Search results for: LABORATORY CLASSES
-
Difference in Perceived Speech Signal Quality Assessment Among Monolingual and Bilingual Teenage Students
PublicationThe user perceived quality is a mixture of factors, including the background of an individual. The process of auditory perception is discussed in a wide variety of fields, ranging from engineering to medicine. Many studies examine the difference between musicians and non-musicians. Since musical training develops musical hearing and other various auditory capabilities, similar enhancements should be observable in case of bilingual...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublicationDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Application Isssues of the Semi-Markov Reliability Model
PublicationPredicting the reliability of marine internal combustion engines, for instance, is of particular importance, as it makes it possible to predict their future reliability states based on the information on the past states. Correct reliability prediction is a complex process which consists in processing empirical results obtained from operating practice, complemented by analytical considerations. The process of technical state changes...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
NLP Questions Answering Using DBpedia and YAGO
PublicationIn this paper, we present results of employing DBpedia and YAGO as lexical databases for answering questions formulated in the natural language. The proposed solution has been evaluated for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference). Our method uses dependency trees generated from the user query. The trees are browsed for paths leading from the root of the tree to the question...
-
Applying case studies to teaching architectural investment
PublicationCase studies enable students to encounter practical issues during their education. Experiments conducted in class employing this method often feature simplified models of real-world situations. However, they still enable students to encounter actual problems, to which theoretical knowledge is applied. In architectural education, students carrying out semester projects usually rely on data provided by the teacher, without wondering...
-
Virtual reality technology in architectural education
PublicationContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublicationBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Dataset Related Experimental Investigation of Chess Position Evaluation Using a Deep Neural Network
PublicationThe idea of training Articial Neural Networks to evaluate chess positions has been widely explored in the last ten years. In this paper we investigated dataset impact on chess position evaluation. We created two datasets with over 1.6 million unique chess positions each. In one of those we also included randomly generated positions resulting from consideration of potentially unpredictable chess moves. Each position was evaluated...
-
The exposure to UV filters: Prevalence, effects, possible molecular mechanisms of action and interactions within mixtures
PublicationSubstances that can absorb sunlight and harmful UV radiation such as organic UV filters are widely used in cosmetics and other personal care products. Since humans use a wide variety of chemicals for multiple purposes it is common for UV filters to co-occur with other substances either in human originating specimens or in the environment. There is increasing interest in understanding such co-occurrence in form of potential synergy, antagonist,...
-
DBpedia and YAGO Based System for Answering Questions in Natural Language
PublicationIn this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...
-
Learning design of a blended course in technical writing
PublicationBlending face-to-face classes with e-learning components can lead to a very successful outcome if the blend of approaches, methods, content, space, time, media and activities is carefully structured and approached from both the student’s and the tutor’s perspective. In order to blend synchronous and asynchronous e-learning activities with traditional ones, educators should make them inter-dependent and develop them according to...
-
Visual Content Learning in a Cognitive Vision Platform for Hazard Control (CVP-HC)
PublicationThis work is part of an effort for the development of a Cognitive Vision Platform for Hazard Control (CVP-HC) for applications in industrial workplaces, adaptable to a wide range of environments. The paper focuses on hazards resulted from the nonuse of personal protective equipment (PPE). Given the results of previous analysis of supervised techniques for the problem of classification of a few PPE (boots, hard hats, and gloves...
-
From unextendible product bases to genuinely entangled subspaces
PublicationUnextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...
-
Automatic Clustering of EEG-Based Data Associated with Brain Activity
PublicationThe aim of this paper is to present a system for automatic assigning electroencephalographic (EEG) signals to appropriate classes associated with brain activity. The EEG signals are acquired from a headset consisting of 14 electrodes placed on skull. Data gathered are first processed by the Independent Component Analysis algorithm to obtain estimates of signals generated by primary sources reflecting the activity of the brain....
-
Domination subdivision and domination multisubdivision numbers of graphs
PublicationThe domination subdivision number sd(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the domination number of G. It has been shown [10] that sd(T)<=3 for any tree T. We prove that the decision problem of the domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the domination multisubdivision number...
-
"Shaping space" programme as a tool for educating youth about architecture
PublicationThe Polish Architectural Policy’s vision of a systematic promotion of spatial culture has made its way into the national curriculum for 2009 – 2016 designed for various stages of child and teenager education. The objective of this effort was to furnish a basis for a system of architectural education which allows teaching society to be more conscious in their decisions as to spatial order with the effect of improving the quality...
-
Tagged images with LEGO bricks moving on the conveyor belt
Open Research DataThe data set conatins tagged images conatining LEGO bricks used for traning LEGO bricks detecting network. The dataset contains frames taken from video recordings of lego bricks moving on a conveyor belt. The images conatin from 0 to 7 bricks. In total there are 5459 tagged lego bricks in 4340 images and 3390 images without any bricks in them. The images...
-
Potential and Use of the Googlenet Ann for the Purposes of Inland Water Ships Classification
PublicationThis article presents an analysis of the possibilities of using the pre-degraded GoogLeNet artificial neural network to classify inland vessels. Inland water authorities monitor the intensity of the vessels via CCTV. Such classification seems to be an improvement in their statutory tasks. The automatic classification of the inland vessels from video recording is a one of the main objectives of the Automatic Ship Recognition and...
-
Explicit solvent repulsive scaling replica exchange molecular dynamics ( RS‐REMD ) in molecular modeling of protein‐glycosaminoglycan complexes
PublicationGlycosaminoglcyans (GAGs), linear anionic periodic polysaccharides, are crucial for many biologically relevant functions in the extracellular matrix. By interacting with proteins GAGs mediate processes such as cancer development, cell proliferation and the onset of neurodegenerative diseases. Despite this eminent importance of GAGs, they still represent a limited focus for the computational community in comparison to other classes...
-
Two examples of Quantum Dynamical Semigroups
PublicationThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
A business simulation method in educating architects
PublicationIn this article, the authors analyse the application of the business simulation method as a support tool in educating undergraduate architecture students. While running a fictional architectural practice, students learn about the role of an architect in the investment process and are introduced to economic aspects of running a small practice, including the importance of cash flow. They are also made aware about the importance of...
-
The computational complexity of the backbone coloring problem for planar graphs with connected backbones
PublicationIn the paper we study the computational complexity of the backbone coloring problem for planar graphs with connected backbones. For every possible value of integer parameters λ≥2 and k≥1 we show that the following problem: Instance: A simple planar graph GG, its connected spanning subgraph (backbone) HH. Question: Is there a λ-backbone coloring c of G with backbone H such that maxc(V(G))≤k? is either NP-complete or polynomially...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Set of Experience and Decisional DNA: Experience-Based Knowledge Structures
PublicationThis chapter presents a description of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA), argumentation for a knowledge representation, composition, configuration and metrics. SOEKS is a combination of filtered and amalgamated information obtained from formal decision events. It facilitates effective explicit representation of decisional experience taken from different technologies. SOEKS comprises variables,...
-
Lighting requirements for pedestrian crossings - positive contrast
PublicationFor many years now in Poland there has been a large number of road accidents at pedestrian crossings during night periods [5, 11]. One of the technical solutions that can improve this condition is the use of proper lighting for pedestrian crossings. The designated pedestrian crossing should be visible in different weather conditions and at different times of the day. In case of night vision restrictions use artificial lighting...
-
Segmentation-Based BI-RADS ensemble classification of breast tumours in ultrasound images
PublicationBackground: The development of computer-aided diagnosis systems in breast cancer imaging is exponential. Since 2016, 81 papers have described the automated segmentation of breast lesions in ultrasound images using arti- ficial intelligence. However, only two papers have dealt with complex BI-RADS classifications. Purpose: This study addresses the automatic classification of breast lesions into binary classes (benign vs. ma- lignant)...
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublicationTwo mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...
-
Analysis of MArkers of Exposure to Constituents of Environmental Tobacco Smoke (ETS)
PublicationTobacco smoke is a complex mixture of more than 4000 chemical compounds, many of which are harmful to human health. These compounds belong to various chemical classes, including amides, imides, lactams, carboxylic acids, aldehydes, ketones, alcohols, phenols, amines, hydrocarbons, ethers, and inorganic compounds. There are three types of tobacco smoke streams: the mainstream, the sidestream, and environmental tobacco smoke (ETS)....
-
Improving css-KNN Classification Performance by Shifts in Training Data
PublicationThis paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Anomalous Behavior of Hyaluronan Crosslinking Due to the Presence of Excess Phospholipids in the Articular Cartilage System of Osteoarthritis
PublicationLubrication of articular cartilage is a complex multiscale phenomenon in synovial joint organ systems. In these systems, synovial fluid properties result from synergistic interactions between a variety of molecular constituent. Two molecular classes in particular are of importance in understanding lubrication mechanisms: hyaluronic acid and phospholipids. The purpose of this study is to evaluate interactions between hyaluronic acid...
-
Food Classification from Images Using a Neural Network Based Approach with NVIDIA Volta and Pascal GPUs
PublicationIn the paper we investigate the problem of food classification from images, for the Food-101 dataset extended with 31 additional food classes from Polish cuisine. We adopted transfer learning and firstly measured training times for models such as MobileNet, MobileNetV2, ResNet50, ResNet50V2, ResNet101, ResNet101V2, InceptionV3, InceptionResNetV2, Xception, NasNetMobile and DenseNet, for systems with NVIDIA Tesla V100 (Volta) and...
-
On Computational Aspects of Greedy Partitioning of Graphs
PublicationIn this paper we consider a problem of graph P-coloring consisting in partitioning the vertex set of a graph such that each of the resulting sets induces a graph in a given additive, hereditary class of graphs P. We focus on partitions generated by the greedy algorithm. In particular, we show that given a graph G and an integer k deciding if the greedy algorithm outputs a P-coloring with a least k colors is NP-complete for an infinite...
-
Extended investigation of performance-energy trade-offs under power capping in HPC environments
Publication—In the paper we present investigation of performance-energy trade-offs under power capping using modern processors. The results are presented for systems targeted at both server and client markets and were collected from Intel Xeon E5 and Intel Xeon Phi server processors as well as from desktop and mobile Intel Core i7 processors. The results, when using power capping, show that we can find various interesting combinations of...
-
The structure of revenues of non-public universities in 2010 from didactic activity by sources of financing (in%)
Open Research DataIncome from teaching activities of non-public universities accounted for almost 1/5 of income from teaching activities of all types of universities. Non-public universities generated the highest revenues from fees for teaching classes, which accounted for over half of the revenues from this title in relation to all universities.The average cost of education...
-
In search of the new: American volunteers’ opinions about their participation in the Teaching English in Poland (TEIP) Program
PublicationThe Teaching English in Poland (TEIP) program relies on summer camps during which native English speakers, American volunteers, teach Polish children and adolescents using the language immersion method – during everyday activities, sports and art classes, and similar occasions. A vital aspect of the evaluation of the program is researching its impact on the young people; however, the opinions of the volunteers regarding their...
-
Time-domain description of point-source acoustic wavefields as a useful approach in ultrasonic techniques
PublicationIn traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...
-
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
PublicationIn this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...
-
Time-Domain Description of Point-Source Acoustic Wavefields as a Useful Approach in Ultrasonic Techniques
PublicationIn traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...
-
Chat GPT Wrote It: What HCI Educators Can Learn from their Students?
PublicationRecently students, teachers, and researchers equally have become impressed by Generative AI (GenAI) tools, with ChatGPT at the top. However, numerous concerns about the GenAI-related threats to academic integrity and the validity of learning outcomes are emerging. This problem is also vivid in Human-Computer Interaction (HCI) education since students can use GenAI tools to rapidly generate ideas, user interface templates, screen...
-
Double bondage in graphs
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...
-
On the size of identifying codes in triangle-free graphs
PublicationIn an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...
-
Analysis of the impact of AOP on source code quality: Paradox of aspect-oriented separation of concerns
PublicationAlmost four decades ago, Parnas advocated modularity for the sake of changeability, independent development, and comprehensibility. The recipe for modularization is to define a clean interface, hide an implementation detail, keep low coupling and high cohesion. Although modules have taken many forms over the years from functions and procedures to classes, no form has been capable of expressing so-called crosscutting concerns in...
-
Identification of synergistic and antagonistic actions of environmental pollutants: Bisphenols A, S and F in the presence of DEP, DBP, BADGE and BADGE·2HCl in three component mixtures
PublicationEcosystems are facing increased pressure due to the emission of many classes of emerging contaminants. However, very little is known about the interactions of these pollutants, such as bisphenols (BPs), plasticizers or pharmaceuticals. By employing bioluminescent bacteria (Microtox assay), we were able to define interactions between selected emerging pollutants (namely BPA, BPS, BPF, BADGE, BADGE·2HCl, DEP, DBP) in ternary mixtures, at...
-
Determining pesticide contamination in honey by LC-ESI-MS/MS - Comparison of pesticide recoveries of two liquid-liquid extraction based approaches
PublicationHoney, a valuable food product, may be contaminated by xenobiotics during its production and/or harvest. The determination of trace levels of contaminants in a complex matrix like honey still presents a challenge to analytical chemists. The aim of this work was to assess and compare the extraction efficiencies of 30 pesticide residues (acaricides, insecticides, herbicides, fungicides), belonging to over 15 different chemical classes....
-
Separability Assessment of Selected Types of Vehicle-Associated Noise
PublicationMusic Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...
-
Assessment of Lipophilicity Indices Derived from Retention Behavior of Antioxidant Compounds in RP-HPLC
PublicationReverse phase high pressure liquid chromatography was employed in order to evaluate the lipophilicity of antioxidant compounds from different classes, such as phenolic acids, flavanones, flavanols, flavones, anthocyanins, stilbenes, xantonoids, and proanthocyanidins. The retention time of each compound was measured using five different HPLC columns: RP18 (LiChroCART, Purosphere RP-18e), C8 (Zorbax, Eclipse XDBC8), C16-Amide (Discovery...
-
Lipidomics of Staphylococcus aureus – a new insight into the antibiotic resistant phenotype
PublicationStaphylococcus aureus is an aggressive pathogen responsible for a variety of diseases, in cluding life-threatening sepsis. Many strains of these bacteria are resistant to multiple classes of antibiotics, which is a substantial clinical problem in the treatment of S. aureus infections. We developed a comprehensive untargeted lipidomic workflow, including sample preparation, liquid chromatography-quadrupole-time-of-flight mass spectrometry...