Filters
total: 733
filtered: 451
-
Catalog
Chosen catalog filters
Search results for: ENCRYPTION, EYEWEAR, EGLASSES
-
Approaches Towards Better Immunosuppressive Agents
PublicationSeveral classes of compounds are applied in clinics due to their immunosuppressive properties in transplantology and the treatment of autoimmune diseases. Derivatives of mycophe-nolic acid, corticosteroids and chemotherapeutics bearing heterocyclic moieties like methotrexate, azathioprine, mizoribine, and ruxolitinib are active substances with investigated mechanisms of action. However, improved synthetic approaches of known drugs...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Impact of low-temperature sintering on the Fe-based amorphous coatings
PublicationBulk metallic glasses (BMGs) have gained a lot of attention in recent years due to their outstanding properties such as high hardness and excellent wear and corrosion resistance. However, they are restricted in industrial applications due to their extreme brittleness. Iron based amorphous coatings from BMGs are the best solution to use them by overcoming the problem of extreme brittleness. The coatings can be sprayed by various...
-
Ionic conductivity behavior by activated hopping conductivity (AHC) of barium aluminoborosilicate glass–ceramic system designed for SOFC sealing
PublicationNon-conducting BaO-B2O3-Al2O3-SiO2 parent glasses designed for solid oxide fuel cell (SOFC) sealing applications were prepared using the melt-quenching technique. The glass formation region was determined according to phase equilibrium relations and was found to be in the composition range 70BaO-(x)Al2O3-(10−x)B2O3-20SiO2 where 3.0 < x < 6.0 wt%. The conductivity values obtained conductivity ranged from 10−5 to 10−10 S/cm at temperatures...
-
Reliability of acicular grindable thermocouples for transient temperature measurements at sliding contacts
PublicationAcicular grindable thermocouples represent an interesting and prospective technique of temperature measurements at sliding contacts. This study aimed at the investigation of their reliability and accuracy as applied to the friction materials of various classes in contact with steel. The tests were conducted on a pin-on-disc tribometer under stationary and transient regimes. The experimental results were validated by comparing the...
-
A new division of bacterial UvrA homologues
PublicationThe UvrA protein is a DNA-binding and damage-recognition enzyme which participates in the prokaryotic type nucleotide excision repair (NER) pathway. It has recently been noted that some bacterial genomes comprise additional uvrA genes which encode five distinct types of UvrA homologue. We investigated the sequences of over 2400 bacterial genomes and found 130 examples of bacteria containing uvrA 2 genes. The sequence analyses conducted...
-
Music Data Processing and Mining in Large Databases for Active Media
PublicationThe aim of this paper was to investigate the problem of music data processing and mining in large databases. Tests were performed on a large data-base that included approximately 30000 audio files divided into 11 classes cor-responding to music genres with different cardinalities. Every audio file was de-scribed by a 173-element feature vector. To reduce the dimensionality of data the Principal Component Analysis (PCA) with variable...
-
Traffic Type Influence on Performance of OSPF QoS Routing
PublicationFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed ON-OFF model was used for self-similar traffic generation. Comparison of simulation results were presented using both relative and...
-
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
PublicationIn this research, GALDIT method was used to assess seawater intrusion in the coastal aquifer of the inner Puck Bay (Southern Baltic Sea). The impact of potential sea-level rise on groundwater vulnerability for years 2081-2100 was also considered. The study area was categorized into three classes of vulnerability: low, moderate and high. The most vulnerable area is the Hel Peninsula with northern part of the Kashubian Coastland....
-
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
PublicationIn this research, GALDIT method was used to assess seawater intrusion in the coastal aquifer of the inner Puck Bay (Southern Baltic Sea). The impact of potential sea-level rise on groundwater vulnerability for years 2081-2100 was also considered. The study area was categorized into three classes of vulnerability: low, moderate and high. The most vulnerable area is the Hel Peninsula with northern part of the Kashubian Coastland....
-
Deep neural networks approach to skin lesions classification — A comparative analysis
PublicationThe paper presents the results of research on the use of Deep Neural Networks (DNN) for automatic classification of the skin lesions. The authors have focused on the most effective kind of DNNs for image processing, namely Convolutional Neural Networks (CNN). In particular, three kinds of CNN were analyzed: VGG19, Residual Networks (ResNet) and the hybrid of VGG19 CNN with the Support Vector Machine (SVM). The research was carried...
-
Exploring the Reactivity of Unsymmetrical Diphosphanes toward Heterocumulenes: Access to Phosphanyl and Phosphoryl Derivatives of Amides, Imines, and Iminoamides
PublicationWe present a comprehensive study on the diphosphanation of iso(thio)cyanates by unsymmetrical diphosphanes. The reactions involving unsymmetrical diphosphanes and phenyl isocyanate or phenyl thioisocyanate gave rise to phosphanyl, phosphoryl, and thiophosphoryl derivatives of amides, imines, and iminoamides. The structures of the diphosphanation products were confirmed through NMR spectroscopy, IR spectroscopy, and single-crystal...
-
Attitude and self-esteem versus entrepreneurial intention among young in Poland
PublicationThe main aim of the paper is to present the relation between intentions to become an entrepreneurs among young polish people and the two factors with possible influence on it: self-efficacy and attitude towards entrepreneurship. Two groups of young people were examined: students enrolling the Management Faculty at Gdańsk University of Technology, and pupil from high schools, attending "Entrepreneurship" classes. It appeared that...
-
Conjectured strong complementary-correlations tradeoff
PublicationWe conjecture uncertainty relations that restrict correlations between the results of measurements performed by two separate parties on a shared quantum state. The first uncertainty relation bounds the sum of two mutual informations when one party measures a single observable and the other party measures one of two observables. The uncertainty relation does not follow from the Maassen-Uffink uncertainty relation and is much stronger...
-
Ochrona usług masowej dystrybucji multimediów z wykorzystaniem metod fingercastingu
PublicationW rozdziale przedstawione zostały problemy ochrony usług masowej dystrybucji treści multimedialnych w sieciach komputerowych przed kopiowaniem i nielegalnym rozpowszechnianiem multimediów, z wykorzystaniem metod fingerprintingu, a w szczególności podgrupy tych metod - metod fingercastingu. W odróżnieniu od innych metod fingerprintingu, metody fingercastingu wykorzystują połączenia grupowe (ang. multicast), co prowadzi do znacznego...
-
Multiplicative Long Short-Term Memory with Improved Mayfly Optimization for LULC Classification
PublicationLand Use and Land Cover (LULC) monitoring is crucial for global transformation, sustainable land control, urban planning, urban growth prediction, and the establishment of climate regulations for long-term development. Remote sensing images have become increasingly important in many environmental planning and land use surveys in recent times. LULC is evaluated in this research using the Sat 4, Sat 6, and Eurosat datasets. Various...
-
Effects of Deck-Abutment Pounding on the Seismic Fragility Curves of Box-Girder Highway Bridges
PublicationEarthquake-induced pounding in bridges is a complex contact phenomenon in which the dynamic responses of structures, including collisions between deck and abutments, are strongly related to structural properties and earthquake excitation. The goal of this study is to develop and compare the seismic fragility curves of overall system and individual components of regular and irregular box-girder highway bridges in two cases: with...
-
Analysis and design improvement of high class roads’ arched sections in Poland
PublicationAlthough Polish road network standards, in particular higher classes of roads are improving dynamically the number of fatalities on the network is still higher that EU’s average. Ensuring road safety and high maintaining standards is a complex issue and one that poses a major challenge for all road authorities. Road accidents at high speed roads characterize specially serious material and social consequences, thus research into...
-
2-Coloring number revisited
Publication2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...
-
Method for Clustering of Brain Activity Data Derived from EEG Signals
PublicationA method for assessing separability of EEG signals associated with three classes of brain activity is proposed. The EEG signals are acquired from 23 subjects, gathered from a headset consisting of 14 electrodes. Data are processed by applying Discrete Wavelet Transform (DWT) for the signal analysis and an autoencoder neural network for the brain activity separation. Processing involves 74 wavelets from 3 DWT families: Coiflets,...
-
Review on Current Status of Echinocandins Use
PublicationFungal infections are rising all over the world every year. There are only five medical compound classes for treatment: triazoles, echinocandins, polyenes, flucytosine and allylamine. Currently, echinocandins are the most important compounds, because of their wide activity spectrum and much lower sides effects that may occur during therapy with other drugs. Echinocandins are secondary metabolites of fungi, which can inhibit the...
-
Physical models in the education of architectural history
PublicationIn this article, the authors present the long tradition and common use of physical models in the process of teaching the history of architecture in higher education institutions. The research described in the article is focused on the use of physical models and mock-ups as stimulants during architectural history classes to support lectures and increase the learning capabilities of students. The authors also cover the general use...
-
CONCRETE MIX DESIGN USING ABRAMS AND BOLOMEY METHODS
PublicationOne way to reduce the consumption of cement is to optimize its use. Many known methods of concrete design, based on the Abrams law and the Bolomey method. Therefore, the authors chose those methods for analysis. The concrete composition with the assumed strength class, calculated by any method differs significantly. This applies especially to the cement content, as its content in the composition of concrete varies from 20 to 50%....
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publicationgenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...
-
Processing of acoustical data in a multimodal bank operating room surveillance system
PublicationAn automatic surveillance system capable of detecting, classifying and localizing acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of...
-
Visual Object Tracking System Employing Fixed and PTZ Cameras
PublicationThe paper presents a video monitoring system utilizing fixed and PTZ cameras for tracking of moving objects. First type of camera provides image for background modelling, being employed for foreground objects localization. Estimated objects locations are then utilised for steering of PTZ cameras when observing targeted objects with high close-ups. Objects are classified into several classes, then basic event detection is being...
-
Integrated controller for ultra high frequency technique laboratory
PublicationDepartment of Microwave and Antenna Engineering decided to modernize the laboratory of Ultra High Frequency Techniques. The main change was to replace measurement of the field distribution inside rectangular waveguides by analysing the fields around striplines. This involved the need to overcome several technical and conceptual problems. Precise positioning of the probe and reading the field distribution near the stripline is important...
-
Product Graph Invariants with Applications in the Theory of Information
PublicationThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
Examining Quality of Hand Segmentation Based on Gaussian Mixture Models
PublicationResults of examination of various implementations of Gaussian mix-ture models are presented in the paper. Two of the implementations belonged to the Intel’s OpenCV 2.4.3 library and utilized Background Subtractor MOG and Background Subtractor MOG2 classes. The third implementation presented in the paper was created by the authors and extended Background Subtractor MOG2 with the possibility of operating on the scaled version of...
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Weakly convex and convex domination numbers of some products of graphs
PublicationIf $G=(V,E)$ is a simple connected graph and $a,b\in V$, then a shortest $(a-b)$ path is called a $(u-v)$-{\it geodesic}. A set $X\subseteq V$ is called {\it weakly convex} in $G$ if for every two vertices $a,b\in X$ exists $(a-b)$- geodesic whose all vertices belong to $X$. A set $X$ is {\it convex} in $G$ if for every $a,b\in X$ all vertices from every $(a-b)$-geodesic belong to $X$. The {\it weakly convex domination number}...
-
Defence in depth conception in nuclear power plants and requirements for instrumentation and control systems
PublicationThe aim of this article is to identify and discuss some issues of the safety systems’ design for nuclear power plants equipped with the light water reactors using a defence in depth (D-in-D) conception. Because the functional safety solutions play nowadays an important role for the risk control, the basic requirements for the instrumentation and control systems are specified with regard to relevant international standards. For...
-
Ranking ecosystem services delivered by trees in urban and rural areas
PublicationPolicies and strategies for tree management and protection on a national, regional, and local level have not sufficiently considered differences between rural and urban areas. We used expert knowledge to compare rural and urban areas in a case study evaluating the relative importance of ecosystem services (ES) in policy development. The Analytic Hierarchy Process (AHP) and focus group discussions were used to rank 17 ES, representing...
-
Classification of Sea Going Vessels Properties Using SAR Satellite Images
PublicationThe aim of the project was to analyze the possibility of using machine learning and computer vision to identify (indicate the location) of all sea-going vessels located in the selected area of the open sea and to classify the main attributes of the vessel. The key elements of the project were to download data from the Sentinel-1 satellite [1], download data on the sea vessels [2], then automatically tag data and develop a detection...
-
Optical Sensor Based Gestures Inference Using Recurrent Neural Network in Mobile Conditions
PublicationIn this paper the implementation of recurrent neural network models for hand gesture recognition on edge devices was performed. The models were trained with 27 hand gestures recorded with the use of a linear optical sensor consisting of 8 photodiodes and 4 LEDs. Different models, trained off-line, were tested in terms of different network topologies (different number of neurons and layers) and different effective sampling frequency...
-
Nonlinearity shaping in nanostructured glass-diamond hybrid materials for optical fiber preforms
PublicationNanodiamond integration with optical fibers has proved a compelling methodology for magneto-optics. We reveal that the applicability of nanodiamonds in nonlinear optics goes beyond the previous demonstrations of frequency converters. Instead, we exploit the recently reported volumetric integration of nanodiamonds along the optical fiber core and show that the nonlinear response of glasses can be manipulated by nanodiamonds. By...
-
Fuzzy Divisive Hierarchical Clustering of Solvents According to Their Experimentally and Theoretically Predicted Descriptors
PublicationThe present study describes a simple procedure to separate into patterns of similarity a large group of solvents, 259 in total, presented by 15 specific descriptors (experimentally found and theoretically predicted physicochemical parameters). Solvent data is usually characterized by its high variability, dierent molecular symmetry, and spatial orientation. Methods of chemometrics can usefully be used to extract and explore accurately...
-
Domination subdivision and domination multisubdivision numbers of graphs
PublicationThe domination subdivision number sd(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the domination number of G. It has been shown [10] that sd(T)<=3 for any tree T. We prove that the decision problem of the domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the domination multisubdivision number...
-
QoS Extensions for Flow-Awareness Networks
PublicationThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
Virtual reality technology in architectural education
PublicationContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublicationBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Visual Content Learning in a Cognitive Vision Platform for Hazard Control (CVP-HC)
PublicationThis work is part of an effort for the development of a Cognitive Vision Platform for Hazard Control (CVP-HC) for applications in industrial workplaces, adaptable to a wide range of environments. The paper focuses on hazards resulted from the nonuse of personal protective equipment (PPE). Given the results of previous analysis of supervised techniques for the problem of classification of a few PPE (boots, hard hats, and gloves...
-
Learning design of a blended course in technical writing
PublicationBlending face-to-face classes with e-learning components can lead to a very successful outcome if the blend of approaches, methods, content, space, time, media and activities is carefully structured and approached from both the student’s and the tutor’s perspective. In order to blend synchronous and asynchronous e-learning activities with traditional ones, educators should make them inter-dependent and develop them according to...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublicationDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Application Isssues of the Semi-Markov Reliability Model
PublicationPredicting the reliability of marine internal combustion engines, for instance, is of particular importance, as it makes it possible to predict their future reliability states based on the information on the past states. Correct reliability prediction is a complex process which consists in processing empirical results obtained from operating practice, complemented by analytical considerations. The process of technical state changes...
-
DBpedia and YAGO Based System for Answering Questions in Natural Language
PublicationIn this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...
-
From unextendible product bases to genuinely entangled subspaces
PublicationUnextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...
-
Automatic Clustering of EEG-Based Data Associated with Brain Activity
PublicationThe aim of this paper is to present a system for automatic assigning electroencephalographic (EEG) signals to appropriate classes associated with brain activity. The EEG signals are acquired from a headset consisting of 14 electrodes placed on skull. Data gathered are first processed by the Independent Component Analysis algorithm to obtain estimates of signals generated by primary sources reflecting the activity of the brain....