Search results for: LABORATORY CLASSES
-
Action Plan “Women”
PublicationEmployees of a company are not the first alternative coming into one’s mind when searching suitable successor for the business. Those belonging to the company’s management group are in many cases asked for their interest in being a successor, but the lower level an employee is in the hierarchy, the less probably he/she is inquired of his/her interest in becoming a successor. The contemporary entrepreneur may have had conflicts...
-
Paired domination subdivision and multisubdivision numbers of graphs
PublicationThe paired domination subdivision number sdpr(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the paired domination number of G. We prove that the decision problem of the paired domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the paired domination muttisubdivision number of a nonempty graph...
-
QoS Extensions for Flow-Awareness Networks
PublicationThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Dataset Related Experimental Investigation of Chess Position Evaluation Using a Deep Neural Network
PublicationThe idea of training Articial Neural Networks to evaluate chess positions has been widely explored in the last ten years. In this paper we investigated dataset impact on chess position evaluation. We created two datasets with over 1.6 million unique chess positions each. In one of those we also included randomly generated positions resulting from consideration of potentially unpredictable chess moves. Each position was evaluated...
-
Tagged images with LEGO bricks moving on the conveyor belt
Open Research DataThe data set conatins tagged images conatining LEGO bricks used for traning LEGO bricks detecting network. The dataset contains frames taken from video recordings of lego bricks moving on a conveyor belt. The images conatin from 0 to 7 bricks. In total there are 5459 tagged lego bricks in 4340 images and 3390 images without any bricks in them. The images...
-
"Shaping space" programme as a tool for educating youth about architecture
PublicationThe Polish Architectural Policy’s vision of a systematic promotion of spatial culture has made its way into the national curriculum for 2009 – 2016 designed for various stages of child and teenager education. The objective of this effort was to furnish a basis for a system of architectural education which allows teaching society to be more conscious in their decisions as to spatial order with the effect of improving the quality...
-
Two examples of Quantum Dynamical Semigroups
PublicationThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
The computational complexity of the backbone coloring problem for planar graphs with connected backbones
PublicationIn the paper we study the computational complexity of the backbone coloring problem for planar graphs with connected backbones. For every possible value of integer parameters λ≥2 and k≥1 we show that the following problem: Instance: A simple planar graph GG, its connected spanning subgraph (backbone) HH. Question: Is there a λ-backbone coloring c of G with backbone H such that maxc(V(G))≤k? is either NP-complete or polynomially...
-
Set of Experience and Decisional DNA: Experience-Based Knowledge Structures
PublicationThis chapter presents a description of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA), argumentation for a knowledge representation, composition, configuration and metrics. SOEKS is a combination of filtered and amalgamated information obtained from formal decision events. It facilitates effective explicit representation of decisional experience taken from different technologies. SOEKS comprises variables,...
-
Lighting requirements for pedestrian crossings - positive contrast
PublicationFor many years now in Poland there has been a large number of road accidents at pedestrian crossings during night periods [5, 11]. One of the technical solutions that can improve this condition is the use of proper lighting for pedestrian crossings. The designated pedestrian crossing should be visible in different weather conditions and at different times of the day. In case of night vision restrictions use artificial lighting...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Explicit solvent repulsive scaling replica exchange molecular dynamics ( RS‐REMD ) in molecular modeling of protein‐glycosaminoglycan complexes
PublicationGlycosaminoglcyans (GAGs), linear anionic periodic polysaccharides, are crucial for many biologically relevant functions in the extracellular matrix. By interacting with proteins GAGs mediate processes such as cancer development, cell proliferation and the onset of neurodegenerative diseases. Despite this eminent importance of GAGs, they still represent a limited focus for the computational community in comparison to other classes...
-
Potential and Use of the Googlenet Ann for the Purposes of Inland Water Ships Classification
PublicationThis article presents an analysis of the possibilities of using the pre-degraded GoogLeNet artificial neural network to classify inland vessels. Inland water authorities monitor the intensity of the vessels via CCTV. Such classification seems to be an improvement in their statutory tasks. The automatic classification of the inland vessels from video recording is a one of the main objectives of the Automatic Ship Recognition and...
-
Analysis of MArkers of Exposure to Constituents of Environmental Tobacco Smoke (ETS)
PublicationTobacco smoke is a complex mixture of more than 4000 chemical compounds, many of which are harmful to human health. These compounds belong to various chemical classes, including amides, imides, lactams, carboxylic acids, aldehydes, ketones, alcohols, phenols, amines, hydrocarbons, ethers, and inorganic compounds. There are three types of tobacco smoke streams: the mainstream, the sidestream, and environmental tobacco smoke (ETS)....
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Food Classification from Images Using a Neural Network Based Approach with NVIDIA Volta and Pascal GPUs
PublicationIn the paper we investigate the problem of food classification from images, for the Food-101 dataset extended with 31 additional food classes from Polish cuisine. We adopted transfer learning and firstly measured training times for models such as MobileNet, MobileNetV2, ResNet50, ResNet50V2, ResNet101, ResNet101V2, InceptionV3, InceptionResNetV2, Xception, NasNetMobile and DenseNet, for systems with NVIDIA Tesla V100 (Volta) and...
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublicationTwo mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...
-
On Computational Aspects of Greedy Partitioning of Graphs
PublicationIn this paper we consider a problem of graph P-coloring consisting in partitioning the vertex set of a graph such that each of the resulting sets induces a graph in a given additive, hereditary class of graphs P. We focus on partitions generated by the greedy algorithm. In particular, we show that given a graph G and an integer k deciding if the greedy algorithm outputs a P-coloring with a least k colors is NP-complete for an infinite...
-
Extended investigation of performance-energy trade-offs under power capping in HPC environments
Publication—In the paper we present investigation of performance-energy trade-offs under power capping using modern processors. The results are presented for systems targeted at both server and client markets and were collected from Intel Xeon E5 and Intel Xeon Phi server processors as well as from desktop and mobile Intel Core i7 processors. The results, when using power capping, show that we can find various interesting combinations of...
-
Anomalous Behavior of Hyaluronan Crosslinking Due to the Presence of Excess Phospholipids in the Articular Cartilage System of Osteoarthritis
PublicationLubrication of articular cartilage is a complex multiscale phenomenon in synovial joint organ systems. In these systems, synovial fluid properties result from synergistic interactions between a variety of molecular constituent. Two molecular classes in particular are of importance in understanding lubrication mechanisms: hyaluronic acid and phospholipids. The purpose of this study is to evaluate interactions between hyaluronic acid...
-
Improving css-KNN Classification Performance by Shifts in Training Data
PublicationThis paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...
-
The structure of revenues of non-public universities in 2010 from didactic activity by sources of financing (in%)
Open Research DataIncome from teaching activities of non-public universities accounted for almost 1/5 of income from teaching activities of all types of universities. Non-public universities generated the highest revenues from fees for teaching classes, which accounted for over half of the revenues from this title in relation to all universities.The average cost of education...
-
On the size of identifying codes in triangle-free graphs
PublicationIn an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...
-
Analysis of the impact of AOP on source code quality: Paradox of aspect-oriented separation of concerns
PublicationAlmost four decades ago, Parnas advocated modularity for the sake of changeability, independent development, and comprehensibility. The recipe for modularization is to define a clean interface, hide an implementation detail, keep low coupling and high cohesion. Although modules have taken many forms over the years from functions and procedures to classes, no form has been capable of expressing so-called crosscutting concerns in...
-
Time-domain description of point-source acoustic wavefields as a useful approach in ultrasonic techniques
PublicationIn traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...
-
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
PublicationIn this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...
-
Time-Domain Description of Point-Source Acoustic Wavefields as a Useful Approach in Ultrasonic Techniques
PublicationIn traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...
-
Double bondage in graphs
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...
-
In search of the new: American volunteers’ opinions about their participation in the Teaching English in Poland (TEIP) Program
PublicationThe Teaching English in Poland (TEIP) program relies on summer camps during which native English speakers, American volunteers, teach Polish children and adolescents using the language immersion method – during everyday activities, sports and art classes, and similar occasions. A vital aspect of the evaluation of the program is researching its impact on the young people; however, the opinions of the volunteers regarding their...
-
Determining pesticide contamination in honey by LC-ESI-MS/MS - Comparison of pesticide recoveries of two liquid-liquid extraction based approaches
PublicationHoney, a valuable food product, may be contaminated by xenobiotics during its production and/or harvest. The determination of trace levels of contaminants in a complex matrix like honey still presents a challenge to analytical chemists. The aim of this work was to assess and compare the extraction efficiencies of 30 pesticide residues (acaricides, insecticides, herbicides, fungicides), belonging to over 15 different chemical classes....
-
Assessment of Lipophilicity Indices Derived from Retention Behavior of Antioxidant Compounds in RP-HPLC
PublicationReverse phase high pressure liquid chromatography was employed in order to evaluate the lipophilicity of antioxidant compounds from different classes, such as phenolic acids, flavanones, flavanols, flavones, anthocyanins, stilbenes, xantonoids, and proanthocyanidins. The retention time of each compound was measured using five different HPLC columns: RP18 (LiChroCART, Purosphere RP-18e), C8 (Zorbax, Eclipse XDBC8), C16-Amide (Discovery...
-
Automatic labeling of traffic sound recordings using autoencoder-derived features
PublicationAn approach to detection of events occurring in road traffic using autoencoders is presented. Extensions of existing algorithms of acoustic road events detection employing Mel Frequency Cepstral Coefficients combined with classifiers based on k nearest neighbors, Support Vector Machines, and random forests are used. In our research, the acoustic signal gathered from the microphone placed near the road is split into frames and converted...
-
Separability Assessment of Selected Types of Vehicle-Associated Noise
PublicationMusic Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...
-
Lipidomics of Staphylococcus aureus – a new insight into the antibiotic resistant phenotype
PublicationStaphylococcus aureus is an aggressive pathogen responsible for a variety of diseases, in cluding life-threatening sepsis. Many strains of these bacteria are resistant to multiple classes of antibiotics, which is a substantial clinical problem in the treatment of S. aureus infections. We developed a comprehensive untargeted lipidomic workflow, including sample preparation, liquid chromatography-quadrupole-time-of-flight mass spectrometry...
-
Identification of synergistic and antagonistic actions of environmental pollutants: Bisphenols A, S and F in the presence of DEP, DBP, BADGE and BADGE·2HCl in three component mixtures
PublicationEcosystems are facing increased pressure due to the emission of many classes of emerging contaminants. However, very little is known about the interactions of these pollutants, such as bisphenols (BPs), plasticizers or pharmaceuticals. By employing bioluminescent bacteria (Microtox assay), we were able to define interactions between selected emerging pollutants (namely BPA, BPS, BPF, BADGE, BADGE·2HCl, DEP, DBP) in ternary mixtures, at...
-
Levels of creativity in architectural education
PublicationArchitectural design combines engineering science and art, thus stimulating creativity is a challenge in the didactic process. There are various levels of creativity that can be attained through architectural education. From idea to architecture (FITA) is a teaching method based on metaphorical and analogical reasoning that was developed, implemented and tested during architectural design classes in the Faculty of Architecture...
-
Theory versus experiment for vacuum Rabi oscillations in lossy cavities. II. Direct test of uniqueness of vacuum
PublicationThe paper continues the analysis of vacuum Rabi oscillations we started in part I [Phys. Rev. A 79, 033836 (2009)]. Here we concentrate on experimental consequences for cavity QED of two different classes of representations of harmonic-oscillator Lie algebras. The zero-temperature master equation, derived in part I for irreducible representations of the algebra, is reformulated in a reducible representation that models electromagnetic...
-
Non-isolating bondage in graphs
PublicationA dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...
-
Non-isolating 2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublicationIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Robustness in Compressed Neural Networks for Object Detection
PublicationModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
Edge coloring of graphs of signed class 1 and 2
PublicationRecently, Behr (2020) introduced a notion of the chromatic index of signed graphs and proved that for every signed graph (G, σ) it holds that ∆(G) ≤ χ′(G,σ) ≤ ∆(G) + 1, where ∆(G) is the maximum degree of G and χ′ denotes its chromatic index. In general, the chromatic index of (G, σ) depends on both the underlying graph G and the signature σ. In the paper we study graphs G for which χ′(G, σ) does not depend on σ. To this aim we...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen AMA1-MIC3-ROP1
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen SAG1-SAG2-GRA7
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen SAG1-SAG2-AMA1F
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen SAG1-SAG2-P35
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen SAG1-SAG2-GRA9
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...
-
Construction, production and evaluation of the diagnostic utility of a recombinant Toxoplasma gondii chimeric antigen SAG1-SAG2-GRA6
Open Research DataThe intracellular parasite Toxoplasma gondii has the ability to infect a wide range of warm-blooded animals, including humans. Currently, diagnosis of toxoplasmosis is based mainly on the use of the native antigens in enzyme immunoassay which allow for detection of IgG, IgM and IgA antibody classes. However, in some cases the performed studies give...