Filters
total: 1136
displaying 1000 best results Help
Search results for: computer science
-
Proposition of the methodology for Data Acquisition, Analysis and Visualization in support of Industry 4.0
PublicationIndustry 4.0 offers a comprehensive, interlinked, and holistic approach to manufacturing. It connects physical with digital and allows for better collaboration and access across departments, partners, vendors, product, and people. Consequently, it involves complex designing of highly specialized state of the art technologies. Thus, companies face formidable challenges in the adoption of these new technologies....
-
Finding small-width connected path decompositions in polynomial time
PublicationA connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...
-
The searchlight problem for road networks
PublicationWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0
PublicationThis paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Designing Intelligent Factory: Conceptual Framework and Empirical Validation
PublicationThis paper presents a framework for monitoring, analysing and decision making for a smart manufacturing environment. We maintain that this approach could play a vital role in developing an architecture and implementation of Industry 4.0. The proposed model has features like experience based knowledge representation and semantic analysis of engineering objects and manufacturing process. It is also capable of continuous real time...
-
Airfoil Design Under Uncertainty Using Non-Intrusive Polynomial Chaos Theory and Utility Functions
PublicationFast and accurate airfoil design under uncertainty using non-intrusive polynomial chaos (NIPC) expansions and utility functions is proposed. The NIPC expansions provide a means to efficiently and accurately compute statistical information for a given set of input variables with associated probability distribution. Utility functions provide a way to rigorously formulate the design problem. In this work, these two methods are integrated...
-
Pareto Ranking Bisection Algorithm for EM-Driven Multi-Objective Design of Antennas in Highly-Dimensional Parameter Spaces
PublicationA deterministic technique for fast surrogate-assisted multi-objective design optimization of antennas in highly-dimensional parameters spaces has been discussed. In this two-stage approach, the initial approximation of the Pareto set representing the best compromise between conflicting objectives is obtained using a bisection algorithm which finds new Pareto-optimal designs by dividing the line segments interconnecting previously...
-
The complexity of bicriteria tree-depth
PublicationThe tree-depth problem can be seen as finding an elimination tree of minimum height for a given input graph G. We introduce a bicriteria generalization in which additionally the width of the elimination tree needs to be bounded by some input integer b. We are interested in the case when G is the line graph of a tree, proving that the problem is NP-hard and obtaining a polynomial-time additive 2b-approximation algorithm. This particular...
-
Three levels of fail-safe mode in MPI I/O NVRAM distributed cache
PublicationThe paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...
-
Tools, Methods and Services Enhancing the Usage of the Kepler-based Scientific Workflow Framework
PublicationScientific workflow systems are designed to compose and execute either a series of computational or data manipulation steps, or workflows in a scientific application. They are usually a part of a larger eScience environment. The usage of workflow systems, however very beneficial, is mostly not irrelevant for scientists. There are many requirements for additional functionalities around scientific workflows systems that need to be...
-
Modeling and Simulation for Exploring Power/Time Trade-off of Parallel Deep Neural Network Training
PublicationIn the paper we tackle bi-objective execution time and power consumption optimization problem concerning execution of parallel applications. We propose using a discrete-event simulation environment for exploring this power/time trade-off in the form of a Pareto front. The solution is verified by a case study based on a real deep neural network training application for automatic speech recognition. A simulation lasting over 2 hours...
-
A distributed system for conducting chess games in parallel
PublicationThis paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...
-
2-Coloring number revisited
Publication2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...
-
ARIMA vs LSTM on NASDAQ stock exchange data
PublicationThis study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...
-
Machine learning applied to acoustic-based road traffic monitoring
PublicationThe motivation behind this study lies in adapting acoustic noise monitoring systems for road traffic monitoring for driver’s safety. Such a system should recognize a vehicle type and weather-related pavement conditions based on the audio level measurement. The study presents the effectiveness of the selected machine learning algorithms in acoustic-based road traffic monitoring. Bases of the operation of the acoustic road traffic...
-
TISAX - optimization of IT risk management in the automotive industry
Publication -
ChatGPT - opportunities or threats in the educational process
Publication -
Building a cybersecurity culture of public administration system in Poland
Publication -
IEEE/ACIS International Conference on Computer and Information Science
Conferences -
Computer animation system based on rough sets and fuzzy logic
PublicationA fuzzy logic inference system was created, based on the analysis of animated motion features. The objective of the system is to facilitate the creation of high quality animation by analyzing personalized styles contained in numerous animations. Sequences portraying a virtual character acting with a differentiating personalized style (natural or exaggerated) and various levels of fluidity were prepared and subjectively evaluated....
-
Computer-Supported Polysensory Integration Technology for Educationally Handicapped Pupils
PublicationIn this paper, a multimedia system providing technology for hearing and visual attention stimulation is shortly presented. The system aims to support the development of educationally handicapped pupils. The system has been presented in the context of its configuration, architecture, and therapeutic exercise implementation issues. Results of pupils’ improvements after 8 weeks of training with the system are also provided. Training...
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublicationIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
Software Tools to Measure the Duplication of Information
PublicationData stored in average computer system usually is not unique, portions of stored data are duplicated. When duplicated data are stored in separate files containing source code of computer program of student homework, a possibility of cheating should be seriously considered. This paper presents software tools built, in order to detect re-use of pieces of code in supplied text files. Three aspects of information atching are considered:...
-
Semantic Integration of Heterogeneous Recognition Systems
PublicationComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Video Semantic Analysis Framework based on Run-time Production Rules - Towards Cognitive Vision
PublicationThis paper proposes a service-oriented architecture for video analysis which separates object detection from event recognition. Our aim is to introduce new tools to be considered in the pathway towards Cognitive Vision as a support for classical Computer Vision techniques that have been broadly used by the scientific community. In the article, we particularly focus in solving some of the reported scalability issues found in current...
-
GROUP COMPOSER - System for Modeling Agents’ Team Building for Tasks
PublicationMulti-agent systems consist of many autonomous units, called agents, that can interact when trying to achieve their goals. The selection of interaction partners is called team formation. Three basic approaches can be considered to match multi-agent system resources to the problem at hand. To research the properties of different approaches, a software for modeling team formation in multi-agent systems has been created and is presented...
-
Pursuing the Deep-Learning-Based Classification of Exposed and Imagined Colors from EEG
PublicationEEG-based brain-computer interfaces are systems aiming to integrate disabled people into their environments. Nevertheless, their control could not be intuitive or depend on an active external stimulator to generate the responses for interacting with it. Targeting the second issue, a novel paradigm is explored in this paper, which depends on a passive stimulus by measuring the EEG responses of a subject to the primary colors (red,...
-
Dynamic Signature Vertical Partitioning Using Selected Population-Based Algorithms
PublicationThe dynamic signature is a biometric attribute used for identity verification. It contains information on dynamics of the signing process. There are many approaches to the dynamic signature verification, including the one based on signature partitioning. Partitions are the regions created on the basis of signals describing the dynamics of the signature. They contain information on the shape of the signature characteristic of a...
-
An Efficient Noisy Binary Search in Graphs via Median Approximation
PublicationConsider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...
-
Creating and application of maps of concepts for dl ontologies
PublicationW poprzednich pracach wprowadzono metodę reprezentacji wiedzy, zwaną Kartografią Wiedzy. Metoda ta pozwala na zapisanie, w formie tzw. map konceptów, zależności pomiędzy konceptami wyróżnionymi w terminologii, a następnie stopniowe (wraz ze wzrostem naszej wiedzy) przypisywanie indywidualnym obiektom tych konceptów. Efektywność budowy map konceptów jest kluczowym czynnikiem wpływającym na możliwość użycia metody. Niniejsza praca...
-
Improving evolutionary multi-objective optimisation using genders [Usprawnienie ewolucyjnej wielokryterialnej optymalizacji poprzez zastosowanie rodzajników]
PublicationW rozwiązywaniu wielkowymiarowych problemów wielokryterialnej optymalizacji za pomocą obliczeń ewolucyjnych (EMO) koncepcja dominacji w sensie Pareto nie jest efektywna. Dlatego w pracy rozważa się nowe podejście do rozwiązywania zadań wielokryterialnej optymalizacji metodą EMO, w którym wprowadza się pojęcie rodzajników genetycznych w celu rozróżnienia rozmaitych grup kryteriów oraz związanych z nimi subkryterialnych rozwiązań...
-
Effectiveness of bluetooth scatternet coexisting with ieee 802.11b
PublicationArtykuł dotyka problematyki wzajemnych interferencji sieci Bluetooth i IEEE 802.11b. W szczególności analizowano wpływ transmisji 802.11b na pracę pojedynczej pikosieci w danym scatternecie BT.
-
Towards automatic classification of Wikipedia content
PublicationArtykuł opisuje podejście do automatycznej klasyfikacji artykułów w Wikipedii. Przeanalizowane zostały reprezentacje tekstu bazujące na treści dokumentu i wzajemnych powiązaniach. Przedstawiono rezultaty zastosowania klasyfikatora SVM.
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...
-
Conceptual fuzzy model of the polish internet mortgage market
PublicationThe aim of this paper is to present the conceptual structure of basic fuzzy model representing Polish Internet mortgage market. The paper starts with introduction describing the market complexities and challenges, and description of previously created rule based model. Then the steps of the process of proposed model fuzzyfication are presented. Final part of the paper consists of conclusions and directions for future research.
-
Drawing maps with advice
PublicationW pracy podejmujemy temat konstrukcji algorytmu dla agenta, który zostaje umieszczony w dowolnym wierzchołku grafu (wierzchołki są nierozróżnialne, krawędzie mają etykiety portów), po czym realizuje algorytm zmierzający do znalezienia drzewa spinającego grafu lub izomorficznej kopii grafu. Dla obu problemów podajemy asymptotycznie dokładne lub prawie dokładne oszacowania na ilość bitów dodatkowej informacji, którą agent musi otrzymać...
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
Binocular Vision Impairments Therapy Supported By Contactless Eye-gaze Tracking System
PublicationBinocular vision impairments often result in partial or total loss of stereoscopic vision. The lack of binocular vision is a serious vision impairment that deserves more attention. Very important result of the binocular vision impairments is a binocular depth perception. This paper describes also a concept of a measurement and therapy system for the binocular vision impairments by using eye-gaze tracking system.
-
Connected searching of weighted trees
PublicationW artykule rozważamy problem spójnego przeszukiwania drzew obciążonych. Autorzy w [L. Barriere i inni, Capture of an intruder by mobile agents, SPAA'02 (2002) 200-209] twierdzą, że istnieje wielomianowy algorytm dla problemu obliczania optymalnej strategii przeszukiwania obciążonego drzewa. W niniejszej pracy pokazano, że problem ten jest obliczeniowo trudny nawet dla wierzchołkowo-obciążonych drzew (wagi krawędzi równe 1) oraz...
-
Knowledge based virtual organisations for the e-decisional community
PublicationW pracy przedstawiono propozycje modelowania wirtualnych organiozacji opartych na wiedzy w zastosowaniu do budowy elektronicznej spolecznosci decyzyjnej.
-
Monitoring Parkinson's disease patients employing biometric sensors and rule-based data processing
PublicationArtykuł prezentuje automatyczny system wykrywania pogorszenia zdrowia pacjentów z chorobą Parkinsona opracowany w ramach projektu PERFORM.The paper presents how rule-based processing can be applied to automatically evaluate the motor state of Parkinson's Disease patients. Automatic monitoring of patients by using biometric sensors can provide assessment of the Parkinson's Disease symptoms. All data on PD patients' state are compared...
-
Interval wavelength assignment in all-optical star networks
PublicationArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Representation of hypertext documents based on terms, Links and text compressibility
PublicationOpisano metody reprezentacji dokumentów tekstowych oparte na słowach, wzajemnych powiązaniach i metodach kompresji. Dokonano ich oceny w oparciu o klasyfikator SVM.
-
Terminological and Assertional Queries in KQL Knowledge Access Language
PublicationOne of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...
-
Constructing a map of an anonymous graph: applications of universal sequences
PublicationWe study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...
-
Ontology Engineering Aspects in the Intelligent Systems Development
PublicationThe ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.
-
Methods of Incomplete and Uncertain Knowledge Acquisition in the Knowledge Processing Environemnt
PublicationThe authors in this paper present a concept of the environment to acquire and process knowledge about information technology. This solution is part of a project of which the objective is to build a system for the evaluation of IT tools and methodologies. Knowledge within this domain is always either uncertain or incomplete. Therefore, the authors focused on designing a dedicated algorithm for its acquisition and processing. One...