Filters
total: 4999
filtered: 2834
-
Catalog
- Publications 2834 available results
- Journals 246 available results
- Conferences 136 available results
- People 267 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 106 available results
- Events 5 available results
- Open Research Data 1402 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: COMPILER
-
Improving evolutionary multi-objective optimisation using genders [Usprawnienie ewolucyjnej wielokryterialnej optymalizacji poprzez zastosowanie rodzajników]
PublicationW rozwiązywaniu wielkowymiarowych problemów wielokryterialnej optymalizacji za pomocą obliczeń ewolucyjnych (EMO) koncepcja dominacji w sensie Pareto nie jest efektywna. Dlatego w pracy rozważa się nowe podejście do rozwiązywania zadań wielokryterialnej optymalizacji metodą EMO, w którym wprowadza się pojęcie rodzajników genetycznych w celu rozróżnienia rozmaitych grup kryteriów oraz związanych z nimi subkryterialnych rozwiązań...
-
Effectiveness of bluetooth scatternet coexisting with ieee 802.11b
PublicationArtykuł dotyka problematyki wzajemnych interferencji sieci Bluetooth i IEEE 802.11b. W szczególności analizowano wpływ transmisji 802.11b na pracę pojedynczej pikosieci w danym scatternecie BT.
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublicationProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Remote exception handling for PVM processes.
PublicationArtykuł przedstawia model lokalnej i zdalnej obsługi wyjątków w bibliotece PVM. Działający proces zostaje rozszerzony o możliwość zgłaszania zdalnych wyjątków do procesu nadrzędnego lub otrzymania akcji związanych z obsługą wyjątków. Przedstawiono wzorce obsługi wyjątków w aplikacjach rozproszonych oraz wprowadzono pojęcie Zdalnego Nadzorcy Wyjątków. Nadzorca może kontrolować każdy proces w maszynie wirtualnej (PVM).
-
PVM Web Cluster: integration of PVM clusters using Web services and CORBA.
PublicationProponujemy nową architekturę i jej implementację PVM Web Cluster, która umożliwia łatwe zrównoleglanie wykonania zadań PVM zarówno na geograficznie rozproszone klastry PVM jak i wewnątrz nich. Uruchamianie zadań jest wykonywane poprzez wywołanie usługi sieciowej (Web service), która negocjuje najlepszy klaster (klastry) dla danego zadania i komunikuje się z klastrami za pomocą standardu CORBA.
-
Exception handling model influence factors for discributed systems. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. 5th In- ternational Conference. Częstochowa, 7-10 September 2003.Model obsługi wyjątków uwzględniający wpływ czynników systemu rozproszonego.
PublicationSpecyfikacja programu jest jasno określona w systemach sekwencyjnych, gdzie posiada standardowe i wyjątkowe przejścia. Praca przedstawia rozszerzony model specyfikacji systemu w środowiskach rozproszonych uwzględniający szereg specyficznych czynników. Model zawiera analizę specyfikacji pod kątem obsługi wyjątków dla rozproszonych danych oraz komunikacji międzyprocesorowej. Ogólny model został zaimplementowany w środowisku...
-
Improving flexibility and performance of PVM applications by distributed partial evaluation
PublicationA new framework for developing both flexible and efficient PVM applications is described. We propose Architecture Templates Interface (ATI) that allows to control application granularity and parallelism. To ensure high application efficiency we extend partial evaluation strategy into domain of distributed applications obtaining Distributed Partial Evaluation (DPE). Both ATI and DPE were implemented using a new distributed programming...
-
Capabilities and limitations of the disabled in remote access to information
PublicationArtykuł poświęcony jest możliwościom zdalnego dostępu do źródeł informacji przez osoby niepełnosprawne. Przedstawia urządzenia i aparaty umożliwiające grupom osób niepełnosprawnych najłatwiejsze w ich sytuacji psychofizycznej sposoby zdalnego dostępu do Centrum Informacyjnego, precyzyjnego określenia potrzebnej informacji, jej odbiorze i zapisu odpowiedzi z punktu widzenia dysfunkcji organizmu inwalidy proszącego o informację.
-
Optimal linear control theory in power system application
PublicationPrzedstawiono syntezę stabilizatora systemowego przy wykorzystaniu metodyki Hinf. Zaprojektowany regulator umożliwia uzyskanie lepszych rezultatów w porównaniu z regulatorem odniesienia w szerokim zakresie zmian punktu pracy.
-
Finite automata for compact representation of language models in NLP
PublicationPrzedstawiona zostaje technika reprezentacji modeli języka w przetwarzaniu języka naturalnego wymagająca mało pamięci. Po krótkim omówieniu przyczyn poszukiwania oszczędnej reprezentacji takich modeli języka, pokazane jest, jak automaty skończone mogą być użyte w tym celu. Technika może być postrzegana jako zastosowanie i rozszerzenie doskonałej funkcji mieszającej z wykorzystaniem automatów skończonych. Pierwsze doświadczenia...
-
Dedicated scheduling of tasks to minimize mean flow time
PublicationThis paper investigates the complexity of scheduling biprocessor tasks on dedicated processors to minimize mean flow time. Since the general problem is strongly NP-hard, we assume some restrictions on task lengths and the structure of associated scheduling graphs. Of particular interest are acyclic graphs. In this way we identify a borderline between NP-hard and polynomially solvable special cases.
-
Ranking decision variants by subjective paird comparisons in cases with incomplete data.
PublicationMetoda porównań parami wykorzystywana jest do szeregowania skończonej,zwykle niewielkiej liczby wariantów decyzyjnych. W metodzie tej ekspert lub grupa ekspertów proszona jest o wyrażenie swojej opinii dotyczącej każdej pary wariantów w postaci względnej preferenecji jednego wariantu nad drugim.Zdarza się jednak często, że ekspert nie jest w stanie ocenić pary lub par wiariantów i mamy wtedy do czynienia z sytuacją...
-
Comparison of construction algorithms for minimal, acyclic, deterministicfinite state automata from sets of strings.
PublicationArtykuł porównuje różne metody tworzenia minimalnych, acyklicznych, deterministycznych automatów skończonych ze zbiorów słów. Wdrożone i porównane zostały metody przyrostowe, prawie przyrostowe i nieprzyrostowe.
-
Admission control method based on effective delay for flows using EF PHB.
Publication.
-
Three dimensional fluid equations from distribution function with discontinuity in velocity space
PublicationUkład równań typu hydrodynamicznego dla rozwarstwionego gazu w polu grawitacyjnym jest wyprowadzony z równania BKG przy użyciu metody kawałków ciągłej funkcji dystrybucji. Otrzymany układ równań uogólnia układ Naviera-Stokesa dla dowolnych liczb Knudsena.
-
Automated network control and supervision
PublicationPrzedstawiono ogólne problemy związane z postępem w zakresie integracji systemów informatycznych w elektroenergetyce. Podano zasady budowy struktury systemów sterowania i nadzoru.
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublicationThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublicationWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...
-
An Efficient Noisy Binary Search in Graphs via Median Approximation
PublicationConsider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...
-
Tensor Decomposition for Imagined Speech Discrimination in EEG
PublicationMost of the researches in Electroencephalogram(EEG)-based Brain-Computer Interfaces (BCI) are focused on the use of motor imagery. As an attempt to improve the control of these interfaces, the use of language instead of movement has been recently explored, in the form of imagined speech. This work aims for the discrimination of imagined words in electroencephalogram signals. For this purpose, the analysis of multiple variables...
-
Pursuing the Deep-Learning-Based Classification of Exposed and Imagined Colors from EEG
PublicationEEG-based brain-computer interfaces are systems aiming to integrate disabled people into their environments. Nevertheless, their control could not be intuitive or depend on an active external stimulator to generate the responses for interacting with it. Targeting the second issue, a novel paradigm is explored in this paper, which depends on a passive stimulus by measuring the EEG responses of a subject to the primary colors (red,...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Architecture Design of a Networked Music Performance Platform for a Chamber Choir
PublicationThis paper describes an architecture design process for Networked Music Performance (NMP) platform for medium-sized conducted music ensembles, based on remote rehearsals of Academic Choir of Gdańsk University of Technology. The issues of real-time remote communication, in-person music performance, and NMP are described. Three iterative steps defining and extending the architecture of the NMP platform with additional features to...
-
On-Line Partitioning for On-Line Scheduling with Resource Conflicts
PublicationWithin this paper, we consider the problem of on-line partitioning the sequence of jobs which are competing for non-sharable resources. As a result of partitioning we get the subsets of jobs that form separate instances of the on-line scheduling problem. The objective is to generate a partition into the minimum number of instances such that the response time of any job in each instance is bounded by a given constant. Our research...
-
Multi-Option Model of Railway Traffic Organization Including the Energy Recuperation
PublicationThe article presents the issue of organization of railway traffic within the station, taking into account energy recuperation. We identified a number of factors which affect the energy efficiency of recuperation, including the issue of transfer of energy technology between a few vehicles. We presented some aspects of the decision problem of graphic train timetable construction with regard to recuperation. As an indicator of quality...
-
Multimodal Attention Stimulator
PublicationMultimodal attention stimulator was proposed and tested for improving auditory and visual attention, including pupils with developmental dyslexia. Results of the conducted experiments shown that the designed stimulator can be used in order to improve comprehension during reading tasks. The changes in the visual attention, observed in reading test results, translate into the overall reading performance.
-
Policy Monitoring on Accessible Technology for Inclusive Education – Research Findings and Requirements for a Software Tool
PublicationStatistics about disabled people usually do not receive as much attention as statistics highlighting other socio-economic problems. However, such statistics is important due to its actual weight.According to the World Health Organization (WHO), about 15% of the world population, meaning one billion people, live with disabilities, and 80% of them live in developing countries. UNESCO claims that 90% of the children with disabilities...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
Task Allocation and Scalability Evaluation for Real-Time Multimedia Processing in a Cluster Envirinment
PublicationAn allocation algorithm for stream processing tasks is proposed (Modified best Fit Descendent, MBFD). A comparison with another solution (BFD) is provided. Tests of the algorithms in an HPC environment are descrobed and the results are presented. A proper scalability metric is proposed and used for the evaluation of the allocation algorithm.
-
The complexity of minimum-length path decompositions
PublicationWe consider a bi-criteria generalization of the pathwidth problem, where, for given integers k, l and a graph G, we ask whether there exists a path decomposition P of G such that the width of P is at most k and the number of bags in P, i.e., the length of P, is at most l. We provide a complete complexity classification of the problem in terms of k and l for general graphs. Contrary to the original pathwidth problem, which is fixed-parameter...
-
Fast Collaborative Graph Exploration
PublicationWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
mechanical engineering education via projects in multibody dynamics
PublicationPraca prezentuje rozważania nad wykorzystaniem interdyscyplinarnych projektów bazujących na zasadach dynamiki układów wieloczłonowych, traktowanych tu jako rozwinięcie kursu klasycznej mechaniki. Celem dydaktycznym jest zebranie w jednym procesie dydaktycznym takich aspektów jak: możliwość wykorzystania poznanych teoretycznie równań do modelowania i analizy znanego mu obiektu rzeczywistego; umożliwienie formułowania i testowania...
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
-
A Clustering-Based Methodology for Selection of Fault Tolerance Techniques
PublicationDevelopment of dependable applications requires selection of appropriate fault tolerance techniques that balance efficiency in fault handling and resulting consequences, such as increased development cost or performance degradation. This paper describes an advisory system that recommends fault tolerance techniques considering specified development and runtime application attributes. In the selection process, we use the K-means...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
The Use of Mobile Devices in the Care and Home Monitoring of the Elderly and the Sick
Publication...
-
Gaze pattern lock for elders and disabled
Publication...
-
Comparison of induction motor bearing diagnostic test results through vibration and stator current measurement
PublicationThe paper discusses results of tests performed by authors, related to the angine bearings diagnostic using vibration and stator current measurements. The paper contains the description of an automatic measurement system, developed for measurement of those harmonics and processing that to obtain bearing diagnostic information. System was tested on objects with intentionally made defects in bearings, results of this test was also...
-
Decisional DNA applied to digital TV
PublicationPrzedstawiono nowoczesną koncepcje integracji decyzyjnego DNA z telewizją cyfrową w celu pozyskiwania wiedzy o oglądalności poszczególnych programów.
-
Decisional DNA digitral TV: concept and initial experiments
PublicationPrzedstawiono pierwsze wyniki eksperymentalnej integracji telewizji cyfrowej z decyzyjnym DNA reprezentujacym wiedze o odbiorcy programow.
-
Application of decisional DNA in web data mining
PublicationPrzedstawiono pilotową koncepcję i aplikację integracji reprezentacji wiedzy opartej na decyzyjnym DNA oraz systemów pozyskiwania wiedzy i danych z Internetu. Wskazano na zalety proponowanej integracji oraz przedstawiono kierunki przyszłych badań w tym zakresie.
-
Knowledge Management Challenges in Collaborative Design of a Virtual Call Centre
PublicationThis paper presents the analysis of knowledge management issues for an user interface consulting project relevant during the development of a Virtual Call Centre. Experiences gathered by the team of designers and team of usability consultants have been described and evaluated from the knowledge management viewpoint. A concept of a knowledge-based system, potentially supporting usability consulting in subsequent IT projects has...