Search results for: LEARNING-BY-DOING METHOD
-
Path-based methods on categorical structures for conceptual representation of wikipedia articles
PublicationMachine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....
-
IFE: NN-aided Instantaneous Pitch Estimation
PublicationPitch estimation is still an open issue in contemporary signal processing research. Nowadays, growing momentum of machine learning techniques application in the data-driven society allows for tackling this problem from a new perspective. This work leverages such an opportunity to propose a refined Instantaneous Frequency and power based pitch Estimator method called IFE. It incorporates deep neural network based pitch estimation...
-
Data-driven models for fault detection using kernel pca:a water distribution system case study
PublicationKernel Principal Component Analysis (KPCA), an example of machine learning, can be considered a non-linear extension of the PCA method. While various applications of KPCA are known, this paper explores the possibility to use it for building a data-driven model of a non-linear system-the water distribution system of the Chojnice town (Poland). This model is utilised for fault detection with the emphasis on water leakage detection....
-
Instructor Presence in Video Lectures: Preliminary Findings From an Online Experiment
PublicationMotivation. Despite the widespread use of video lectures in online and blended learning environments, there is still debate whether the presence of an instructor in the video helps or hinders learning. According to social agency theory, seeing the instructor makes learners believe that s/he is personally teaching them, which leads to deeper cognitive processing and, in turn, better learning outcomes. Conversely, according to cognitive...
-
Detection of Alzheimer's disease using Otsu thresholding with tunicate swarm algorithm and deep belief network
PublicationIntroduction: Alzheimer’s Disease (AD) is a degenerative brain disorder characterized by cognitive and memory dysfunctions. The early detection of AD is necessary to reduce the mortality rate through slowing down its progression. The prevention and detection of AD is the emerging research topic for many researchers. The structural Magnetic Resonance Imaging (sMRI) is an extensively used imaging technique in detection of AD, because...
-
Semantic segmentation training using imperfect annotations and loss masking
PublicationOne of the most significant factors affecting supervised neural network training is the precision of the annotations. Also, in a case of expert group, the problem of inconsistent data annotations is an integral part of real-world supervised learning processes, well-known to researchers. One practical example is a weak ground truth delineation for medical image segmentation. In this paper, we have developed a new method of accurate...
-
Multimedia polysensory integration training system dedicated to children with educational difficulties
PublicationThis paper aims at presenting a multimedia system providing polysensory train- ing for pupils with educational difficulties. The particularly interesting aspect of the system lies in the sonic interaction with image projection in which sounds generated lead to stim- ulation of a particular part of the human brain. The system architecture, video processing methods, therapeutic exercises and guidelines for children’s interaction...
-
Vehicle detector training with labels derived from background subtraction algorithms in video surveillance
PublicationVehicle detection in video from a miniature station- ary closed-circuit television (CCTV) camera is discussed in the paper. The camera provides one of components of the intelligent road sign developed in the project concerning the traffic control with the use of autonomous devices being developed. Modern Convolutional Neural Network (CNN) based detectors need big data input, usually demanding their manual labeling. In the presented...
-
Transformational leadership for researcher’s innovativeness in the context of tacit knowledge and change adaptability
PublicationThis study explores how a learning culture supported by transformational leadership influences tacit knowledge sharing and change adaptability in higher education and how these relations impact this sector’s internal and external innovativeness. The empirical model was tested on a sample of 368 Polish scientific staff using the structural equation modeling (SEM) method. Then results were expanded by applying OLS regression using...
-
Toward Intelligent Recommendations Using the Neural Knowledge DNA
PublicationIn this paper we propose a novel recommendation approach using past news click data and the Neural Knowledge DNA (NK-DNA). The Neural Knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for news recommendation tasks on the MIND benchmark dataset. By taking advantages of NK-DNA, deep...
-
Hybrid Laboratory of Radio Communication With Online Simulators and Remote Access
PublicationContribution: Two toolsets for the remote teaching of radio communication laboratory classes: 1) online simulators for individual work of students and 2) a remote access system to laboratory workstations for group work. Initial assumptions and method of implementation of both tools are presented. Background: The COVID-19 pandemic has forced a change in teaching at all levels of education. The specificity of practical classes, such...
-
Comparative Analysis of Text Representation Methods Using Classification
PublicationIn our work, we review and empirically evaluate five different raw methods of text representation that allow automatic processing of Wikipedia articles. The main contribution of the article—evaluation of approaches to text representation for machine learning tasks—indicates that the text representation is fundamental for achieving good categorization results. The analysis of the representation methods creates a baseline that cannot...
-
Switched-capacitor DC-DC converters in arbitrary switching mode - topologically derived resistive models based on incremental graph approach.
PublicationIn the preceding paper we reviewed some of modeling approaches aimed at systematic formulation and solution of switched capacitor DC-DC converters. In our review, special attention was paid to computationally efficient and mathematically elegant methods. In so doing we had tried to demonstrate the virtues of unified Incremental Graph (IG) approach. Incremental Graph is, in concept, a tool originally created for analysis and synthesis...
-
Context of Digitalized Employment for Older Adults with Autism Spectrum Disorder in the New Normal
PublicationEmployers are actively considering how to normalize remote work technology across different industries. The residual risk of coronavirus disease-19 (COVID-19) will necessarily lower the bar for allowing some workers to stay remote on a more permanent basis. This is based on the realization that many essential jobs can be teleworked while retaining or enhancing productivity. The decisions employers make regarding future work arrangements...
-
Optical glyphs based localization and identification system
PublicationThe paper presents a description of functioning of a platform supporting the detection of obstructive diseases in the respiratory system education process. A 16-parameter model of the respiratory system simulated in the MATLAB/Simulink environment was set in the role of the tested patient. It has been linked to the control layer, developed in the LabVIEW environment, using the SIT library (Simulation Interface Toolkit). This layer...
-
An application supporting the educational process of the respiratory system obstructive diseases detection
PublicationThe paper presents a description of functioning of a platform supporting the detection of obstructive diseases in the respiratory system education process. A 16-parameter model of the respiratory system simulated in the MATLAB/Simulink environment was set in the role of the tested patient. It has been linked to the control layer, developed in the LabVIEW environment, using the SIT library (Simulation Interface Toolkit). This layer...
-
Will NILM Technology Replace Multi-Meter Telemetry Systems for Monitoring Electricity Consumption?
PublicationThe estimation of electric power utilization, its baseload, and its heating, light, ventilation, and air-conditioning (HVAC) power component, which represents a very large portion of electricity usage in commercial facilities, are important for energy consumption controls and planning. Non-intrusive load monitoring (NILM) is the analytical method used to monitor the energy and disaggregate total electrical usage into appliance-related...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Concurrent Video Denoising and Deblurring for Dynamic Scenes
PublicationDynamic scene video deblurring is a challenging task due to the spatially variant blur inflicted by independently moving objects and camera shakes. Recent deep learning works bypass the ill-posedness of explicitly deriving the blur kernel by learning pixel-to-pixel mappings, which is commonly enhanced by larger region awareness. This is a difficult yet simplified scenario because noise is neglected when it is omnipresent in a wide...
-
Identification of category associations using a multilabel classifier
PublicationDescription of the data using categories allows one to describe it on a higher abstraction level. In this way, we can operate on aggregated groups of the information, allowing one to see relationships that do not appear explicit when we analyze the individual objects separately. In this paper we present automatic identification of the associations between categories used for organization of the textual data. As experimental data...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Autoencoder application for anomaly detection in power consumption of lighting systems
PublicationDetecting energy consumption anomalies is a popular topic of industrial research, but there is a noticeable lack of research reported in the literature on energy consumption anomalies for road lighting systems. However, there is a need for such research because the lighting system, a key element of the Smart City concept, creates new monitoring opportunities and challenges. This paper examines algorithms based on the deep learning...
-
Classification of Covid-19 using Differential Evolution Chaotic Whale Optimization based Convolutional Neural Network
PublicationCOVID-19, also known as the Coronavirus disease-2019, is an transferrable disease that spreads rapidly, affecting countless individuals and leading to fatalities in this worldwide pandemic. The precise and swift detection of COVID-19 plays a crucial role in managing the pandemic's dissemination. Additionally, it is necessary to recognize COVID-19 quickly and accurately by investigating chest x-ray images. This paper proposed a...
-
Detection of Anomalies in the Operation of a Road Lighting System Based on Data from Smart Electricity Meters
PublicationSmart meters in road lighting systems create new opportunities for automatic diagnostics of undesirable phenomena such as lamp failures, schedule deviations, or energy theft from the power grid. Such a solution fits into the smart cities concept, where an adaptive lighting system creates new challenges with respect to the monitoring function. This article presents research results indicating the practical feasibility of real‐time...
-
Proposition of the methodology for Data Acquisition, Analysis and Visualization in support of Industry 4.0
PublicationIndustry 4.0 offers a comprehensive, interlinked, and holistic approach to manufacturing. It connects physical with digital and allows for better collaboration and access across departments, partners, vendors, product, and people. Consequently, it involves complex designing of highly specialized state of the art technologies. Thus, companies face formidable challenges in the adoption of these new technologies....
-
A Numerical Study on Baseline-Free Damage Detection Using Frequency Steerable Acoustic Transducers
PublicationIn structural health monitoring (SHM) a considerable amount of damage detection algorithms based on guided waves (GW) have been developed. Most of them rely on extensive transducer networks, besides preliminary reference measurements of the structures. This originated a growing demand for hardware simplification and cost reduction of the wave-based SHM methods, driving the conception of new solutions enabling both: the reduction...
-
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublicationThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Topological-numerical analysis of a two-dimensional discrete neuron model
PublicationWe conduct computer-assisted analysis of a two-dimensional model of a neuron introduced by Chialvo in 1995 [Chaos, Solitons Fractals 5, 461–479]. We apply the method of rigorous analysis of global dynamics based on a set-oriented topological approach, introduced by Arai et al. in 2009 [SIAM J. Appl. Dyn. Syst. 8, 757–789] and improved and expanded afterward. Additionally, we introduce a new algorithm to analyze the return times...
-
Multiplicative Long Short-Term Memory with Improved Mayfly Optimization for LULC Classification
PublicationLand Use and Land Cover (LULC) monitoring is crucial for global transformation, sustainable land control, urban planning, urban growth prediction, and the establishment of climate regulations for long-term development. Remote sensing images have become increasingly important in many environmental planning and land use surveys in recent times. LULC is evaluated in this research using the Sat 4, Sat 6, and Eurosat datasets. Various...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Leveraging spatio-temporal features for joint deblurring and segmentation of instruments in dental video microscopy
PublicationIn dentistry, microscopes have become indispensable optical devices for high-quality treatment and micro-invasive surgery, especially in the field of endodontics. Recent machine vision advances enable more advanced, real-time applications including but not limited to dental video deblurring and workflow analysis through relevant metadata obtained by instrument motion trajectories. To this end, the proposed work addresses dental...
-
Individual entrepreneurial orientation: comparison of business and STEM students
PublicationAbstract Purpose – The purpose of this study is to determine whether there are differences in Individual Entrepreneurial Orientation (IEO) between students who are doing their major in business studies and the ones whose areas of study are science, technology, engineering, and mathematics (STEM). Design/methodology/approach – The current research investigates which factors and components contribute to EO orientation development...
-
Leadership, culture, intellectual capital and knowledge processes for organizational innovativeness across industries: the case of Poland
PublicationPurpose – This study aims to present the overview of intellectual capital creation micro-mechanisms concerning formal and informal knowledge processes. The organizational culture, transformational leadership and innovativeness are also included in the investigation as ascendants and consequences of the focal relation of intellectual capital and knowledge processes. Design/methodology/approach – Based on a sample of 1,418 Polish...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Application of autoencoder to traffic noise analysis
PublicationThe aim of an autoencoder neural network is to transform the input data into a lower-dimensional code and then to reconstruct the output from this code representation. Applications of autoencoders to classifying sound events in the road traffic have not been found in the literature. The presented research aims to determine whether such an unsupervised learning method may be used for deploying classification algorithms applied to...
-
A New Rehabilitation Device for Balance Impaired Individuals
PublicationIn the paper authors present a device designed to improve the rehabilitation process of people with balance impairment. The discussed device (JStep) utilizes a commercially available static standing frame (stander) modified in order to fit force sensing units under the feet and in the pillows around the hips of a patient. While executing rehabilitation tasks, the patient may compensate his balance deficiency by leaning on the pillows...
-
Managing Unemployment under COVID-19 Conditions (States of Emergency or Crisis)
PublicationRising unemployment is one of the consequences of the COVID-19 pandemic in many countries. This, in turn, has forcedpolicymakers to respond immediately with policy tools to minimize unemployment. The purpose of our study is to contribute toempirical knowledge by looking at activities of 40 local government units to counteract unemployment in the cross-border regionon the Polish side. In doing this, our study contributes to the...
-
Beyond quid pro quo: good soldiers and characteristics of their helping behaviours
PublicationPurpose – Good soldiers are people who engage in citizenship behaviours “to do good” instead of “to look good”. The purpose of this article is to explore the motivations behind and the specific characteristics of behaviours of the good soldiers in the context of work using social exchange theory (SET) as a theoretical framework. Design/methodology/approach – 47 dyadic interviews with 94 individuals from three organisations...
-
Neurodiversity and remote work in times of crisis: lessons for HR
PublicationPurpose The rich qualitative study builds on 11 semi-structured interviews with nine neurodivergent employees and two business professionals supportive of neurodiversity to understand the lived experiences of dealing with crisis in a remote working environment. Design/methodology/approach The purpose of the reported research is to understand how neurominorities experience remote working in the times of crisis and what the implications...
-
Creating Shared Value by the University
PublicationPurpose Works that link creating shared value (CSV) with the university are arising, and there is a hope for a great future of this combination. The main problem with these works is that they are based on the wrong assumptions of what CSV is. The aim of the paper is to properly explain the concept of CSV and match it with university social responsibility (USR) at a strategic level. Design/methodology/approach A literature review...
-
Comparing the Effectiveness of ANNs and SVMs in Forecasting the Impact of Traffic-Induced Vibrations on Building
PublicationTraffic - induced vibrations may cause damage to structural elements and may even lead to structural collapse. The aim of the article is to compare the effectiveness of algorithms in forecasting the impact of vibrations on buildings using the Machine Learning (ML) methods. The paper presents two alternative approaches by using Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). Factors that may affect traffic-induced...
-
Convolutional Neural Networks for C. Elegans Muscle Age Classification Using Only Self-Learned Features
PublicationNematodes Caenorhabditis elegans (C. elegans) have been used as model organisms in a wide variety of biological studies, especially those intended to obtain a better understanding of aging and age-associated diseases. This paper focuses on automating the analysis of C. elegans imagery to classify the muscle age of nematodes based on the known and well established IICBU dataset. Unlike many modern classification methods, the proposed...
-
Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks
PublicationThe construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....
-
Architectural Modifications to Enhance Steganalysis with Convolutional Neural Networks
PublicationThis paper investigates the impact of various modifications introduced to current state-of-the-art Convolutional Neural Network (CNN) architectures specifically designed for the steganalysis of digital images. Usage of deep learning methods has consistently demonstrated improved results in this field over the past few years, primarily due to the development of newer architectures with higher classification accuracy compared to...
-
Buried Object Characterization Using Ground Penetrating Radar Assisted by Data-Driven Surrogate-Models
PublicationThis work addresses artificial-intelligence-based buried object characterization using 3-D full-wave electromagnetic simulations of a ground penetrating radar (GPR). The task is to characterize cylindrical shape, perfectly electric conductor (PEC) object buried in various dispersive soil media, and in different positions. The main contributions of this work are (i) development of a fast and accurate data driven surrogate modeling...
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
How do responsible universities perceive their social engagement? In search of signs of Creating Shared Value by the University
PublicationObjectives: University social responsibility still lacks legitimisation and is perceived as a burden that hinders academics from doing research and teaching. Creating Shared Value by the University may serve as a tool to motivate universities to engage in initiatives for society, as this is beneficial for both parties. Yet, some researchers perceive the creation of economic value as inappropriate for academia. Thus, it was interesting...
-
The Education of Analytical Chemists in Polish Universities
PublicationAnalytical Chemistry plays a very important role in the modern world. The main reasons are; the need of environmental monitoring, quality of food and water control, human health, quality of industrial production control, nanotechnologies and material science. Together with Inorganic Chemistry, Organic Chemistry and Physical Chemistry, Analytical Chemistry is a fundamental chemical course. The education of Analytical Chemists is...
-
Voice command recognition using hybrid genetic algorithm
PublicationAbstract: Speech recognition is a process of converting the acoustic signal into a set of words, whereas voice command recognition consists in the correct identification of voice commands, usually single words. Voice command recognition systems are widely used in the military, control systems, electronic devices, such as cellular phones, or by people with disabilities (e.g., for controlling a wheelchair or operating a computer...