team, results of historical projects and information on processes and methodologies, which are implemented in analyzed organizations. Information on project complexity can be applied to many different...
-
Family business experience and the probability of starting a venture: gender differences in Poland
PublicationThe aim of this study is to analyse whether the experience of working in a family member’s business is related differently to the assessed probabilities of men and women starting their own new venture in the future. The research is conducted on a sample of 334 Polish undergraduate students. Poland is an efficiency-driven European economy with a substantial gender gap in entrepreneurship. The results obtained indicate that the relationship...
-
Viewpoint independent shape-based object classification for video surveillance
PublicationA method for shape based object classification is presented.Unlike object dimension based methods it does not require any system calibration techniques. A number of 3D object models are utilized as a source of training dataset for a specified camera orientation. Usage of the 3D models allows to perform the dataset creation process semiautomatically. The background subtraction method is used for the purpose of detecting moving objects...
-
On the hat problem, its variations, and their applications
PublicationThe topic of our paper is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of a win. There are known many...
-
Hat problem on the cycle C4
PublicationThe topic of our paper is the hat problem. In that problem, each of n people is randomly tted with a blue or red hat. Then everybody can try to guess simultanously his own hat color looking at the hat colors of the other people. The team wins if at least one person guesses his hat color correctly and no one guesses his hat color wrong, otherwise the team loses. The aim is to maximize the probability of win. In this version every...
-
The hat problem on a union of disjoint graphs
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. In this version every player...
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublicationAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...
-
Design centering of compact microwave components using response features and trust regions
PublicationFabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...
-
Product Graph Invariants with Applications in the Theory of Information
PublicationThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
FPGA-Based System for Electromagnetic Interference Evaluation in Random Modulated DC/DC Converters
PublicationField-Programmable Gate Array (FPGA) provides the possibility to design new “electromagnetic compatibility (EMC) friendly” control techniques for power electronic converters. Such control techniques use pseudo-random modulators (RanM) to control the converter switches. However, some issues connected with the FPGA-based design of RanM, such as matching the range of fixed-point numbers, might be challenging. The modern programming...
-
Deep learning for recommending subscription-limited documents
PublicationDocuments recommendation for a commercial, subscription-based online platform is important due to the difficulty in navigation through a large volume and diversity of content available to clients. However, this is also a challenging task due to the number of new documents added every day and decreasing relevance of older contents. To solve this problem, we propose deep neural network architecture that combines autoencoder with...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Earthquake-induced pounding between superstructure segments of isolated bridge
PublicationThe use of seismic isolation in bridges is considered as one of the most promising advanced technologies to enhance the structural safety during earthquakes. However, the method results in larger displacements of superstructure segments increasing the probability of pounding between them. Reports after severe ground motions show that the earthquake-induced structural pounding may lead to significant damage in isolated bridges....
-
Development of tools for road infrastructure safety management for the provinces (voivodeships) in Poland
PublicationThe development of modern tools for road infrastructure safety management will help to reduce the number of fatalities and serious injuries as one of the main objectives adopted in 2013 in the National Road Safety Programme 2014-2020 and the new Road Safety Programme 2011-2020 in the EU. Risk Management in Highway Engineering can be applied in developing tools essential in the process of safety management. Risk Management in Highway...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
A more colorful hat problem
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. We consider a generalized hat...
-
The hat problem on cycles on at least nine vertices
PublicationThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. In this version every player...
-
Reliability model of slide bearings with particular attention given to lubricating oil
PublicationThe paper presents the slide bearing with circulating lubrication as a system of series three-element structure, where lubricating oil is the weakest link. In accordance with the Pierce statement that ''strength of chain is the strength of its weakest link'', a bearing reliability model has been developed. It allows to use the lubricating oil to evaluate the probability of correct working of the whole slide bearing, i.e. the reliability....
-
A Framework for Searching in Graphs in the Presence of Errors
PublicationWe consider a problem of searching for an unknown target vertex t in a (possibly edge-weighted) graph. Each vertex-query points to a vertex v and the response either admits that v is the target or provides any neighbor s of v that lies on a shortest path from v to t. This model has been introduced for trees by Onak and Parys [FOCS 2006] and for general graphs by Emamjomeh-Zadeh et al. [STOC 2016]. In the latter, the authors provide...
-
The point estimate method in a reticulated shell reliability analysis
PublicationThe objective of this paper is to present an application of the point estimate method (PEM) that can determine the probabilistic moments for engineering structures. The method is reasonably robust and adequately accurate for a wide range of practical problems. It is a special case of numerical quadrature based on orthogonal polynomials. The main advantage of this method is that, unlike FORM or SORM, it is not necessary to carry...
-
AN ALGORITHM FOR PORTAL HYPERTENSIVE GASTROPATHY RECOGNITION ON THE ENDOSCOPIC RECORDINGS
PublicationSymptoms recognition of portal hypertensive gastropathy (PHG) can be done by analysing endoscopic recordings, but manual analysis done by physician may take a long time. This increases probability of missing some symptoms and automated methods may be applied to prevent that. In this paper a novel hybrid algorithm for recognition of early stage of portal hypertensive gastropathy is proposed. First image preprocessing is described....
-
Effects of subfilter velocity modelling on dispersed phase in LES of heated channel flow
PublicationA non-isothermal turbulent flow with the dispersed phase is modelled using the Large Eddy Simulation (LES) approach for fluid, one-way coupled with the equations of point-particle evolution. The channel is heated at both walls and isoflux boundary conditions are applied for fluid. Particle velocity and thermal statistics are computed. Of particular interest are the r.m.s. profiles and the probability density function of particle...
-
A non-adiabatic wavepacket dynamical study of the low energy chargetransfer process in the S3+ + H collision
PublicationThe collisional system S3+ + H?S2+ + H+ has been studied using a time-dependent wavepacket methodologyin two-dimensions. Using available potential energy surfaces and coupling matrix elementsobtained from multireference ab initio calculations, five non-adiabatically coupled electronic states of1P symmetry have been included in the dynamical simulations. The collision has been studied in thelow energy regime of 1-10 eV. The wavepacket...
-
Toward Human Chromosome Knowledge Engine
PublicationHuman chromosomes carry genetic information about our life. Chromosome classification is crucial for karyotype analysis. Existing chromosome classification methods do not take into account reasoning, such as: analyzing the relationship between variables, modeling uncertainty, and performing causal reasoning. In this paper, we introduce a knowledge engine for reasoning-based human chromosome classification that stores knowledge...
-
Application of Bayesian Networks in risk diagnostics arising from the degree of urban regeneration area degradation
PublicationUrban regeneration as a complex project, generates many extremely specific threats affecting the increase of investment risk. Its unique nature causes that probability parameter, normally applied in the process of risk quantification, is extremely difficult to estimate. Due to lack of historical data urban regeneration related activities are therefore associated with uncertainty. According to the authors, a useful tool for resolving...
-
Application of BN in Risk Diagnostics Arising from the Degree of Urban Regeneration Area Degradation
PublicationUrban regeneration as a complex project, generates many extremely specific threats affecting the increase of investment risk. Its unique nature causes that probability parameter, normally applied in the process of risk quantification, is extremely difficult to estimate. Due to lack of historical data urban regeneration related activities are therefore associated with uncertainty. According to the authors, a useful tool for resolving...
-
Możliwość oszacowania niezawodności silników o zapłonie samoczynnym z zastosowaniem teorii procesów semi-Markowa oraz podejmowania decyzji eksploatacyjnych z uwzględnieniem wiarygodności diagnozy o stanie technicznym tego rodzaju silników spalinowych = Possibility of estimating the reliability of diesel engines by applying the theory of semi-Markov processes and making operational decisions by considering reliability of diagnosis on technical state of this sort of combustion engines/
PublicationThe paper presents semi-Markov models of technical state transitions for diesel engines, useful for determining reliability of the engines. A possibility of application of a three-state model with a simplified matrix function, or even a two-state model, to determine reliability of the engines, has been described herein on examples of known from literature semi-Markov models, for the case when appropriate diagnosing systems (SDG)...