Search results for: computer networks
-
Metody sztucznej inteligencji do wspomagania bankowych systemów informatycznych
PublicationW pracy opisano zastosowania nowoczesnych metod sztucznej inteligencji do wspomagania bankowych systemów informatycznych. Wykorzystanie w systemach informatycznych algorytmów ewolucyjnych, harmonicznych, czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwiają zasadniczy wzrost konkurencyjności banku. Dlatego w pracy omówiono wybrane zastosowania bankowe ze szczególnym uwzględnieniem zbliżeniowych...
-
Sterowanie optyczną siecią wielodomenową z hierarchiczną strukturą płaszczyzn sterowania
PublicationW artykule przedstawiono problem sterowania wielodomenową siecią optyczną z hierarchiczną strukturą płaszczyzn sterowania. Autorzy proponują wykorzystanie koncepcji sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie wielodomenową siecią z gwarancją jakości usług. W artykule zaproponowano algorytm sterowania z gwarancją jakości, którego efektywność zweryfikowano metodą symulacji...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublicationThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
SegSperm - a dataset of sperm images for blurry and small object segmentation
Open Research DataMany deep learning applications require figure-ground segmentation. The performance of segmentation models varies across modalities and acquisition settings.
-
Jerzy Proficz dr hab. inż.
PeopleJerzy Proficz, Ph.D. is the director of the Centre of Informatics – Tricity Academic Supercomputer & networK (CI TASK) at Gdansk University of Technology, Poland. He earned his Ph.D. (2012) in HPC (High Performance Computing) in the subject of supercomputer resource provisioning and management for on-line data processing D.Sc. (2022) in the discipline: Information and Communication Technology. Author and co-author of over 50...
-
Deep Features Class Activation Map for Thermal Face Detection and Tracking
PublicationRecently, capabilities of many computer vision tasks have significantly improved due to advances in Convolutional Neural Networks. In our research, we demonstrate that it can be also used for face detection from low resolution thermal images, acquired with a portable camera. The physical size of the camera used in our research allows for embedding it in a wearable device or indoor remote monitoring solution for elderly and disabled...
-
Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation
Open Research DataThe dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
DIAGNOSIS OF MALIGNANT MELANOMA BY NEURAL NETWORK ENSEMBLE-BASED SYSTEM UTILISING HAND-CRAFTED SKIN LESION FEATURES
PublicationMalignant melanomas are the most deadly type of skin cancer but detected early have high chances for successful treatment. In the last twenty years, the interest of automated melanoma recognition detection and classification dynamically increased partially because of public datasets appearing with dermatoscopic images of skin lesions. Automated computer-aided skin cancer detection in dermatoscopic images is a very challenging task...
-
Interval wavelength assignment in all-optical star networks
PublicationArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Hydrauliczna wiarygodność wyników pomiarów terenowych stosowanych do identyfikacji oporności hydraulicznej przewymiarowanych sieci wodociągowych
PublicationPublikacja zawiera zalecenia metodyczne dotyczące identyfikacji oporności hydraulicznej w przewymiarowanych sieciach wodociągowych na tle spotykanych nieprawidłowości. Krytycznie oceniono wyniki pomiarów terenowych, które zastosowano do tarowania komputerowych modeli przepływów (KMP) pomimo, że nie spełniały kryterium hydraulicznej wiarygodności. Ponadto zaproponowano spadek hydrauliczny jako obiektywny wskaźnik wiarygodności pomiarów,...
-
Diagnosis of damages in family buildings using neural networks
PublicationThe article concerns a problem of damages in family buildings, which result from traffic-induced vibrations. These vibrations arise from various causes and their size is influenced by many factors. The most important is the type of a road, type and weight of vehicles that run on the road, type and condition of the road surface, the distance from the house to the source of vibrations and many others which should be taken into account....
-
Initial Investigation of Wave Interactions During Simultaneous Valve Closures in Hydraulic Piping Systems
PublicationThe effects of interference of pressure waves in simple piping systems were studied. A freeware computer code Allievi developed at the University of Valencia was used to simulate dynamic waveforms in simple and complex networks. The tests were carried out according to three scenarios. No pressure increases significantly exceeding the Joukowsky pressure in simple cases were noticed. When the effects of the simultaneous closing of...
-
Computed aided system for separation and classification of the abnormal erythrocytes in human blood
PublicationThe human peripheral blood consists of cells (red cells, white cells, and platelets) suspended in plasma. In the following research the team assessed an influence of nanodiamond particles on blood elements over various periods of time. The material used in the study consisted of samples taken from ten healthy humans of various age, different blood types and both sexes. The markings were leaded by adding to the blood unmodified...
-
Optimization issues in distributed computing systems design
PublicationIn recent years, we observe a growing interest focused on distributed computing systems. Both industry and academia require increasing computational power to process and analyze large amount of data, including significant areas like analysis of medical data, earthquake, or weather forecast. Since distributed computing systems – similar to computer networks – are vulnerable to failures, survivability mechanisms are indispensable...
-
Signals of the NB-IoT network generated by using the radiocommunication tester R&S CMW500
Open Research DataThe published dataset contains signals of the NB-IoT networks generated in the controlled conditions by using the Rohde&Schwarz CMW500 radiocommunication tester and recorded by USRP-X310 device. A test signals of the NB-IoT networks operating in the in-band, standalone and guard-band modes were captured.
-
Music information retrieval—The impact of technology, crowdsourcing, big data, and the cloud in art.
PublicationThe exponential growth of computer processing power, cloud data storage, and crowdsourcing model of gathering data bring new possibilities to music information retrieval (mir) field. Mir is no longer music content retrieval only; the area also comprises the discovery of expressing feelings and emotions contained in music, incorporating other than hearing modalities for helping this issue, users’ profiling, merging music with social...
-
University Students’ Research on Artificial Intelligence and Knowledge Management. A Review and Report of Multi-case Studies
PublicationLeading technologies are very attractive for students preparing their theses as the completion of their studies. Such an orientation of students connected with professional experiences seems to be a crucial motivator in the research in the management and business areas where these technologies condition the development of professional activities. The goal of the paper is the analysis of students’ thesis topics defended in the last...
-
Analyzing the Effectiveness of the Brain–Computer Interface for Task Discerning Based on Machine Learning
PublicationThe aim of the study is to compare electroencephalographic (EEG) signal feature extraction methods in the context of the effectiveness of the classification of brain activities. For classification, electroencephalographic signals were obtained using an EEG device from 17 subjects in three mental states (relaxation, excitation, and solving logical task). Blind source separation employing independent component analysis (ICA) was...
-
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
-
The conducted immunity test of a power supply unit in accordance with EMC standards
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 150 kHz to 230 MHz are...
-
Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks
PublicationRendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...
-
Adaptive prediction of stock exchange indices by state space wavelet networks
PublicationThe paper considers the forecasting of the Warsaw Stock Exchange price index WIG20 by applying a state space wavelet network model of the index price. The approach can be applied to the development of tools for predicting changes of other economic indicators, especially stock exchange indices. The paper presents a general state space wavelet network model and the underlying principles. The model is applied to produce one session...
-
A Highly Scalable, Modular Architecture for Computer Aided Assessment e-Learning Systems
PublicationIn this chapter, the authors propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. The authors' research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge...
-
Artificial Intelligence Aided Architectural Design
PublicationTools and methods used by architects always had an impact on the way building were designed. With the change in design methods and new approaches towards creation process, they became more than ever before crucial elements of the creation process. The automation of architects work has started with computational functions that were introduced to traditional computer-aided design tools. Nowadays architects tend to use specified tools...
-
Analysis of the Capability of Deep Learning Algorithms for EEG-based Brain-Computer Interface Implementation
PublicationMachine learning models have received significant attention for their exceptional performance in classifying electroencephalography (EEG) data. They have proven to be highly effective in extracting intricate patterns and features from the raw signal data, thereby contributing to their success in EEG classification tasks. In this study, we explore the possibilities of utilizing contemporary machine learning algorithms in decoding...
-
AUTOMATYCZNA KLASYFIKACJA MOWY PATOLOGICZNEJ
PublicationAplikacja przedstawiona w niniejszym rozdziale służy do automatycznego wykrywania mowy patologicznej na podstawie bazy nagrań. W pierwszej kolejności przedstawiono założenia leżące u podstaw przeprowadzonych badan wraz z wyborem bazy mowy patologicznej. Zaprezentowano również zastosowane algorytmy oraz cechy sygnału mowy, które pozwalają odróżnić mowę niezaburzoną od mowy patologicznej. Wytrenowane sieci neuronowe zostały następnie...
-
Large-scale multimedia content delivery over optical networks for interactive TV services
Publication -
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublicationInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
A novel genetic approach to provide differentiated levels of service resilience in IP-MPLS/WDM networks
PublicationThis paper introduces a novel class-based method of survivable routing for connection-oriented IP-MPLS/WDM networks, called MLS-GEN-H. The algorithm is designed to provide differentiated levels of service survivability in order to respond to varying requirements of end-users. It divides the complex problem of survivable routing in IP-MPLS/WDM networks into two subproblems, one for each network layer, which enables finding the...
-
Using Convolutional Neural Networks for Corneal Arcus Detection Towards Familial Hypercholesterolemia Screening
PublicationFamilial hypercholesterolemia (FH) is a highly undiagnosed disease. Among FH patients, the onset of premature coronary artery disease is 13 times higher than in the general population. Early diagnosis and treatment is essential to prevent cardiovascular diseases and their complications, and to prolong life. One of the clinical criteria of FH is the occurrence of a corneal arcus (CA) among patients, especially those under 45 years...
-
Robust and Efficient Machine Learning Algorithms for Visual Recognition
PublicationIn visual recognition, the task is to identify and localize all objects of interest in the input image. With the ubiquitous presence of visual data in modern days, the role of object recognition algorithms is becoming more significant than ever and ranges from autonomous driving to computer-aided diagnosis in medicine. Current models for visual recognition are dominated by models based on Convolutional Neural Networks (CNNs), which...
-
Set membership estimation of parameters and variables in dynamic networks by recursive algorithms with moving measurment window
PublicationW artykule rozważana jest łączna estymacja przedziałowa zmiennych i parametrów w złożonej sieci dynamicznej w oparciu niepewne modele parametryczne i ograniczoną liczbę pomiarów. Opracowany został rekursywny algorytm estymacji z przesuwnym oknem pomiarowym, odpowiedni dla monitorowania sieci on-line. Okno pomiarowe pozwala na stabilizowanie klasycznego algorytmu rekurencyjnego estymacji i znacznie poprawienie obcisłości estymat....
-
Results of implementation of Feed Forward Neural Networks for modeling of heat transfer coefficient during flow condensation for low and high values of saturation temperature
Open Research DataThis database present results of implementation of Feed Forward Neural Networks for modeling of heat transfer coefficient during flow condensation for low and high values of saturation temperature. Databse contain one table and 7 figures.
-
BETWEEN IDEA AND INTERPRETATION - DESIGN PROCESS AUGMENTATION
PublicationThe following paper investigates the idea of reducing the human digital intervention to a minimum during the advanced design process. Augmenting the outcome attributes beyond the designer's capabilities by computational design methods, data collection, data computing and digital fabrication, altogether imitating the human design process. The primary technical goal of the research was verification of restrictions and abilities used...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 3 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 1 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 10 V
Open Research DataThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
Oprogramowanie Systemów Elektronicznych 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Oprogramowanie Systemów Elektronicznych 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Infosystemy Elektroniczne 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Infosystemy Elektroniczne 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublicationProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
Vehicle detector training with minimal supervision
PublicationRecently many efficient object detectors based on convolutional neural networks (CNN) have been developed and they achieved impressive performance on many computer vision tasks. However, in order to achieve practical results, CNNs require really large annotated datasets for training. While many such databases are available, many of them can only be used for research purposes. Also some problems exist where such datasets are not...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...