displaying 1000 best results Help
Search results for: ANYTIME HEURISTIC ALGORITHM
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
Study on CPU and RAM Resource Consumption of Mobile Devices using Streaming Services
PublicationStreaming multimedia services have become very popular in recent years, due to the development of wireless networks. With the growing number of mobile devices worldwide, service providers offer dedicated applications that allow to deliver on-demand audio and video content anytime and everywhere. The aim of this study was to compare different streaming services and investigate their impact on the CPU and RAM resources, with respect...
-
Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks
PublicationThe construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....
-
Testing Stability of Digital Filters Using Multimodal Particle Swarm Optimization with Phase Analysis
PublicationIn this paper, a novel meta-heuristic method for evaluation of digital filter stability is presented. The proposed method is very general because it allows one to evaluate stability of systems whose characteristic equations are not based on polynomials. The method combines an efficient evolutionary algorithm represented by the particle swarm optimization and the phase analysis of a complex function in the characteristic equation....
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Improving signal quality in speech codec using hybrid perceptual-parametric algorithm. [Poprawa jakości sygnału w kodekach mowy przy użyciu hybrydowego, parametryczno-perceptualnego algorytmu kodowania]
PublicationPrzedstawiono hybrydową, parametryczno-perceptualną architekturę kodeka. Podstawowa struktura kodeka parametrycznego CELP została wzbogacona o kodowanie perceptualne. Celem hybrydyzacji kodeka jest uzyskanie znaczącej poprawy subiektywnej jakości zdekodowanego sygnału. Zaproponowano dwie hybrydowe struktury. Pierwsza polega na perceptualnym kodowaniu dźwięcznych elementów sygnału rezydualnego kodeka CELP. Druga metoda dzieli sygnał...
-
Parallel implementation of a Sailing Assistance Application in a Cloud Environment
PublicationSailboat weather routing is a highly complex problem in terms of both the computational time and memory. The reason for this is a large search resulting in a multitude of possible routes and a variety of user preferences. Analysing all possible routes is only feasible for small sailing regions, low-resolution maps, or sailboat movements on a grid. Therefore, various heuristic approaches are often applied, which can find solutions...
-
A New Adaptive Method for the Extraction of Steel Design Structures from an Integrated Point Cloud
Open Research DataA new automatic and adaptive algorithm for edge extraction from a random point cloud was developed and presented herein. The proposed algorithm was tested using real measurement data. The developed algorithm is able to realistically reduce the amount of redundant data and correctly extract stable edges representing the geometric structures of a studied...
-
Marine and Cosmic Inspirations for AI Algorithms
PublicationArtificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...
-
Evolutionary Algorithms in MPLS network designing
PublicationMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Generalized regression neural network and fitness dependent optimization: Application to energy harvesting of centralized TEG systems
PublicationThe thermoelectric generator (TEG) system has attracted extensive attention because of its applications in centralized solar heat utilization and recoverable heat energy. The operating efficiency of the TEG system is highly affected by operating conditions. In a series-parallel structure, due to diverse temperature differences, the TEG modules show non-linear performance. Due to the non-uniform temperature distribution (NUTD) condition,...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublicationSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Deformation mitigation and twisting moment control in space frames
PublicationOver the last five decades, space frames have centered on the modernization of touristic zones in view of architectural attractions. Although attempts to control joint movement and minimize axial force and bending moment in such structures were made sufficiently, twisting moments in space frames have been underestimated so far. In space frames, external load or restoring the misshapen shape may cause twisting in members. We herein...
-
Wykorzystanie klasyfikacji funkcjonalnej usług do efektywnego zarządzania zasobami chmurowymi
PublicationWykazano jak istotnym problemem jest zarzadzanie chmurą obliczeniową, w tym alokacja zasobów do wykonania usług (workloadów) zgłoszonych przez użytkownika. Przeanalizowano problem podziału usług wdrażanych w środowiskach chmurowych na klasy określające ich funkcjonalność. Zaproponowano oryginalną metodę alokacji workloadów wykorzystującą wprowadzoną klasyfikację funkcjonalną oraz identyfikację tych klas na podstawie wielkości generowanego...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublicationThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Quality of Satellite Communication in Selected Mobile Android Smartphones
PublicationToday, thanks to mobile devices, satellite communication is available to anyone and everywhere. Gaining information on one’s position using GNSS (Global Navigation Satellite Systems), particularly in unknown urban environments, had become an everyday activity. With the widespread of mobile devices, particularly smartphones, each person can obtain information considering his or her location anytime and everywhere. This paper is...
-
Metaheuristic algorithms for optimization of resilient overlay computing systems
PublicationThe idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublicationFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor
PublicationThe paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...
-
Nonlinear resultant theory of shells accounting for thermodiffusion
PublicationThe complete nonlinear resultant 2D model of shell thermodiffusion is developed. All 2D balance laws and the entropy imbalance are formulated by direct through-the-thickness integration of respective 3D laws of continuum thermodiffusion. This leads to a more rich thermodynamic structure of our 2D model with several additional 2D fields not present in the 3D parent model. Constitutive equations of elastic thermodiffusive shells...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
On the Consumption of Multimedia Content Using Mobile Devices: a Year to Year User Case Study
PublicationIn the early days, consumption of multimedia content related with audio signals was only possible in a stationary manner. The music player was located at home, with a necessary physical drive. An alternative way for an individual was to attend a live performance at a concert hall or host a private concert at home. To sum up, audio-visual effects were only reserved for a narrow group of recipients. Today, thanks to portable players,...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527452191]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527457751]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527453631]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Ryszard Katulski prof. dr hab. inż.
People -
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
PublicationIn its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...
-
Construction of phylogenetic trees with topological constraints
PublicationThis paper proposes a method of reconstruction of phylogenetic trees based on heuristic search with topological constraints. Using topological constraints it is possible to reduce the set of solutions as well as to enforce that the result is consistent with a given hypothesis about the evolution process within some group of species. Along with this work a number of algorithms used for phylogenetic analysis were implemented. Those...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527456421]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527459551]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527451601]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Output voltage, current and DC-link voltages under SVPWM, experimental results
Open Research DataThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The comparison studies between proposed Space Vector Pulse-Width...
-
Output voltage, current and DC-link voltages under SPWM, experimental results
Open Research DataThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The Carrier-Based Pulse-Width Modulation (CBPWM) technique was...
-
Quality Expectations of Mobile Subscribers
PublicationMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Algorytmy Optymalizacji Dyskretnej - ed. 2021/2022
e-Learning CoursesIn real-world applications, many important practical problems are NP-hard, therefore it is expedient to consider not only the optimal solutions of NP-hard optimization problems, but also the solutions which are “close” to them (near-optimal solutions). So, we can try to design an approximation algorithm that efficiently produces a near-optimal solution for the NP-hard problem. In many cases we can even design approximation algorithms...
-
Reception of Terrestrial DAB+ and FM Radio with a Mobile Device: A Subjective Quality Evaluation
PublicationNowadays, terrestrial broadcasting enables to receive content anytime and everywhere. People can obtain information both with a portable or desktop receiver, which include pocket-sized devices as well as high-end Hi-Fi equipment, not to mention car audio systems. Numerous manufacturers include FM-compatible chipsets in a variety of user equipment (UE), including mobile phones. However, digital radio signal processing modules, such...
-
Application of genetic algorithms in graph searching problem
PublicationGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Dual drive control under SVPWM, experimental results
Open Research DataThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The analysis includes the behaviour of the drive system, examining the dynamic system response to speed and angle changes, and encompassing data...
-
Performance evaluation of parallel background subtraction on GPU platforms
PublicationImplementation of the background subtraction algorithm on parallel GPUs is presented. The algorithm processes video streams and extracts foreground pixels. The work focuses on optimizing parallel algorithm implementation by taking into account specific features of the GPU architecture, such as memory access, data transfers and work group organization. The algorithm is implemented in both OpenCL and CUDA. Various optimizations of...
-
Efficient uncertainty quantification using sequential sampling-based neural networks
PublicationUncertainty quantification (UQ) of an engineered system involves the identification of uncertainties, modeling of the uncertainties, and the forward propagation of the uncertainties through a system analysis model. In this work, a novel surrogate-based forward propagation algorithm for UQ is proposed. The proposed algorithm is a new and unique extension of the recent efficient global optimization using neural network (NN)-based...
-
Robust output prediction of differential – algebraic systems – application to drinking water distribution system
PublicationThe paper presents the recursive robust output variable prediction algorithm, applicable for systems described in the form of nonlinear algebraic-differential equations. The algorithm bases on the uncertainty interval description, the system model, and the measurements. To improve the algorithm efficiency, nonlinear system models are linearised along the nominal trajectory. The effectiveness of the algorithm is demonstrated on...
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublicationThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Weighted Clustering for Bees Detection on Video Images
PublicationThis work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...
-
A Monte Carlo Strategy to simulate Positrons and Positronium in biological Materials
PublicationWe present an algorithm for Monte Carlo simulations of positron tracks in biological materials. The algorithm takes into account the cross-section data for elastic and inelastic collisions between positrons and molecules and processes like direct annihilation, ionization and positronium formation. In the case of positronium formation, the algorithm considers the interactions of positronium with molecules. The algorithm can be used...
-
Evaluation of propagation parameters of open guiding structures with the use of complex root finding algorithms
PublicationAn efficient complex root tracing algorithm is utilized for the investigation of electromagnetic wave propagation in open guiding structures. The dispersion characteristics of propagated and leaky waves are calculated for a couple of chosen waveguides. The efficiency of the root tracing algorithm is discuses and compared to a global root finding algorithm.
-
0-step K-means for clustering Wikipedia search results
PublicationThis article describes an improvement for K-means algorithm and its application in the form of a system that clusters search results retrieved from Wikipedia. The proposed algorithm eliminates K-means isadvantages and allows one to create a cluster hierarchy. The main contributions of this paper include the ollowing: (1) The concept of an improved K-means algorithm and its application for hierarchical clustering....
-
Determining the optimal filling of the surface with a linker with Universal Force Field and Reax Force Field
Open Research DataThe DataSet contains the atomic slabs of diamond surfaces with ATP molecules in water. The calculated data includes different sized surfaces from 90 Angstrom^2 to 691 Angstrom^2. Structures were relaxed using the Reax Force Field method with the Limited Memory Broyden–Fletcher–Goldfarb–Shanno algorithm. Structures were calculated with a convergence...