Filters
total: 3093
filtered: 1920
-
Catalog
- Publications 1920 available results
- Journals 294 available results
- Conferences 143 available results
- People 255 available results
- Inventions 5 available results
- Projects 3 available results
- Research Teams 3 available results
- Research Equipment 2 available results
- e-Learning Courses 124 available results
- Events 5 available results
- Open Research Data 339 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: computer phylogenetics
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublicationTwo mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...
-
Supporting Management Decisions with Intelligent Mechanisms of Obtaining and Processing Knowledge
PublicationThis paper is a summary of the authors' work on a model of support for decision processes in organisation management. Key decisions in organisations are often made without sufficient knowledge and by people lacking the proper qualifications and experience. Without full support in decision processes, true threats to organisations are created. Therefore, to support decision processes in numerous organisations, apart from experts...
-
GreedyMAX-type Algorithms for the Maximum Independent Set Problem
PublicationA maximum independent set problem for a simple graph G = (V,E) is to find the largest subset of pairwise nonadjacent vertices. The problem is known to be NP-hard and it is also hard to approximate. Within this article we introduce a non-negative integer valued functionp defined on the vertex set V(G) and called a potential function of agraph G, while P(G) = max{vinV(G)| p(v)} is called a potential of G. For any graph P(G) <= D(G),...
-
Ontology as a Tool for the IT Management Standards Support
PublicationIn this paper the authors discuss the initial idea of using ontologies to model requirements of the standards that support IT management processes. The Open Group Architecture Framework (TOGAF) is set as an example. A need for transition from the generic model do the organization-specific one is indicated. The described example serves as a ground for considering the usefulness of such modeling approach in the wider spectrum of...
-
Large-scale multimedia content delivery over optical networks for interactive TV services
Publication -
The ICTBioMed NCIP Hub: Cancer research in a science gateway consortium
Publication -
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
-
Three positive solutions to second-order three-point impulsive differential equations with deviating arguments
PublicationStosując tw. Leggetta-Williamsa, pokazano że rozpatrywany trzypunktowy problem brzegowy z impulsami ma dodatnie rozwiązania (trzy). Otrzymane twierdzenia dotyczą przypadku opóźnionego oraz wyprzedzonego. W pracy podano przykład i pokazano, że przyjęte założenia są spełnione.
-
Terminological and Assertional Queries in KQL Knowledge Access Language
PublicationOne of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...
-
Interactive cognitive-behavioural decision making system
PublicationPraca przedstawia wyniki przekształcenia modelu psychologicznego człowieka w interaktywny, poznawczo-behawioralny, system podejmowania decyzji, uwarunkowany zarówno środowiskowo, jak i ze względu na stany spełnienia założonych potrzeb. Model ludzkiej psychologii oparty jest na psychologii poznawczej i psychologii osobowości. Zawiera on emocje, potrzeby i struktury ludzkich procesów poznawczych. Opracowany model i sposób realizacji...
-
Smaller Representation of Finite State Automata
PublicationThis paper is a follow-up to Jan Daciuk's experiments on space-effcient finite state automata representation that can be used directly for traversals in main memory. We investigate several techniques of reducing memory footprint of minimal automata, mainly exploiting the fact that transition labels and transition pointer offset values are not evenly distributed and so are suitable for compression. We achieve a gain of around 20-30%...
-
Parallel processing of multimedia streams
PublicationRozdział przedstawia platformę KASKADA służącą do przetwarzania strumieni multimedialnych. Został opisany jej projekt: diagramy UML klas i sekwencji obrazujące mechanizmy przetwarzania strumieni, oraz szczegóły komunikacji. Zaprezentowano, również, specjalistyczny framework wspomagający tworzenie i wykonywanie algorytmów, jak również definiowanie scenariuszy usług, wraz z oceną ich użyteczności.
-
Decisional DNA applied to digital TV
PublicationPrzedstawiono nowoczesną koncepcje integracji decyzyjnego DNA z telewizją cyfrową w celu pozyskiwania wiedzy o oglądalności poszczególnych programów.
-
Decisional DNA digitral TV: concept and initial experiments
PublicationPrzedstawiono pierwsze wyniki eksperymentalnej integracji telewizji cyfrowej z decyzyjnym DNA reprezentujacym wiedze o odbiorcy programow.
-
Application of decisional DNA in web data mining
PublicationPrzedstawiono pilotową koncepcję i aplikację integracji reprezentacji wiedzy opartej na decyzyjnym DNA oraz systemów pozyskiwania wiedzy i danych z Internetu. Wskazano na zalety proponowanej integracji oraz przedstawiono kierunki przyszłych badań w tym zakresie.
-
Knowledge Management Challenges in Collaborative Design of a Virtual Call Centre
PublicationThis paper presents the analysis of knowledge management issues for an user interface consulting project relevant during the development of a Virtual Call Centre. Experiences gathered by the team of designers and team of usability consultants have been described and evaluated from the knowledge management viewpoint. A concept of a knowledge-based system, potentially supporting usability consulting in subsequent IT projects has...
-
IT Business Standards as an Ontology Domain
PublicationThe aim of this paper is to report a selection of Semantic Web aspects pertaining to ontology development activities in the domain of the IT business standard (TOGAF 9) such as formulating competency questions, conceptualization of the domain, resolution of the source knowledge deficiency and applying common design patterns in the OWL formalization. Authors also try to determine target groups that may benefit from such ontology...
-
The role and concept of sub-models in the smart fuzzy model of the internet mortgage market
PublicationThe paper introduces some challenges of the fast growing mortgage market in Poland. One of these challenges is the need for a model development that could be used for various predictions related to this market. At the current stage of the model evelopment process our main goal is to propose and introduce sub-models the role of which would be to describe three different economic environments: stable, fast growing, and recession....
-
Kernel PCA in Application to Leakage Detection in Drinking Water Distribution System
PublicationMonitoring plays an important role in advanced control of complex dynamic systems. Precise information about system's behaviour, including faults detection, enables efficient control. Proposed method- Kernel Principal Component Analysis (KPCA), a representative of machine learning, skilfully takes full advantage of the well known PCA method and extends its application to nonlinear case. The paper explains the general idea of KPCA...
-
Measurement of the Development of a Learning IT Organization Supported by a Model of Knowledge Acquisition and Processing
PublicationThe paper presents a model of knowledge acquisition and processing for the development of learning organizations. The theory of a learning organization provides neither metrics nor tools to measure its development The authors' studies in this field are based on their experience gathered after projects realized in real IT organizations. The authors have described the construction of the model and the methods of its verification...
-
A concept for comprehensive knowledge management system
PublicationPrzedstawiono kluczowe elementy koncepji uogólnionego modelu zarządzania wiedzą w oparciu o przepływy pracy w procesowym widzeniu organizacji.
-
Regional observatory as a part of road safety information system
PublicationEU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Traffic Noise Analysis Applied to Automatic Vehicle Counting and Classification
PublicationProblems related to determining traffic noise characteristics are discussed in the context of automatic dynamic noise analysis based on noise level measurements and traffic prediction models. The obtained analytical results provide the second goal of the study, namely automatic vehicle counting and classification. Several traffic prediction models are presented and compared to the results of in-situ noise level measurements. Synchronized...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
On-Line Partitioning for On-Line Scheduling with Resource Conflicts
PublicationWithin this paper, we consider the problem of on-line partitioning the sequence of jobs which are competing for non-sharable resources. As a result of partitioning we get the subsets of jobs that form separate instances of the on-line scheduling problem. The objective is to generate a partition into the minimum number of instances such that the response time of any job in each instance is bounded by a given constant. Our research...
-
Multi-Option Model of Railway Traffic Organization Including the Energy Recuperation
PublicationThe article presents the issue of organization of railway traffic within the station, taking into account energy recuperation. We identified a number of factors which affect the energy efficiency of recuperation, including the issue of transfer of energy technology between a few vehicles. We presented some aspects of the decision problem of graphic train timetable construction with regard to recuperation. As an indicator of quality...
-
Multimodal Attention Stimulator
PublicationMultimodal attention stimulator was proposed and tested for improving auditory and visual attention, including pupils with developmental dyslexia. Results of the conducted experiments shown that the designed stimulator can be used in order to improve comprehension during reading tasks. The changes in the visual attention, observed in reading test results, translate into the overall reading performance.
-
KEYSTONE WG2: Activities and Results Overview on Keyword Search
PublicationIn this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.
-
Fast Collaborative Graph Exploration
PublicationWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Object serialization and remote exception pattern for distributed C++/MPI application
PublicationMPI is commonly used standard in development of scientific applications. It focuses on interlanguage operability and is not very well object oriented. The paper proposes a general pattern enabling design of distributed and object oriented applications. It also presents its sample implementations and performance tests.
-
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublicationCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Increasing the Efficiency of Ontology Alignment by Tracking Changes in Ontology Evolution
PublicationIn this paper we present a development of our ontology alignment framework based on varying semantics of attributes. Emphasising the analysis of explicitly given descriptions of how attributes change meanings they entail while being included within different concepts have been proved useful. Moreover, we claim that it is consistent with the intuitive way how people see the real world and how they find similarities and correspondences...
-
Contextualizing a Knowledge Base by Approximation – A Case Study
PublicationModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Reasoning with Projection in Multimodular Description Logics Knowledge Bases
PublicationWe present an approach to reasoning with projection, i.e. reasoning in which it is possible to focus on a selected part of knowledge (by neglecting some non-interesting fragments). Projection is most useful for modular knowledge bases in which only parts of knowledge have to be exchanged or imported to other modules. In this paper we present an optimized method of reasoning over results of projection. The tests indicate that the...
-
History-based dynamic weight voting for multi-agent systems
PublicationTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Integrating web site services into application through user interface
PublicationThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
On simplification of residue scaling process in pipelined Radix-4 MQRNS FFT processor
PublicationResidue scaling is needed in pipelined FFT radix-4 processors based on the Modified Quadratic Residue Number System (MQRNS) at the output of each butterfly. Such processor uses serial connection of radix-4 butterflies. Each butterfly comprises n subunits, one for each modulus of the RNS base and generates four complex residue numbers. In order to prevent arithmetic overflow intermediate results after each butterfly have to be...
-
Policy Monitoring on Accessible Technology for Inclusive Education – Research Findings and Requirements for a Software Tool
PublicationStatistics about disabled people usually do not receive as much attention as statistics highlighting other socio-economic problems. However, such statistics is important due to its actual weight.According to the World Health Organization (WHO), about 15% of the world population, meaning one billion people, live with disabilities, and 80% of them live in developing countries. UNESCO claims that 90% of the children with disabilities...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
mechanical engineering education via projects in multibody dynamics
PublicationPraca prezentuje rozważania nad wykorzystaniem interdyscyplinarnych projektów bazujących na zasadach dynamiki układów wieloczłonowych, traktowanych tu jako rozwinięcie kursu klasycznej mechaniki. Celem dydaktycznym jest zebranie w jednym procesie dydaktycznym takich aspektów jak: możliwość wykorzystania poznanych teoretycznie równań do modelowania i analizy znanego mu obiektu rzeczywistego; umożliwienie formułowania i testowania...
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
A Clustering-Based Methodology for Selection of Fault Tolerance Techniques
PublicationDevelopment of dependable applications requires selection of appropriate fault tolerance techniques that balance efficiency in fault handling and resulting consequences, such as increased development cost or performance degradation. This paper describes an advisory system that recommends fault tolerance techniques considering specified development and runtime application attributes. In the selection process, we use the K-means...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
The Use of Mobile Devices in the Care and Home Monitoring of the Elderly and the Sick
Publication...