Filters
total: 1631
filtered: 975
-
Catalog
- Publications 975 available results
- Journals 155 available results
- Conferences 160 available results
- Publishing Houses 1 available results
- People 30 available results
- Projects 3 available results
- e-Learning Courses 14 available results
- Events 1 available results
- Open Research Data 292 available results
Chosen catalog filters
Search results for: volunteer-computing
-
Identification of Continuous Systems - Practical Issues of Insensitivity to Perturbations
PublicationIn this paper the issue of continuous systems estimation, insensitive to certain perturbations, is discussed. Such an approach has rational advantages, especially when robust schemes are used to assist a target system responsible for industrial diagnostics. This requires that estimated model parameters are generated on-line, and their values are reliable and to a great extent accurate. Practical hints are suggested to challenge...
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Separability Assessment of Selected Types of Vehicle-Associated Noise
PublicationMusic Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...
-
Building Knowledge for the Purpose of Lip Speech Identification
PublicationConsecutive stages of building knowledge for automatic lip speech identification are shown in this study. The main objective is to prepare audio-visual material for phonetic analysis and transcription. First, approximately 260 sentences of natural English were prepared taking into account the frequencies of occurrence of all English phonemes. Five native speakers from different countries read the selected sentences in front of...
-
Modular Experience-Based Smart Innovation Engineering System
PublicationThe current paper presents the systematic approach for supporting the product innovation process of manufactured products. The proposed system uses a collective, team-like knowledge developed by innovation related experiences of the formal decisional events. The proposed system for smart innovation engineering carries the promise to support the innovation processes in a quick and efficient way. It stores the past decisional events...
-
Use of numerical methods in the analysis of traction energy systems—an overview of the practical examples
PublicationA characteristic feature of trolleybus transport is the random nature of traffic caused by congestion. It predestinates statistical and numerical methods for the analysis of trolleybus energy system. There are presented 3 methods of trolleybus traction system analysis: simulation of supply system based on Monte Carlo method, analysis of energy recovery potential based on statistical data analysis and benchmark of trolleybus supply...
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublicationResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Real-Time Basic Principles Nuclear Reactor Simulator Based on Client-Server Network Architecture with WebBrowser as User Interface
PublicationThe real-time simulator of nuclear reactor basic processes (neutron kinetics, heat generation and its exchange, poisoning and burn- ing up fuel) build in a network environment is presented in this paper. The client-server architecture was introduced, where the server is a pow- erful computing unit and the web browser application is a client for user interface purposes. The challenge was to develop an application running under the...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublicationThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
Emotion Recognition for Affect Aware Video Games
PublicationIn this paper the idea of affect aware video games is presented. A brief review of automatic multimodal affect recognition of facial expressions and emotions is given. The first result of emotions recognition using depth data as well as prototype affect aware video game are presented
-
An Industrial Survey on Business Analysis Problems and Solutions
PublicationThe paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...
-
Local Texture Pattern Selection for Efficient Face Recognition and Tracking
PublicationThis paper describes the research aimed at finding the optimal configuration of the face recognition algorithm based on local texture descriptors (binary and ternary patterns). Since the identification module was supposed to be a part of the face tracking system developed for interactive wearable computer, proper feature selection, allowing for real-time operation, became particularly important. Our experiments showed that it is...
-
Detection of Face Position and Orientation Using Depth Data
PublicationIn this paper an original approach is presented for real-time detection of user's face position and orientation based only on depth channel from a Microsoft Kinect sensor which can be used in facial analysis on scenes with poor lighting conditions where traditional algorithms based on optical channel may have failed. Thus the proposed approach can support, or even replace, algorithms based on optical channel or based on skeleton...
-
Smart Innovation Management in Product Life Cycle
PublicationThe present paper proposes a framework for smart innovation management of the product using a Smart Knowledge Management System comprising Set of Experience Knowledge Structure (SOEKS) and Decisional DNA. This proposed system will allow the entrepreneurs and organizations to perform the innovation process technically and quickly as this framework will store knowledge as well as experiences of the past innovations done in various...
-
Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model
PublicationIn this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...
-
Decisional DNA Based Conceptual Framework for Smart Manufacturing
PublicationThis paper presents the conceptual framework for systematic knowledge representation, storage and reuse of manufacturing information in a production scenario. This knowledge structure is designed for three levels in a manufacturing set up viz. first at the engineering objects level, second at process and finally at factory level. Virtual engineering object (VEO) deals with knowledge at the individual object/component/machine level...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Ergonomic Aspects of Development of Architecture in the Context of Sanitary and Hygiene Safety
PublicationAbstract Ergonomics answers the need of safe development of space by creating spatial forms which help to implement the safety procedures and limit the threats involved both in ordinary use of the spaces and in case of unforeseen events. Using the knowledge of ergonomics and architecture on the basis of defining the routes of germ transmission, allows to limit the spread of those organisms. Ergonomics of developing architectural...
-
Towards Understanding of Mechanics of Hernia Managed by Synthetic Mesh in Laparoscopic Operation: A Single Case Study
PublicationIn this paper a research towards understanding of mechanics of ventral hernia operated with the use of Physiomesh Open image in new window implant and SecureStrap Open image in new window staples is described. Experimental and numerical studies are conducted for that purpose. Experimental works cover uni-axial tension tests of the implant samples and of the implant-staples-tissue system. Also experiments on implant-staples-tissue...
-
Path planning algorithm for ship collisions avoidance in environment with changing strategy of dynamic obstacles
PublicationIn this paper a path planning algorithm for the ship collision avoidance is presented. Tested algorithm is used to determine close to optimal ship paths taking into account changing strategy of dynamic obstacles. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of evolutionary algorithm and based on it dedicated application...
-
Selected Aspect of IT Tools Application in Process Improvement in Industrial Laundry Services
PublicationThe laundry services sector in Poland is growing dynamically and currently has around 13,000 enterprises, mainly micro, small and medium size. The increasing competitiveness of this industry, causes more emphasis on solutions that can in-crease the efficiency of laundry processes and thereby strengthen the market position. One of the methods that can be used for this purpose is Lean Six Sigma, aided by specialized computer software....
-
Cognition and Decisional Experience to Support Safety Management in Workplaces
PublicationHazards are present in all workplaces and can result in serious injuries, short and long-term illnesses, or death. In this context, management of safety is essential to ensure the occupational health of workers. Aiming to assist the safety management process, especially in industrial environments, a Cognitive Vision Platform for Hazard Control (CVP-HC) is proposed. This platform is a Cyber Physical system, capable of identifying...
-
From Sequential to Parallel Implementation of NLP Using the Actor Model
PublicationThe article focuses on presenting methods allowing easy parallelization of an existing, sequential Natural Language Processing (NLP) application within a multi-core system. The actor-based solution implemented with the Akka framework has been applied and compared to an application based on Task Parallel Library (TPL) and to the original sequential application. Architectures, data and control flows are described along with execution...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA
PublicationVisual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Impact of Cyclist Facility Availability at Work on the Number of Bike Commuters
PublicationThe article describes the results of research designed to establish whether cycle provision can influence the number of employees commuting by bike. To that end, employee surveys were conducted in three IT companies in 2012 and 2016. The questionnaire asked about travel behaviour and what the staff thought about their company’s provision of cyclist facilities. Since 2012 each of the companies has moved its head office and the...
-
Interdisciplinary Design Teams in Poland - Architecture as a Tool for Preventing Hospital-Acquired Infections
PublicationHospital-acquired infections pose a problem, which directly affects the safe usage of healthcare facilities. On a global scale, the level of hospital-acquired infections (HAI) is estimated to affect 5–15% of those hospitalised. The World Health Organization (WHO) estimates that, on an annual basis, procedures preventing hospital-acquired infections consume 80 billion dollars [1]. In this context, it becomes important to create...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Developing Methods for Building Intelligent Systems of Information Resources Processing Using an Ontological Approach
PublicationThe problem of developing methods of information resource processing is investigated. A formal procedure description of processing text content is developed. A new ontological approach to the implementation of business processes is proposed. Consider that the aim of our work is to develop methods and tools for building intelligent systems of information resource processing, the core of knowledge bases of which are ontology’s, and...
-
Modelling and simulation of GPU processing in the MERPSYS environment
PublicationIn this work, we evaluate an analytical GPU performance model based on Little's law, that expresses the kernel execution time in terms of latency bound, throughput bound, and achieved occupancy. We then combine it with the results of several research papers, introduce equations for data transfer time estimation, and finally incorporate it into the MERPSYS framework, which is a general-purpose simulator for parallel and distributed...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism
PublicationThe paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...
-
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
PublicationThe paper presents an evaluation of all-reduce collective MPI algorithms for an environment based on a geographically-distributed compute cluster. The testbed was split into two sites: CI TASK in Gdansk University of Technology and ICM in University of Warsaw, located about 300 km from each other, both connected by a fast optical fiber Ethernet-based 100 Gbps network (900 km part of the PIONIER backbone). Each site hosted a set...
-
Robustness Analysis of a Distributed MPC Control System of a Turbo-Generator Set of a Nuclear Plant – Disturbance Issues
PublicationTypically, there are two main control loops with PI controllers operating at each turbo-generator set. In this paper, a distributed model predictive controller with local quadratic model predictive controllers for the turbine generator is proposed instead of a set of classical PI controllers. The local quadratic predictive controllers utilize step-response models for the controlled system components. The parameters of these models...
-
Self-stabilizing algorithm for edge-coloring of graphs
PublicationReferat ten poświęcony jest kolorowaniu grafów w modelu rozproszonym.Podano samostabilizujący się algorytm kolorowania krawędzi grafu wraz z dowodem poprawności oraz oszacowaniem jego czasu działania.
-
The effect of aeration mode (intermittent vs. continuous) on nutrient removal and greenhouse gas emissions in the wastewater treatment plant of Corleone (Italy)
PublicationThe paper reports the results of an experimental study aimed at comparing two configurations of a full-scale wastewater treatment plant (WWTP): conventional activated sludge (CAS) and oxic-settling-anaerobic process (OSA) with intermittent aeration (IA). A comprehensive monitoring campaign was carried out to assess multiple parameters for comparing the two configurations: carbon and nutrient removal, greenhouse gas emissions, respirometric...
-
Combinatorial scheme of finding minimal number of periodic points for smooth self-maps of simply connected manifolds
PublicationLet M be a closed smooth connected and simply connected manifold of dimension m at least 3, and let r be a fixed natural number. The topological invariant D^m_r [f], defined by the authors in [Forum Math. 21 (2009), 491-509], is equal to the minimal number of r-periodic points in the smooth homotopy class of f, a given self-map of M. In this paper, we present a general combinatorial scheme of computing D^m_r [f] for arbitrary dimension...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
Efficient Fabry-Perot Open Resonator Analysis by the use of a Scattering Matrix Method
PublicationIn this paper a comparative study of the computational efficiency of two modeling methods applied to the analysis of the plano- and double-concave Fabry-Perot open resonators is presented. In both numerical approaches, a scattering matrix method was applied, which allows splitting the analysis of the resonator into several sections, including the one with a spherical mirror, which requires the largest computing resources. Two modeling...
-
Shared multi-processor scheduling
PublicationWe study shared multi-processor scheduling problem where each job can be executed on its private processor and simultaneously on one of many processors shared by all jobs in order to reduce the job’s completion time due to processing time overlap. The total weighted overlap of all jobs is to be maximized. The problem models subcontracting scheduling in supply chains and divisible load scheduling in computing. We show that synchronized...
-
Tools, Methods and Services Enhancing the Usage of the Kepler-based Scientific Workflow Framework
PublicationScientific workflow systems are designed to compose and execute either a series of computational or data manipulation steps, or workflows in a scientific application. They are usually a part of a larger eScience environment. The usage of workflow systems, however very beneficial, is mostly not irrelevant for scientists. There are many requirements for additional functionalities around scientific workflows systems that need to be...
-
Parallel Background Subtraction in Video Streams Using OpenCL on GPU Platforms
PublicationImplementation of the background subtraction algorithm using OpenCL platform is presented. The algorithm processes live stream of video frames from the surveillance camera in on-line mode. Processing is performed using a host machine and a parallel computing device. The work focuses on optimizing an OpenCL algorithm implementation for GPU devices by taking into account specific features of the GPU architecture, such as memory access,...
-
Limitations of Emotion Recognition in Software User Experience Evaluation Context
PublicationThis paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...
-
Acceleration of the DGF-FDTD method on GPU using the CUDA technology
PublicationWe present a parallel implementation of the discrete Green's function formulation of the finite-difference time-domain (DGF-FDTD) method on a graphics processing unit (GPU). The compute unified device architecture (CUDA) parallel computing platform is applied in the developed implementation. For the sake of example, arrays of Yagi-Uda antennas were simulated with the use of DGF-FDTD on GPU. The efficiency of parallel computations...
-
Accurate Computation of IGBT Junction Temperature in PLECS
PublicationIn the article, a new method to improve the accuracy of the insulated-gate bipolar transistor (IGBT) junction temperature computations in the piecewise linear electrical circuit simulation (PLECS) software is proposed and described in detail. This method allows computing the IGBT junction temperature using a nonlinear compact thermal model of this device in PLECS. In the method, a nonlinear compact thermal model of the IGBT is...
-
Use of ICT infrastructure for teaching HPC
PublicationIn this paper we look at modern ICT infrastructure as well as curriculum used for conducting a contemporary course on high performance computing taught over several years at the Faculty of Electronics Telecommunications and Informatics, Gdansk University of Technology, Poland. We describe the infrastructure in the context of teaching parallel programming at the cluster level using MPI, node level using OpenMP and CUDA. We present...