Search results for: LABORATORY CLASSES - Bridge of Knowledge

Search

Search results for: LABORATORY CLASSES

Search results for: LABORATORY CLASSES

  • Difference in Perceived Speech Signal Quality Assessment Among Monolingual and Bilingual Teenage Students

    Publication

    - Year 2021

    The user perceived quality is a mixture of factors, including the background of an individual. The process of auditory perception is discussed in a wide variety of fields, ranging from engineering to medicine. Many studies examine the difference between musicians and non-musicians. Since musical training develops musical hearing and other various auditory capabilities, similar enhancements should be observable in case of bilingual...

    Full text to download in external service

  • Action Plan “Women”

    Publication

    Employees of a company are not the first alternative coming into one’s mind when searching suitable successor for the business. Those belonging to the company’s management group are in many cases asked for their interest in being a successor, but the lower level an employee is in the hierarchy, the less probably he/she is inquired of his/her interest in becoming a successor. The contemporary entrepreneur may have had conflicts...

  • Dataset Related Experimental Investigation of Chess Position Evaluation Using a Deep Neural Network

    Publication

    The idea of training Articial Neural Networks to evaluate chess positions has been widely explored in the last ten years. In this paper we investigated dataset impact on chess position evaluation. We created two datasets with over 1.6 million unique chess positions each. In one of those we also included randomly generated positions resulting from consideration of potentially unpredictable chess moves. Each position was evaluated...

    Full text available to download

  • Automatic Clustering of EEG-Based Data Associated with Brain Activity

    The aim of this paper is to present a system for automatic assigning electroencephalographic (EEG) signals to appropriate classes associated with brain activity. The EEG signals are acquired from a headset consisting of 14 electrodes placed on skull. Data gathered are first processed by the Independent Component Analysis algorithm to obtain estimates of signals generated by primary sources reflecting the activity of the brain....

    Full text to download in external service

  • DBpedia and YAGO Based System for Answering Questions in Natural Language

    In this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...

    Full text available to download

  • From unextendible product bases to genuinely entangled subspaces

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Unextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...

    Full text available to download

  • Learning design of a blended course in technical writing

    Blending face-to-face classes with e-learning components can lead to a very successful outcome if the blend of approaches, methods, content, space, time, media and activities is carefully structured and approached from both the student’s and the tutor’s perspective. In order to blend synchronous and asynchronous e-learning activities with traditional ones, educators should make them inter-dependent and develop them according to...

    Full text available to download

  • Visual Content Learning in a Cognitive Vision Platform for Hazard Control (CVP-HC)

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2019

    This work is part of an effort for the development of a Cognitive Vision Platform for Hazard Control (CVP-HC) for applications in industrial workplaces, adaptable to a wide range of environments. The paper focuses on hazards resulted from the nonuse of personal protective equipment (PPE). Given the results of previous analysis of supervised techniques for the problem of classification of a few PPE (boots, hard hats, and gloves...

    Full text available to download

  • Domination subdivision and domination multisubdivision numbers of graphs

    The domination subdivision number sd(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the domination number of G. It has been shown [10] that sd(T)<=3 for any tree T. We prove that the decision problem of the domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the domination multisubdivision number...

    Full text available to download

  • Virtual reality technology in architectural education

    Contemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...

    Full text available to download

  • Applying case studies to teaching architectural investment

    Case studies enable students to encounter practical issues during their education. Experiments conducted in class employing this method often feature simplified models of real-world situations. However, they still enable students to encounter actual problems, to which theoretical knowledge is applied. In architectural education, students carrying out semester projects usually rely on data provided by the teacher, without wondering...

    Full text available to download

  • Enzymatic activities behind degradation of glucosinolates

    Myrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...

  • NLP Questions Answering Using DBpedia and YAGO

    In this paper, we present results of employing DBpedia and YAGO as lexical databases for answering questions formulated in the natural language. The proposed solution has been evaluated for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference). Our method uses dependency trees generated from the user query. The trees are browsed for paths leading from the root of the tree to the question...

    Full text available to download

  • Tagged images with LEGO bricks moving on the conveyor belt

    Open Research Data
    open access - series: LEGO - partial

    The data set conatins tagged images conatining LEGO bricks used for traning LEGO bricks detecting network. The dataset contains frames taken from video recordings of lego bricks moving on a conveyor belt. The images conatin from 0 to 7 bricks. In total there are 5459 tagged lego bricks in 4340 images and 3390 images without any bricks in them. The images...

  • "Shaping space" programme as a tool for educating youth about architecture

    Publication

    - Year 2017

    The Polish Architectural Policy’s vision of a systematic promotion of spatial culture has made its way into the national curriculum for 2009 – 2016 designed for various stages of child and teenager education. The objective of this effort was to furnish a basis for a system of architectural education which allows teaching society to be more conscious in their decisions as to spatial order with the effect of improving the quality...

    Full text available to download

  • Simulating Malware with MAlSim

    Publication

    - Year 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publication

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Full text to download in external service

  • The computational complexity of the backbone coloring problem for planar graphs with connected backbones

    In the paper we study the computational complexity of the backbone coloring problem for planar graphs with connected backbones. For every possible value of integer parameters λ≥2 and k≥1 we show that the following problem: Instance: A simple planar graph GG, its connected spanning subgraph (backbone) HH. Question: Is there a λ-backbone coloring c of G with backbone H such that maxc(V(G))≤k? is either NP-complete or polynomially...

    Full text available to download

  • Two examples of Quantum Dynamical Semigroups

    The Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...

    Full text to download in external service

  • Potential and Use of the Googlenet Ann for the Purposes of Inland Water Ships Classification

    Publication

    - Polish Maritime Research - Year 2020

    This article presents an analysis of the possibilities of using the pre-degraded GoogLeNet artificial neural network to classify inland vessels. Inland water authorities monitor the intensity of the vessels via CCTV. Such classification seems to be an improvement in their statutory tasks. The automatic classification of the inland vessels from video recording is a one of the main objectives of the Automatic Ship Recognition and...

    Full text available to download

  • Explicit solvent repulsive scaling replica exchange molecular dynamics ( RS‐REMD ) in molecular modeling of protein‐glycosaminoglycan complexes

    Publication
    • M. Marcisz
    • M. Gaardløs
    • K. Bojarski
    • T. Siebenmorgen
    • M. Zachariasen
    • S. A. Samsonov

    - JOURNAL OF COMPUTATIONAL CHEMISTRY - Year 2022

    Glycosaminoglcyans (GAGs), linear anionic periodic polysaccharides, are crucial for many biologically relevant functions in the extracellular matrix. By interacting with proteins GAGs mediate processes such as cancer development, cell proliferation and the onset of neurodegenerative diseases. Despite this eminent importance of GAGs, they still represent a limited focus for the computational community in comparison to other classes...

    Full text to download in external service

  • Set of Experience and Decisional DNA: Experience-Based Knowledge Structures

    Publication

    - Year 2020

    This chapter presents a description of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA), argumentation for a knowledge representation, composition, configuration and metrics. SOEKS is a combination of filtered and amalgamated information obtained from formal decision events. It facilitates effective explicit representation of decisional experience taken from different technologies. SOEKS comprises variables,...

    Full text to download in external service

  • Lighting requirements for pedestrian crossings - positive contrast

    Publication

    - MATEC Web of Conferences - Year 2019

    For many years now in Poland there has been a large number of road accidents at pedestrian crossings during night periods [5, 11]. One of the technical solutions that can improve this condition is the use of proper lighting for pedestrian crossings. The designated pedestrian crossing should be visible in different weather conditions and at different times of the day. In case of night vision restrictions use artificial lighting...

    Full text available to download

  • Segmentation-Based BI-RADS ensemble classification of breast tumours in ultrasound images

    Publication

    - INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS - Year 2024

    Background: The development of computer-aided diagnosis systems in breast cancer imaging is exponential. Since 2016, 81 papers have described the automated segmentation of breast lesions in ultrasound images using arti- ficial intelligence. However, only two papers have dealt with complex BI-RADS classifications. Purpose: This study addresses the automatic classification of breast lesions into binary classes (benign vs. ma- lignant)...

    Full text available to download

  • Analysis of MArkers of Exposure to Constituents of Environmental Tobacco Smoke (ETS)

    Tobacco smoke is a complex mixture of more than 4000 chemical compounds, many of which are harmful to human health. These compounds belong to various chemical classes, including amides, imides, lactams, carboxylic acids, aldehydes, ketones, alcohols, phenols, amines, hydrocarbons, ethers, and inorganic compounds. There are three types of tobacco smoke streams: the mainstream, the sidestream, and environmental tobacco smoke (ETS)....

    Full text to download in external service

  • 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...

    Full text to download in external service

  • Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2010

    Two mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...

    Full text to download in external service

  • Improving css-KNN Classification Performance by Shifts in Training Data

    Publication

    - Year 2015

    This paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...

  • Food Classification from Images Using a Neural Network Based Approach with NVIDIA Volta and Pascal GPUs

    Publication

    In the paper we investigate the problem of food classification from images, for the Food-101 dataset extended with 31 additional food classes from Polish cuisine. We adopted transfer learning and firstly measured training times for models such as MobileNet, MobileNetV2, ResNet50, ResNet50V2, ResNet101, ResNet101V2, InceptionV3, InceptionResNetV2, Xception, NasNetMobile and DenseNet, for systems with NVIDIA Tesla V100 (Volta) and...

    Full text available to download

  • Anomalous Behavior of Hyaluronan Crosslinking Due to the Presence of Excess Phospholipids in the Articular Cartilage System of Osteoarthritis

    Publication
    • P. Bełdowski
    • P. Weber
    • T. Andrysiak
    • W. Auge
    • D. Ledziński
    • T. DeLeon
    • A. Gadomski

    - INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES - Year 2017

    Lubrication of articular cartilage is a complex multiscale phenomenon in synovial joint organ systems. In these systems, synovial fluid properties result from synergistic interactions between a variety of molecular constituent. Two molecular classes in particular are of importance in understanding lubrication mechanisms: hyaluronic acid and phospholipids. The purpose of this study is to evaluate interactions between hyaluronic acid...

    Full text available to download

  • Extended investigation of performance-energy trade-offs under power capping in HPC environments

    Publication

    —In the paper we present investigation of performance-energy trade-offs under power capping using modern processors. The results are presented for systems targeted at both server and client markets and were collected from Intel Xeon E5 and Intel Xeon Phi server processors as well as from desktop and mobile Intel Core i7 processors. The results, when using power capping, show that we can find various interesting combinations of...

  • On Computational Aspects of Greedy Partitioning of Graphs

    Publication

    - Year 2017

    In this paper we consider a problem of graph P-coloring consisting in partitioning the vertex set of a graph such that each of the resulting sets induces a graph in a given additive, hereditary class of graphs P. We focus on partitions generated by the greedy algorithm. In particular, we show that given a graph G and an integer k deciding if the greedy algorithm outputs a P-coloring with a least k colors is NP-complete for an infinite...

    Full text to download in external service

  • The structure of revenues of non-public universities in 2010 from didactic activity by sources of financing (in%)

    Open Research Data
    open access

    Income from teaching activities of non-public universities accounted for almost 1/5 of income from teaching activities of all types of universities. Non-public universities generated the highest revenues from fees for teaching classes, which accounted for over half of the revenues from this title in relation to all universities.The average cost of education...

  • Time-Domain Description of Point-Source Acoustic Wavefields as a Useful Approach in Ultrasonic Techniques

    Publication

    - Year 2011

    In traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...

    Full text to download in external service

  • Double bondage in graphs

    Publication

    A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...

    Full text to download in external service

  • On the size of identifying codes in triangle-free graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2012

    In an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...

    Full text available to download

  • INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS

    Publication

    - Year 2013

    In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...

  • Determining pesticide contamination in honey by LC-ESI-MS/MS - Comparison of pesticide recoveries of two liquid-liquid extraction based approaches

    Publication

    - LWT-FOOD SCIENCE AND TECHNOLOGY - Year 2014

    Honey, a valuable food product, may be contaminated by xenobiotics during its production and/or harvest. The determination of trace levels of contaminants in a complex matrix like honey still presents a challenge to analytical chemists. The aim of this work was to assess and compare the extraction efficiencies of 30 pesticide residues (acaricides, insecticides, herbicides, fungicides), belonging to over 15 different chemical classes....

    Full text available to download

  • Lipidomics of Staphylococcus aureus – a new insight into the antibiotic resistant phenotype

    Publication

    - Year 2016

    Staphylococcus aureus is an aggressive pathogen responsible for a variety of diseases, in cluding life-threatening sepsis. Many strains of these bacteria are resistant to multiple classes of antibiotics, which is a substantial clinical problem in the treatment of S. aureus infections. We developed a comprehensive untargeted lipidomic workflow, including sample preparation, liquid chromatography-quadrupole-time-of-flight mass spectrometry...

  • Separability Assessment of Selected Types of Vehicle-Associated Noise

    Music Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...

    Full text to download in external service

  • In search of the new: American volunteers’ opinions about their participation in the Teaching English in Poland (TEIP) Program

    Publication

    - Year 2021

    The Teaching English in Poland (TEIP) program relies on summer camps during which native English speakers, American volunteers, teach Polish children and adolescents using the language immersion method – during everyday activities, sports and art classes, and similar occasions. A vital aspect of the evaluation of the program is researching its impact on the young people; however, the opinions of the volunteers regarding their...

    Full text to download in external service

  • Identification of synergistic and antagonistic actions of environmental pollutants: Bisphenols A, S and F in the presence of DEP, DBP, BADGE and BADGE·2HCl in three component mixtures

    Publication

    - SCIENCE OF THE TOTAL ENVIRONMENT - Year 2021

    Ecosystems are facing increased pressure due to the emission of many classes of emerging contaminants. However, very little is known about the interactions of these pollutants, such as bisphenols (BPs), plasticizers or pharmaceuticals. By employing bioluminescent bacteria (Microtox assay), we were able to define interactions between selected emerging pollutants (namely BPA, BPS, BPF, BADGE, BADGE·2HCl, DEP, DBP) in ternary mixtures, at...

    Full text to download in external service

  • Automatic labeling of traffic sound recordings using autoencoder-derived features

    Publication

    An approach to detection of events occurring in road traffic using autoencoders is presented. Extensions of existing algorithms of acoustic road events detection employing Mel Frequency Cepstral Coefficients combined with classifiers based on k nearest neighbors, Support Vector Machines, and random forests are used. In our research, the acoustic signal gathered from the microphone placed near the road is split into frames and converted...

  • Assessment of Lipophilicity Indices Derived from Retention Behavior of Antioxidant Compounds in RP-HPLC

    Publication

    Reverse phase high pressure liquid chromatography was employed in order to evaluate the lipophilicity of antioxidant compounds from different classes, such as phenolic acids, flavanones, flavanols, flavones, anthocyanins, stilbenes, xantonoids, and proanthocyanidins. The retention time of each compound was measured using five different HPLC columns: RP18 (LiChroCART, Purosphere RP-18e), C8 (Zorbax, Eclipse XDBC8), C16-Amide (Discovery...

    Full text available to download

  • Analysis of the impact of AOP on source code quality: Paradox of aspect-oriented separation of concerns

    Publication

    - Year 2012

    Almost four decades ago, Parnas advocated modularity for the sake of changeability, independent development, and comprehensibility. The recipe for modularization is to define a clean interface, hide an implementation detail, keep low coupling and high cohesion. Although modules have taken many forms over the years from functions and procedures to classes, no form has been capable of expressing so-called crosscutting concerns in...

    Full text to download in external service

  • Time-domain description of point-source acoustic wavefields as a useful approach in ultrasonic techniques

    Publication

    - Year 2012

    In traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...

    Full text to download in external service

  • Chat GPT Wrote It: What HCI Educators Can Learn from their Students?

    Publication

    - Year 2024

    Recently students, teachers, and researchers equally have become impressed by Generative AI (GenAI) tools, with ChatGPT at the top. However, numerous concerns about the GenAI-related threats to academic integrity and the validity of learning outcomes are emerging. This problem is also vivid in Human-Computer Interaction (HCI) education since students can use GenAI tools to rapidly generate ideas, user interface templates, screen...

    Full text to download in external service

  • Non-isolating bondage in graphs

    A dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...

    Full text available to download

  • Non-isolating 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....

    Full text available to download

  • Theory versus experiment for vacuum Rabi oscillations in lossy cavities. II. Direct test of uniqueness of vacuum

    Publication

    The paper continues the analysis of vacuum Rabi oscillations we started in part I [Phys. Rev. A 79, 033836 (2009)]. Here we concentrate on experimental consequences for cavity QED of two different classes of representations of harmonic-oscillator Lie algebras. The zero-temperature master equation, derived in part I for irreducible representations of the algebra, is reformulated in a reducible representation that models electromagnetic...

    Full text available to download