displaying 1000 best results Help
Search results for: mappings creation and verification
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet
PublicationThe paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...
-
Automatically created and partially veriffied Wikipedia - WordNet mappings
Open Research DataMapping between Wikipedia articles and WordNet synsets. The mappings between Wikipedia articles and WordNet synsets were obtained automatically using 4 algorithms of data processing. The automatically generated mappings were than a subject of verification by a group of volunteers using crowdsourcing approach through so called Games with a Purpose. The...
-
Assessing Word Difficulty for Quiz-Like Game
PublicationMappings verification is a laborious task. Our research aims at providing a framework for manual verification of mappings using crowdsourcing approach. For this purpose we plan on implementing a quiz like game. For this purpose the mappings have to be evaluated in terms of difficulty to better present texts in respect of game levels. In this paper we present an algorithm for assessing word difficulty. Three approaches...
-
Adam Inglot dr inż.
PeopleAdam Inglot (born October 3, 1984), studied Environmental Engineering and Geodesy and Cartography at the Faculty of Mine Surveying and Environmental Engineering of AGH University of Science and Technology in Krakow. He graduated in 2011 as a M.Sc. in Environmental Engineering, defending his thesis "Verification of usefulness of GeoMod model for prediction of the urbanization process in Cracow agglomeration" under the guidance of...
-
Concept of the agent system for the information technology evaluation
PublicationIn this paper the concept of the agent system for the information technology evaluation has been presented. This article includes the concept description and shows abilities of using software tools which can be applicable to implementation and verification of proposed solution. The article is the part of common researches over creation solutions for information technology evaluation which range over using expert's evaluation and...
-
Self-Testing of Analog Parts Terminated by ADCs Based on Multiple Sampling of Time Responses
PublicationA new approach for self-testing of analog parts terminated by analog-to-digital converters in mixed-signal electronic microsystems controlled by microcontrollers is presented. It is based upon a new fault diagnosis method using a transformation of the set of voltage samples of the time response of a tested analog part to a square impulse into localization curves placed in a multidimensional measurement space. The method can be used...
-
Ontology management in the multi-agent system for the it evaluation
PublicationThe team of researchers at the Gdańsk University of Technology is currently developing a model of the multi-agent system (MAS_IT) that would aid the IT managers to find the most appropriate technology to the goals assumed. The knowledge is to be provided by experts and stored in the facts and rules bases. The responsibility of the verification process-on the input and query stages-is given to the ontology, making it to some extend...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Online brand communities’ contribution to digital business models
PublicationAbstract Purpose – There is limited research examining social drivers and mediators of online brand community identification in the context of business models development. This study aims to identify them behind the social mechanisms and present essential factors which should be applied in business models to foster value co-creation. Design/methodology/approach – Data were collected from a convenience sample of 712 cases gathered among...
-
Towards New Mappings between Emotion Representation Models
PublicationThere are several models for representing emotions in affect-aware applications, and available emotion recognition solutions provide results using diverse emotion models. As multimodal fusion is beneficial in terms of both accuracy and reliability of emotion recognition, one of the challenges is mapping between the models of affect representation. This paper addresses this issue by: proposing a procedure to elaborate new mappings,...
-
Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
PublicationThis paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...
-
ARTIFICIAL MODEL IN THE ASSESSMENT OF THE ALGORITHM OF OBJECTS RECORDED BY LASER SCANNING SHAPE DETECTION (ALS/TLS)
PublicationBrief description of the study and used methods. Brief description of the study and used As part of the preparatory work aimed to create the application solution allowing for the automation of searching objects in data, obtained in the scanning process using ALS (Airborne Laser Scanning) or TLS (Terrestrial Laser Scanning), the authors prepared a artificial (synthetic, theoretical) model of space, used for the verification of operation...
-
Variable Resolution Machine Learning Optimization of Antennas Using Global Sensitivity Analysis
PublicationThe significance of rigorous optimization techniques in antenna engineering has grown significantly in recent years. For many design tasks, parameter tuning must be conducted globally, presenting a challenge due to associated computational costs. The popular bio-inspired routines often necessitate thousands of merit function calls to converge, generating prohibitive expenses whenever the design process relies on electromagnetic...
-
On homotopies of morphisms and admissible mappings
PublicationThe notion of homotopy in the category of morphisms introduced by G´orniewicz and Granas is proved to be equivalence relation which was not clear for years. Some simple properties are proved and a coincidence point index is described.
-
TEAM RESEARCH PROJECT I & II_2024/25
e-Learning CoursesThe aim of a team research project is to conduct a process in which Students will verify the research hypothesis set by the Client. For this purpose, the project may require the creation of a product, e.g. an application, a device and conducting appropriate research, analysis of results, etc. In the event that the University/Client shares confidential information (including data), the Students will be required to sign an undertaking...
-
On the Nielsen fixed point theory for multivalued mappings
Publication -
Selections and approximations of convex-valued equivariant mappings
PublicationUdowodniono szereg twierdzeń o współzmienniczych selekcjach i aproksymacjach ciągłych, mierzalnych i typu Caratheodory'ego dla odwzorowań G-współzmienniczych o wartościach wypukłych, gdzie G jest grupą zwartą Liego. Tw. typu Michaela, Celliny, Browdera, Kuratowskiego-Ryll-Nardzewskiego, Castaing itd.
-
The Creation of an Antimicrobial Coating on Contact Lenses by The Use of Nanocopper
PublicationThe aim of the research was to creation an antimicrobial coating on contact lens and examine the ability of copper nanoparticles to decrease microbial adhesion and prevent the growth of bacteria. The creation was based on the immersion method in solution with dispersed nanoparticles of copper at concentration 200 pm. There were evaluated follows factors: time of immersion and base to dispersed nanoparticles. Three solutions: ethyl...
-
OSC - domain oriented ontology creation system
PublicationOntologies are, as part of semantic web, a basic component to enrich content available in the Internet with a meaning understandable for computers. In this publication an architecture and functionality of a domain oriented web portal for collaborative creation and storage of ontologies is presented. The system is being created by Gdańsk University of Technology Electronics, Telecommunications and Informatics faculty's Department...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Successful Case of Social Cooperative 50+ as an Example of Value Creation
PublicationThe article presents the successful case of social cooperative 50+ as an Example of Value Creation. Authors discuss an idea of social enterprises and social cooperatives and success factors of them.
-
Dynamics of Field Line Mappings in Magnetic Flux Tubes
PublicationWe study the topological constraints on the dynamics of magnetic field lines in flux tubes. Our approach is based on the application of the topological invariant: fixed point index. We consider periodic flux tubes and find various restrictions on the field lines that come from the sequence of fixed point indices of iterations. We also analyze the case of a tube with a cylindrical obstacle, deducing some special dynamical properties...
-
A handwritten signature verification method employing a tablet
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method's efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Verification and Benchmarking in MPA Coprocessor Design Process
PublicationThis paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....
-
Application of Text Analytics in Public Service Co-Creation: Literature Review and Research Framework
PublicationThe public sector faces several challenges, such as a number of external and internal demands for change, citizens' dissatisfaction and frustration with public sector organizations, that need to be addressed. An alternative to the traditional top-down development of public services is co-creation of public services. Co-creation promotes collaboration between stakeholders with the aim to create better public services and achieve...
-
Brand loyalty creation in the social network. Does the product category matter?
PublicationThe final goal of all marketers’ effort is to achieve a high level of loyalty toward their brands. Social network brand sites are increasingly attracting the attention of scientists and managers intrigued by their potential application for brand loyalty creation. The aim of this research, based on European sample, is to fill the gap in understanding the product category loyalty and brand loyalty relation as an output of brand identification...
-
Handwritten signature verification system employing wireless biometric pen
PublicationThe handwritten signature verification system being a part of the developed multimodal biometric banking stand is presented. The hardware component of the solution is described with a focus on the signature acquisition and on verification procedures. The signature is acquired employing an accelerometer and a gyroscope built-in the biometric pen plus pressure sensors for the assessment of the proper pen grip and then the signature...
-
Organizational creation of knowledge in universities
PublicationAutor wykorzystuje model Nonaki i Takeuchiego do opisu organizacyjnego wiedzy w uczelni. Przedstawia kolejne elementy procesu organizacyjnego tworzenia wiedzy w uczelni - socjalizację, eksternalizację, kombinację oraz internalizację. Szczegółowo omawia te procesy na przykładzie opracowywania programu nowego kierunku studiów.
-
AI in the creation of the satellite maps
PublicationSatellite and aerial imagery acquisition is a very useful source of information for remote monitoring of the Earth’s surface. Modern satellite and aerial systems provide data about the details of the site topography, its characteristics due to different criteria (type of terrain, vegetation cover, soil type and moisture content), or even information about emergency situations or disasters. The paper proposes and discusses the process...
-
Testbed for development and verification of hybrid localization systems
PublicationIn this paper a testbed for development and verification of hybrid localization systems is presented. It allows for systematic analysis of hybrid localization methods and speed up the development of new schemes. The proposed testbed platform is composed of subsystem for sequential data collection and testing infrastructure that can be used for investigating the localization mechanisms in controllable environment.
-
Identity verification using complex representations of handwritten signature
PublicationThis paper is devoted to handwritten signature verification using the cross-correlation approach (adopted by the authors from telecommunications) and dynamic time warping. The following invariants of the handwritten signature: the net signature, the instantaneous complex frequency and the complex cepstrum are analyzed. The problem of setting the threshold for deciding whether the current signature is authentic or forged is discussed....
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Fixed point theorems for weakly commuting and compatible multi-valued mappings.
PublicationW pracy podano twierdzenia o wspólnych punktach stałych czwórki odwzorowań: dwóch jednowartościowych T i S oraz dwóch wielowartościowych F i G, spełniających nieliniowy uogólniony warunek kontrakcyjny, przy pewnych założeniach dotyczących uogólnionej komutatywności T,S i F,G. W pracy zamieszczono przykłady ilustrujące udowodnione twierdzenia.
-
Analysis of results of large-scale multimodal biometric identity verification experiment
PublicationAn analysis of a large set of biometric data obtained during the enrolment and the verification phase in an experimental biometric system installed in bank branches is presented. Subjective opinions of bank clients and of bank tellers were also surveyed concerning the studied biometric methods in order to discover and to explore relations emerging from the obtained multimodal dataset. First, data acquisition and identity verification...
-
Inflexions-A Journal for Research Creation
Journals -
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublicationResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Stress analysis of the bridge hangers in terms of the fatigue verification
PublicationThe paper presents the results of numerical stress analysis of the bridge rod hangers. Two types of hangers were taken into account, i.e. the bolted hanger and the welded hanger. A detailed FEM shell models of the connection area between the hanger and the bridge span have been developed. Local stress concentration effects have been investigated in terms of fatigue verification.
-
Integrity level verification for safety-related functions
PublicationThis article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...
-
Elgold intermediate: verified by verification team
Open Research DataThe dataset contains the texts from Elgold intermediate: annotated raw additionaly verified by the five-person verification team. arly 25% of the mentions were corrected in some aspect.
-
Eigenfaces, Fisherfaces, Laplacianfaces, Marginfaces – How to Face the Face Verification Task
PublicationThis paper describes the exhaustive tests of four known methods of linear transformations (Eigenfaces, Fisherfaces, Laplacianfaces and Marginfaces) in the context of face verification task. Additionally, we introduce a new variant of the transformation (Laplacianface + LDA), and the specific interval-based decision rule. Both of them improve the performance of face verification, in general, however, our experiments show that the...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Modified dynamic time warping method applied to handwritten signature authenticity verification
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method’s efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Face detection algorithms evaluation for the bank client verification
PublicationResults of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...
-
Performance Analysis of Developed Multimodal Biometric Identity Verification System
PublicationThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic handwritten signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed...
-
Study of the Operation of Synchronous Generator Voltage Regulator During the Creation of Post Blackout Start-up Path
PublicationThis paper presents the influence of automatic voltage regulator (AVR) of synchronous generator on the process of creation of post black-out start-up path. Two elements of AVR have a significant impact on this process: underexcitation limiter (UEL) and load compensation (LC). The authors present a theoretical investigation and simulation results that illustrate how the mentioned elements of AVR affect voltage levels in a power...
-
Pilot Testing of Developed Multimodal Biometric Identity Verification System
PublicationThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed at engineered...
-
SOFTWARE TESTING VERIFICATION & RELIABILITY
Journals -
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublicationThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
On the necessity of experimental verification of numerical results in biomedical applications
PublicationPorous structures made of metal or biopolymers with a structure similar in shape and mechanical properties to human bone can be easily produced by stereolitography techniques, e.g. selective laser melting (SLM). Numerical techniques, like finite element method (FEM) have great potential in testing new, even the most sophisticated designs, according to their mechanical properties, i.e. strength or stiffness. However, due to different...