Publications
Filters
total: 151
Catalog Publications
Year 2025
-
Advanced genetic algorithm-based signal processing for multi-degradation detection in steam turbines
PublicationThis research contributes to the field of reliability engineering and system safety by introducing an innovative diagnostic method to enhance the reliability and safety of complex technological systems. Steam turbines are specifically referred to. This study focuses on the integration of advanced signal processing techniques and engineering dynamics in addressing critical issues in the monitoring and maintenance of mechanical systems....
Year 2024
-
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublicationPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublicationRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Neural network agents trained by declarative programming tutors
PublicationThis paper presents an experimental study on the development of a neural network-based agent, trained using data generated using declarative programming. The focus of the study is the application of various agents to solve the classic logic task – The Wumpus World. The paper evaluates the effectiveness of neural-based agents across different map configurations, offering a comparative analysis to underline the strengths and limitations...
-
Thermodynamic Efficiency of an Advanced 4th Generation VHTR Propulsion Engine for Large Container Ships
PublicationIn response to global initiatives to reduce greenhouse gas emissions, the maritime industry must adopt green propulsion solutions. This paper analyses the operational potential of very high-temperature reactors (VHTRs) as an innovative propulsion source for large container ships. Calculations are carried out for ships produced between 2018 and 2020 with a capacity of more than 20,000 TEU. For these ships, the average power of the...
Year 2023
-
Ship weather routing featuring w-MOEA/D and uncertainty handling
Publication -
Ship weather routing featuring w-MOEA/D and uncertainty handling
PublicationThe paper presents a new version of evolutionary multi-objective weather routing (WR) for ships taking into account uncertainties of weather forecasts in route optimization. The method applies authors’ w-MOEA/D algorithm: MOEA/D framework incorporating Decision Maker’s (DM) preferences by means of w-dominance relation. Owing to this, DM preferences are taken into account throughout optimization, allowing the process to focus on...
Year 2022
-
Data Analysis in Bridge of Data
PublicationThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
Publication -
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Expert System and Decision Support System for Electrocardiogram Interpretation and Diagnosis: Review, Challenges and Research Directions
PublicationElectrocardiography (ECG) is one of the most widely used recordings in clinical medicine. ECG deals with the recording of electrical activity that is generated by the heart through the surface of the body. The electrical activity generated by the heart is measured using electrodes that are attached to the body surface. The use of ECG in the diagnosis and management of cardiovascular disease (CVD) has been in existence for over...
-
Intelligent Decision Forest Models for Customer Churn Prediction
PublicationCustomer churn is a critical issue impacting enterprises and organizations, particularly in the emerging and highly competitive telecommunications industry. It is important to researchers and industry analysts interested in projecting customer behavior to separate churn from non‐churn consumers. The fundamental incentive is a firm’s intent desire to keep current consumers, along with the exorbitant expense of gaining new ones....
-
Nieświadome sieci neuronowe
PublicationCoraz większą popularność zyskuje usługa predykcji za pomocą sieci neuronowych. Model ten zakłada istnienie serwera, który za pomocą wyuczonej sieci neuronowej dokonuje predykcji na danych otrzymanych od klienta. Model ten jest wygodny, ponieważ obie strony mogą skupić się na rozwoju w swojej specjalizacji. Wystawia on jednak na ryzyko utraty prywatności zarówno klienta, wysyła- jącego wrażliwe dane wejściowe, jak i serwer, udostępniający...
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublicationDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time
Publication -
Weather Routing System Architecture Using Onboard Data Collection and Route Optimisation
PublicationThis paper describes the architecture of a weather routing system consisting of two key elements: onboard monitoring and route optimiser sub-systems. The former is responsible for collecting various onboard measurements, such as current ship position or ship motion variables. These data, when gathered and processed, are then used for fine-tuning a ship model. The model, together with weather forecasts, is utilised by a multi-objective...
Year 2021
-
A comprehensive survey on low-cost ECG acquisition systems: Advances on design specifications, challenges and future direction
Publication -
A comprehensive survey on low-cost ECG acquisition systems: Advances on design specifications, challenges and future direction
PublicationAvailability of low-cost, reliable, and portable Electrocardiography (ECG) devices is still very important in the medical world today. Despite the tremendous technological advancement, Cardiovascular Diseases (CVDs) remain a serious health burden claiming millions of lives on an annual basis globally. This is more prevalent in Low and Middle-Income Countries (LMICs) where there are huge financial instability and lack of critical...
-
A ship domain-based model of collision risk for near-miss detection and Collision Alert Systems
PublicationThe paper presents a new model of ship collision risk, which utilises a ship domain concept and the related domain-based collision risk parameters. An encounter is here described by five variables representing: degree of domain violation (DDV), relative speed of the two vessels, combination of the vessels’ courses, arena violations and encounter complexity. As for the first three variables, their values can be directly computed...
-
All-gather Algorithms Resilient to Imbalanced Process Arrival Patterns
PublicationTwo novel algorithms for the all-gather operation resilient to imbalanced process arrival patterns (PATs) are presented. The first one, Background Disseminated Ring (BDR), is based on the regular parallel ring algorithm often supplied in MPI implementations and exploits an auxiliary background thread for early data exchange from faster processes to accelerate the performed all-gather operation. The other algorithm, Background Sorted...
-
Application of computational intelligence models in IoMT big data for heart disease diagnosis in personalized health care
Publication -
Application of Internet of Thing and Cyber Physical System in Industry 4.0 Smart Manufacturing
Publication -
Application of Shuffled Frog-Leaping Algorithm for Optimal Software Project Scheduling and Staffing
Publication -
Blockchain: zdecentralizowane zaufanie
PublicationBitcoin wprowadził innowację na wielu płaszczyznach. Jako pierwszy rozwiązał problem osiągania konsensusu w sieciach otwartych, stworzył zagadkę ekonomiczną w postaci globalnej waluty deflacyjnej, pozwolił na transfer pieniędzy tym, którzy wcześniej byli wykluczeni bankowo, ale przede wszystkim stworzył fundamenty pod platformę zdecentralizowanego zaufania. Zapoczątkował technologie zdecentralizowanych aplikacji, które dotychczas...
-
Data Sampling-Based Feature Selection Framework for Software Defect Prediction
Publication -
Ensemble-Based Logistic Model Trees for Website Phishing Detection
Publication -
Heterogeneous Ensemble with Combined Dimensionality Reduction for Social Spam Detection
Publication -
Improving Clairvoyant: reduction algorithm resilient to imbalanced process arrival patterns
PublicationThe Clairvoyant algorithm proposed in “A novel MPI reduction algorithm resilient to imbalances in process arrival times” was analyzed, commented and improved. The comments concern handling certain edge cases in the original pseudocode and description, i.e., adding another state of a process, improved cache friendliness more precise complexity estimations and some other issues improving the robustness of the algorithm implementation....
-
Internet of Robotic Things: Its Domain, Methodologies, and Applications
Publication -
Optimized Decision Forest for Website Phishing Detection
Publication -
W-dominance: Tradeoff-inspired dominance relation for preference-based evolutionary multi-objective optimization
PublicationThe paper presents a method of incorporating decision maker preferences into multi-objective meta-heuristics. It is based on tradeoffcoefficients and extends their applicability from bi-objective to multi-objective. The method assumes that a decision maker specifies a priori each objective’s importance as a weight interval. Based on this, w-dominance relation is introduced, which extends Pareto dominance. By replacing reference...
Year 2020
-
A Universal Theory of Wisdom . A Mind - oriented Approach
PublicationThe purpose of the paper is to synthesize the issues of human wisdom in terms of minds which create knowledge-based judgment. We form a transdisciplinary, big-picture view of the wisdom of humans. Findings: Wisdom is the right judgment and choice in the context of the art of living. Practical implications: Wisdom can be developed within the set of minds. Social implications: To pursue wisdom in thinking and action, one must extend...
-
An Approach for Journal Summarization Using Clustering Based Micro-Summary Generation
Publication -
Bridge of Knowledge: an Internet platform for R2R and R2B transfer of knowledge and promotion of cooperation
PublicationCurrently, the European Commission puts emphasis on supporting collaboration between universities and business. There are many possible ways to create a strong relationship between both these parties. Positive results of such cooperation lead to increased competitiveness of the global market and, in consequence, bring significant growth of innovation. The cooperation between research-to-research (R2R) and research-to-business (R2B)...
-
Impact of Feature Selection Methods on the Predictive Performance of Software Defect Prediction Models: An Extensive Empirical Study
Publication -
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
PublicationThe paper presents an evaluation of all-reduce collective MPI algorithms for an environment based on a geographically-distributed compute cluster. The testbed was split into two sites: CI TASK in Gdansk University of Technology and ICM in University of Warsaw, located about 300 km from each other, both connected by a fast optical fiber Ethernet-based 100 Gbps network (900 km part of the PIONIER backbone). Each site hosted a set...
-
Long Distance Geographically Distributed InfiniBand Based Computing
PublicationCollaboration between multiple computing centres, referred as federated computing is becom- ing important pillar of High Performance Computing (HPC) and will be one of its key components in the future. To test technical possibilities of future collaboration using 100 Gb optic fiber link (Connection was 900 km in length with 9 ms RTT time) we prepared two scenarios of operation. In the first one, Interdisciplinary Centre for Mathematical...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Process arrival pattern aware algorithms for acceleration of scatter and gather operations
PublicationImbalanced process arrival patterns (PAPs) are ubiquitous in many parallel and distributed systems, especially in HPC ones. The collective operations, e.g. in MPI, are designed for equal process arrival times (PATs), and are not optimized for deviations in their appearance. We propose eight new PAP-aware algorithms for the scatter and gather operations. They are binomial or linear tree adaptations introducing additional process...
-
SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
PublicationThe paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...
-
SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS
PublicationThe shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...
-
SMOTE-Based Homogeneous Ensemble Methods for Software Defect Prediction
Publication -
Towards Improving Optimised Ship Weather Routing
PublicationThe aim of the paper is to outline a project focusing on the development of a new type of ship weather routing solution with improved uncertainty handling, through better estimation of ship performance and responses to sea conditions. Ensemble forecasting is considered to take into account the uncertainty levels that are typical of operations in a stochastic environment. Increased accuracy of weather prediction is achieved through...
-
Tree-based homogeneous ensemble model with feature selection for diabetic retinopathy prediction
Publication
Year 2019
-
Influence of YARN Schedulers on Power Consumption and Processing Time for Various Big Data Benchmarks
PublicationClimate change caused by human activities can influence the lives of everybody onthe planet. The environmental concerns must be taken into consideration by all fields of studyincludingICT. Green Computing aims to reduce negative effects of IT on the environment while,at the same time, maintaining all of the possible benefits it provides. Several Big Data platformslike Apache Spark orYARNhave become widely used in analytics and...
-
Memetic approach for multi-objective overtime planning in software engineering projects
PublicationSoftware projects often suffer from unplanned overtime due to uncertainty and risk incurred due to changing requirement and attempt to meet up with time-to-market of the software product. This causes stress to developers and can result in poor quality. This paper presents a memetic algorithmic approach for solving the overtime-planning problem in software development projects. The problem is formulated as a three-objective optimization...
-
Preference-based evolutionary multi-objective optimization in ship weather routing
PublicationIn evolutionary multi-objective optimization (EMO) the aim is to find a set of Pareto-optimal solutions. Such approach may be applied to multiple real-life problems, including weather routing (WR) of ships. The route should be optimal in terms of passage time, fuel consumption and safety of crew and cargo while taking into account dynamically changing weather conditions. Additionally it must not violate any navigational constraints...
-
REVIEW OF WEATHER FORECAST SERVICES FOR SHIP ROUTING PURPOSES
PublicationWeather data is nowadays used in a variety of navigational and ocean engineering research problems: from the obvious ones like voyage planning and routing of sea-going vessels, through the analysis of stability-related phenomena, to detailed modelling of ships’ manoeuvrability for collision avoidance purposes. Apart from that, weather forecasts are essential for passenger cruises and fishing vessels that want to avoid the risk...
Year 2018
-
A Ship Domain-Based Method of Determining Action Distances for Evasive Manoeuvres in Stand-On Situations
PublicationA ship encounter can be considered safe if neither of ships’ domains (defined areas around ships) is intruded by other ships. Published research on this includes optimising collision avoidancemanoeuvres fulfilling domain-based safety conditions.However, until recently there was no method, using ship’s domain to determine exact moment when a particular collision avoidance manoeuvre can still be successfully performed. The authors...
-
Improving all-reduce collective operations for imbalanced process arrival patterns
PublicationTwo new algorithms for the all-reduce operation optimized for imbalanced process arrival patterns (PAPs) are presented: (1) sorted linear tree, (2) pre-reduced ring as well as a new way of online PAP detection, including process arrival time estimations, and their distribution between cooperating processes was introduced. The idea, pseudo-code, implementation details, benchmark for performance evaluation and a real case example...