Search results for: DEEP BELIEF NETWORK - Bridge of Knowledge

Search

Search results for: DEEP BELIEF NETWORK

Search results for: DEEP BELIEF NETWORK

  • Smartphones as tools for equitable food quality assessment

    Background: The ubiquity of smartphones equipped with an array of sophisticated sensors, ample processing power, network connectivity and a convenient interface makes them a promising tool for non-invasive, portable food quality assessment. Combined with the recent developments in the areas of IoT, deep learning algorithms and cloud computing, they present an opportunity for advancing wide-spread, equitable and sustainable food...

    Full text available to download

  • Evaluating Accuracy of Respiratory Rate Estimation from Super Resolved Thermal Imagery

    Non-contact estimation of Respiratory Rate (RR) has revolutionized the process of establishing the measurement by surpassing some issues related to attaching sensors to a body, e.g. epidermal stripping, skin disruption and pain. In this study, we perform further experiments with image processing-based RR estimation by using various image enhancement algorithms. Specifically, we employ Super Resolution (SR) Deep Learning (DL) network...

    Full text available to download

  • Magdalena Licznerska mgr

    Magdalena Licznerska jest asystentem w Katedrze Przedsiębiorczości na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej, gdzie prowadzi zajęcia z zarządzania małą firmą i podstaw ekonomii. Jej badania koncentrują się na przedsiębiorczości kobiet, kobietach w firmach rodzinnych oraz społeczno-kognitywnym spojrzeniu na przedsiębiorczość. Przygotowuje pracę doktorską na temat roli kontekstu w kształtowaniu indywidualnej orientacji...

  • Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation

    Open Research Data

    The dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...

  • Jacek Rumiński prof. dr hab. inż.

    Wykształcenie i kariera zawodowa 2022 2016   2002   1995   1991-1995 Tytuł profesora Habilitacja   Doktor nauk technicznych   Magister inżynier     Prezydent RP, dziedzina nauk inżynieryjno-technicznych, dyscyplina: inzyniera biomedyczna Politechnika Gdańska, Biocybernetyka i inżyniera biomedyczna, tematyka: „Metody wyodrębniania sygnałów i parametrów z różnomodalnych sekwencji obrazów dla potrzeb diagnostyki i wspomagania...

  • Marek Biziuk prof. dr hab. inż.

    People

    CURRICULUM VITAE Marek BIZIUK  Born                                        1947 MSc                                         1969 GUT PhD                                         1977 GUT DSc                                         1994 GUT Professor                                 2001   Membership of scientific society - Gdansk Scientific Society - Romanian Society of Analytical Chemistry - Engineers and Techniques of...

  • CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System

    Publication
    • A. Bhansali
    • R. Kumar Patra
    • P. Bidare Divakarachari
    • P. Falkowski-Gilski
    • G. Shivakanth
    • S. N. Patil

    - IEEE Access - Year 2024

    In the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...

    Full text to download in external service

  • Communication: Inside the water wheel: Intrinsic differences between hydrated tetraphenylphosphonium and tetraphenylborate ions

    Tetraphenylphosphonium tetraphenylborate (TPTB) is a common reference electrolyte in physical chemistry of solutions allowing for a convenient partitioning of thermodynamic properties into single-ion contributions. Here, we compute on the basis of ab initio molecular dynamics simulations the infrared (IR) spectra for hydrated constituent ions of the TPTB assumption. Using spectral decomposition techniques, we extract important...

    Full text available to download

  • Explainable machine learning for diffraction patterns

    Publication
    • S. Nawaz
    • V. Rahmani
    • D. Pennicard
    • S. P. R. Setty
    • B. Klaudel
    • H. Graafsma

    - Journal of Applied Crystallography - Year 2023

    Serial crystallography experiments at X-ray free-electron laser facilities produce massive amounts of data but only a fraction of these data are useful for downstream analysis. Thus, it is essential to differentiate between acceptable and unacceptable data, generally known as ‘hit’ and ‘miss’, respectively. Image classification methods from artificial intelligence, or more specifically convolutional neural networks (CNNs), classify...

    Full text available to download

  • Analysis-by-synthesis paradigm evolved into a new concept

    This work aims at showing how the well-known analysis-by-synthesis paradigm has recently been evolved into a new concept. However, in contrast to the original idea stating that the created sound should not fail to pass the foolproof synthesis test, the recent development is a consequence of the need to create new data. Deep learning models are greedy algorithms requiring a vast amount of data that, in addition, should be correctly...

    Full text to download in external service

  • Mariusz Figurski prof. dr hab. inż.

    Mariusz Józef Figurski (born 27 April 1964 in Łasinie, Poland) - Polish geodesist, professor of technical sciences, professor at the Gdańsk University of Technology. Early life and education He passed the matriculation examination in 1983 after he had finished Jan III Sobieski High school in Grudziądz. He graduated the Military University of Technology on an individual mode at the Faculty of Electromechanics and Civil Engineering...

  • A Selection of Starting Points for Iterative Position Estimation Algorithms Using Feedforward Neural Networks

    Publication

    This article proposes the use of a feedforward neural network (FNN) to select the starting point for the first iteration in well-known iterative location estimation algorithms, with the research objective of finding the minimum size of a neural network that allows iterative position estimation algorithms to converge in an example positioning network. The selected algorithms for iterative position estimation, the structure of the...

    Full text available to download

  • Inauguracja roku akademickiego dla studentów zagranicznych

    Events

    03-10-2017 12:00 - 03-10-2017 14:00

    W trakcie uroczystości będzie miało miejsce oficjalne powitanie studentów zagranicznych rozpoczynających naukę na PG.

  • Wireless Networks as an Infrastructure for Mission-Critical Business Applications

    Publication

    Despite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...

  • Nowoczesne technologie uszczelniania wałów przeciwpowodziowych.

    Publication
    • A. Brożek

    - Materiały Budowlane - Year 2003

    Opisano zastosowanie wąskoszczelinowych przesłon przeciwfiltracyjnych wykonywanych w technologii WIPS wibracyjnie iniektowana przesłona szczelinowa oraz DSM ( ang. deep soil mixing - mieszanie wgłębne gruntu). Przedstawiono przykłady zastosowania w Polsce.

  • Tacit Knowledge Sharing and Personal Branding. How to Derive Innovation From Project Teams?

    Publication

    Innovation, relationships, cooperation, and knowledge are key factors which determine a competitive advantage in the networked economy. A network serves as a contemporary form of market process coordination. Network economy, according to the idea of prosumerism, is founded on collaboration of individual creators based on a network of values instead of hierarchical dependencies. Another feature of a network is that it imposes symmetry...

    Full text to download in external service

  • 1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type

    Publication

    A network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....

  • The Review of the Selected Challenges for an Incorporation of Daylight Assessment Methods into Urban Planning in Poland

    The main objectives of this research it to find out if modern daylight assessment and design methods can be useful for urban residential planning in Poland. The study gives a chance to describe and appraise modern daylight design techniques. The other purpose is to illustrate how daylight knowledge could be used as an incentive to rethink the way urban environments are created. Although daylight design is acknowledged in literature...

    Full text available to download

  • The Double Cognitive Bias of Mistakes: A Measurement Method

    Publication

    - Year 2023

    There is no learning without mistakes. However, making mistakes among knowledge workers is s�ll seeing shameful. There is a clash between posi�ve a�tudes and beliefs regarding the power of gaining new (tacit) knowledge by ac�ng in new contexts and nega�ve a�tudes and beliefs toward accompanying mistakes that are sources of learning. These contradictory a�tudes create a bias that is doubled by the other shared solid belief...

    Full text available to download

  • Slowly-closing valve behaviour during steam machine accelerated start-up

    Publication

    - Case Studies in Thermal Engineering - Year 2022

    The paper discusses the state of stress in a slowly-closing valve during accelerated start-up of a steam turbine. The valve is one of the first components affected by high temperature gradients and is a key element on which the power, efficiency and safety of the steam system depend. The authors calibrated the valve model based on experimental data and then performed extended Thermal-FSI analyses relative to experiment. The issue...

    Full text available to download

  • Low-frequency noise in ZrS3 van der Waals semiconductor nanoribbons

    Publication
    • A. Rehman
    • G. Cywiński
    • W. Knap
    • J. Smulko
    • A. Balandin
    • S. Rumyantsev

    - APPLIED PHYSICS LETTERS - Year 2023

    We report the results of the investigation of low-frequency electronic noise in ZrS3 van der Waals semiconductor nanoribbons. The test structures were of the back-gated field-effect-transistor type with a normally off n-channel and an on-to-off ratio of up to four orders of magnitude. The current–voltage transfer characteristics revealed significant hysteresis owing to the presence of deep levels. The noise in ZrS3 nanoribbons...

    Full text available to download

  • Barbara Klaudel

    People

  • QoS Extensions for Flow-Awareness Networks

    The paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...

    Full text available to download

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • How Integration of a Brain-Machine Interface and Obstacle Detection System Can Improve Wheelchair Control via Movement Image

    Publication
    • T. Kocejko
    • N. Matuszkiewicz
    • J. Kwiatkowski
    • P. Durawa
    • A. Madajczak

    - SENSORS - Year 2024

    This study presents a human-computer interaction combined with a brain-machine interface (BMI) and obstacle detection system for remote control of a wheeled robot through movement imagery, providing a potential solution for individuals facing challenges with conventional vehicle operation. The primary focus of this work is the classification of surface EEG signals related to mental activity when envisioning movement and deep relaxation...

    Full text available to download

  • Pedestrian detection in low-resolution thermal images

    Over one million people die in car accidents worldwide each year. A solution that will be able to reduce situations in which pedestrian safety is at risk has been sought for a long time. One of the techniques for detecting pedestrians on the road is the use of artificial intelligence in connection with thermal imaging. The purpose of this work was to design a system to assist the safety of people and car intelligence with the use...

    Full text to download in external service

  • Feature Weighted Attention-Bidirectional Long Short Term Memory Model for Change Detection in Remote Sensing Images

    Publication

    - Remote Sensing - Year 2022

    In remote sensing images, change detection (CD) is required in many applications, such as: resource management, urban expansion research, land management, and disaster assessment. Various deep learning-based methods were applied to satellite image analysis for change detection, yet many of them have limitations, including the overfitting problem. This research proposes the Feature Weighted Attention (FWA) in Bidirectional Long...

    Full text available to download

  • A Novel Multicast Architecture of Programmable Networks

    Publication

    - Year 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Full text to download in external service

  • Distinguishing views in symmetric networks: A tight lower bound

    Publication

    The view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.

    Full text available to download

  • Abdalraheem Ijjeh Ph.D. Eng.

    People

    The primary research areas of interest are artificial intelligence (AI), machine learning, deep learning, and computer vision, as well as modeling physical phenomena (i.e., guided waves in composite laminates). The research interests described above are utilized for SHM and NDE applications, namely damage detection and localization in composite materials.  

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • Multi-agent systems registration and maintenance of address mapping without agent self-registation

    Monitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...

    Full text to download in external service

  • Transient detection for speech coding applications

    Signal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...

    Full text to download in external service

  • Towards 5G — Cloud-based Radio Access Networks

    In the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...

    Full text available to download

  • Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis

    Publication

    - Year 2018

    A realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...

    Full text available to download

  • A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios

    This article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...

    Full text to download in external service

  • INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS

    Publication

    - Year 2015

    A minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...

    Full text to download in external service

  • Active Learning Based on Crowdsourced Data

    The paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...

    Full text available to download

  • Water currents in Głębinka Passage in late spring of 1975

    Open Research Data
    open access

    Data set contains the results of the field measurements of horizontal water currents carried out in the Głębinka Passage in Puck Bay  (Southern Baltic, Poland) in 1975 by Department of Physical Oceanography (Institute Oceanography, University of Gdańsk). Głębinka Passage is a narrow strait playing crucial role in water exchange between shallow and deep...

  • Introduction to the ONDM 2022 special issue

    Publication
    • J. Turkiewicz
    • T. Gomes
    • M. Klinkowski
    • J. Rak
    • M. Tornatore

    - Journal of Optical Communications and Networking - Year 2023

    This JOCN special issue contains extended versions of selected papers presented at the 26th International Conference on Optical Network Design and Modeling (ONDM 2022), which took place 16–19 May 2022 at Warsaw University of Technology, Warsaw, Poland. The topics covered by the papers represent trends in optical networking research: application of machine learning to network management, cross-layer network performance optimization,...

    Full text available to download

  • Experience-Oriented Knowledge Management for Internet of Things

    Publication

    - Year 2016

    In this paper, we propose a novel approach for knowledge management in Internet of Things. By utilizing Decisional DNA and deep learning technologies, our approach enables Internet of Things of experiential knowledge discovery, representation, reuse, and sharing among each other. Rather than using traditional machine learning and knowledge discovery methods, this approach focuses on capturing domain’s decisional events via Decisional...

    Full text to download in external service

  • Impact of Visual Image Quality on Lymphocyte Detection Using YOLOv5 and RetinaNet Algorithms

    Lymphocytes, a type of leukocytes, play a vital role in the immune system. The precise quantification, spatial arrangement and phenotypic characterization of lymphocytes within haematological or histopathological images can serve as a diagnostic indicator of a particular lesion. Artificial neural networks, employed for the detection of lymphocytes, not only can provide support to the work of histopathologists but also enable better...

    Full text to download in external service

  • Design and implementation of GEPON architecture in laboratory testbed

    Publication

    This paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...

  • QoS Resource Reservation Mechanisms for Switched Optical Networks

    Publication

    The paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...

    Full text to download in external service

  • On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience

    Publication
    • C. Esposito
    • A. Gouglidis
    • D. Hutchison
    • A. Gurtov
    • B. Helvik
    • P. Heegaard
    • G. Rizzo
    • J. Rak

    - Year 2018

    Network communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...

    Full text to download in external service

  • Proposal of New Tracer Concentration Model in Lung PCT Study Comparison with Commonly Used Gamma-variate Model

    Publication

    - Year 2017

    Perfusion computed tomography (pCT) is one of the methods that enable non-invasive imaging of the hemodynamics of organs and tissues. On the basis of pCT measurements, perfusion parameters such as blood flow (BF), blood volume (BV), mean transit time (MTT) and permeability surface (PS) are calculated and then used for quantitative evaluation of the tissue condition. To calculate perfusion parameters it is necessary to approximate...

    Full text available to download

  • Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard

    With the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...

    Full text available to download

  • Konzepte zur Energieeffizienzsteigerung bei Internet-Zugangsgeräten

    Publication

    - Year 2008

    The key issue of this paper is the power management of Internet access devices. The paper commences with an outline on the energy consumption of today's IT devices. It is followed by a description of options to increase energy efficiency of computers. The paper proves that in practice network cards and other IT network components, such as modems, network access points, switches and routers have the maximum energy consumption -...

  • Ubiquity of client access in heterogeneous access environment

    With popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....

    Full text available to download

  • Performance improvement of NN based RTLS by customization of NN structure - heuristic approach

    Publication

    - Year 2015

    The purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...

    Full text to download in external service