Filtry
wszystkich: 2433
wybranych: 1453
-
Katalog
- Publikacje 1453 wyników po odfiltrowaniu
- Czasopisma 241 wyników po odfiltrowaniu
- Konferencje 136 wyników po odfiltrowaniu
- Osoby 247 wyników po odfiltrowaniu
- Projekty 2 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 86 wyników po odfiltrowaniu
- Wydarzenia 5 wyników po odfiltrowaniu
- Dane Badawcze 262 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MULTIMODAL COMPUTER INTERFACES
-
The Backbone Coloring Problem for Small Graphs
PublikacjaIn this paper we investigate the values of the backbone chromatic number, derived from a mathematical model for the problem of minimization of bandwidth in radio networks, for small connected graphs and connected backbones (up to 7 vertices). We study the relationship of this parameter with the structure of the graph and compare the results with the solutions obtained using the classical graph coloring algorithms (LF, IS), modified...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Testing for conformance of parallel programming pattern languages
PublikacjaThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Automated network control and supervision
PublikacjaPrzedstawiono ogólne problemy związane z postępem w zakresie integracji systemów informatycznych w elektroenergetyce. Podano zasady budowy struktury systemów sterowania i nadzoru.
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublikacjaThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublikacjaWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...
-
Improving flexibility and performance of PVM applications by distributed partial evaluation
PublikacjaA new framework for developing both flexible and efficient PVM applications is described. We propose Architecture Templates Interface (ATI) that allows to control application granularity and parallelism. To ensure high application efficiency we extend partial evaluation strategy into domain of distributed applications obtaining Distributed Partial Evaluation (DPE). Both ATI and DPE were implemented using a new distributed programming...
-
Capabilities and limitations of the disabled in remote access to information
PublikacjaArtykuł poświęcony jest możliwościom zdalnego dostępu do źródeł informacji przez osoby niepełnosprawne. Przedstawia urządzenia i aparaty umożliwiające grupom osób niepełnosprawnych najłatwiejsze w ich sytuacji psychofizycznej sposoby zdalnego dostępu do Centrum Informacyjnego, precyzyjnego określenia potrzebnej informacji, jej odbiorze i zapisu odpowiedzi z punktu widzenia dysfunkcji organizmu inwalidy proszącego o informację.
-
Optimal linear control theory in power system application
PublikacjaPrzedstawiono syntezę stabilizatora systemowego przy wykorzystaniu metodyki Hinf. Zaprojektowany regulator umożliwia uzyskanie lepszych rezultatów w porównaniu z regulatorem odniesienia w szerokim zakresie zmian punktu pracy.
-
Finite automata for compact representation of language models in NLP
PublikacjaPrzedstawiona zostaje technika reprezentacji modeli języka w przetwarzaniu języka naturalnego wymagająca mało pamięci. Po krótkim omówieniu przyczyn poszukiwania oszczędnej reprezentacji takich modeli języka, pokazane jest, jak automaty skończone mogą być użyte w tym celu. Technika może być postrzegana jako zastosowanie i rozszerzenie doskonałej funkcji mieszającej z wykorzystaniem automatów skończonych. Pierwsze doświadczenia...
-
Dedicated scheduling of tasks to minimize mean flow time
PublikacjaThis paper investigates the complexity of scheduling biprocessor tasks on dedicated processors to minimize mean flow time. Since the general problem is strongly NP-hard, we assume some restrictions on task lengths and the structure of associated scheduling graphs. Of particular interest are acyclic graphs. In this way we identify a borderline between NP-hard and polynomially solvable special cases.
-
Ranking decision variants by subjective paird comparisons in cases with incomplete data.
PublikacjaMetoda porównań parami wykorzystywana jest do szeregowania skończonej,zwykle niewielkiej liczby wariantów decyzyjnych. W metodzie tej ekspert lub grupa ekspertów proszona jest o wyrażenie swojej opinii dotyczącej każdej pary wariantów w postaci względnej preferenecji jednego wariantu nad drugim.Zdarza się jednak często, że ekspert nie jest w stanie ocenić pary lub par wiariantów i mamy wtedy do czynienia z sytuacją...
-
Comparison of construction algorithms for minimal, acyclic, deterministicfinite state automata from sets of strings.
PublikacjaArtykuł porównuje różne metody tworzenia minimalnych, acyklicznych, deterministycznych automatów skończonych ze zbiorów słów. Wdrożone i porównane zostały metody przyrostowe, prawie przyrostowe i nieprzyrostowe.
-
Admission control method based on effective delay for flows using EF PHB.
Publikacja.
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublikacjaProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Remote exception handling for PVM processes.
PublikacjaArtykuł przedstawia model lokalnej i zdalnej obsługi wyjątków w bibliotece PVM. Działający proces zostaje rozszerzony o możliwość zgłaszania zdalnych wyjątków do procesu nadrzędnego lub otrzymania akcji związanych z obsługą wyjątków. Przedstawiono wzorce obsługi wyjątków w aplikacjach rozproszonych oraz wprowadzono pojęcie Zdalnego Nadzorcy Wyjątków. Nadzorca może kontrolować każdy proces w maszynie wirtualnej (PVM).
-
PVM Web Cluster: integration of PVM clusters using Web services and CORBA.
PublikacjaProponujemy nową architekturę i jej implementację PVM Web Cluster, która umożliwia łatwe zrównoleglanie wykonania zadań PVM zarówno na geograficznie rozproszone klastry PVM jak i wewnątrz nich. Uruchamianie zadań jest wykonywane poprzez wywołanie usługi sieciowej (Web service), która negocjuje najlepszy klaster (klastry) dla danego zadania i komunikuje się z klastrami za pomocą standardu CORBA.
-
Exception handling model influence factors for discributed systems. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. 5th In- ternational Conference. Częstochowa, 7-10 September 2003.Model obsługi wyjątków uwzględniający wpływ czynników systemu rozproszonego.
PublikacjaSpecyfikacja programu jest jasno określona w systemach sekwencyjnych, gdzie posiada standardowe i wyjątkowe przejścia. Praca przedstawia rozszerzony model specyfikacji systemu w środowiskach rozproszonych uwzględniający szereg specyficznych czynników. Model zawiera analizę specyfikacji pod kątem obsługi wyjątków dla rozproszonych danych oraz komunikacji międzyprocesorowej. Ogólny model został zaimplementowany w środowisku...
-
Safety issues referred to induced sheath voltages in high-voltage power cables – case study
PublikacjaLoad currents and short-circuit currents in high-voltage power cable lines are sources of the induced voltages in the power cables’ concentric metallic sheaths. When power cables operate with single-point bonding, which is the simplest bonding arrangement, these induced voltages may introduce an electric shock hazard or may lead to damage of the cables’ outer non-metallic sheaths at the unearthed end of the power cable line. To...
-
Przegląd badań na temat Wikipedii oraz z wykorzystaniem Wikipedii jako instrument badawczego
PublikacjaW badaniach dotychczas prowadzonych w Polsce Wikipedia była zarówno przedmiotem badań, jak i instrumentem badawczym. Badania na jej temat oraz na temat skutków społecznych jej używania prowadzili przedstawiciele nauk humanistycznych, społecznych, ekonomicznych i prawnych. Dla wielu badaczy (zwłaszcza z dziedziny informatyki) Wikipedia była instrumentem pomocnym w prowadzeniu różnorodnych analiz i dociekań naukowych. Niniejszy artykuł...
-
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublikacjaDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
Design and characterization of apatite La9.8Si5.7Mg0.3O26±δ-based micro-tubular solid oxide fuel cells
PublikacjaIn this study, electrolyte-supported (Cell A) and anode-supported (Cell B) micro-tubular solid oxide fuel cells (SOFCs) based on the La9.8Si5.7Mg0.3O26±δ (LSMO) electrolyte is built through an extrusion and dip-coating processes. The formulations and process conditions for these cells are established and optimized. Both cell configurations show no visible delamination or cracking, and reaction zones and inter-diffusion of any species...
-
Modelowanie matematyczne górnej sieci trakcyjnej dla potrzeb diagnostyki odbieraków prądu
PublikacjaGórna sieć trakcyjna jest obecnie najbardziej skutecznym sposobem zasilania kolejowych pojazdów elektrycznych. Wzrost prędkości pojazdów zwiększa pobór mocy i wymaga zapewnienia właściwej współpracy odbieraków prądu pojazdów z siecią jezdną. Metody modelowania i projektowania wspomaganego komputerowo dla górnej sieci trakcyjnej są obecnie na całym świecie szeroko rozwijane. W artykule przedstawiono nowy model matematyczny elementów...
-
The Revitalization Processes of the Port Structures in Gdynia and Gdansk on the Background of Contemporary Port Changes
PublikacjaTransformations of the port facilities against the modernization of the port structures are present in many city-port centers since more than 50 years. The modernization taking place in the ports located in Gdynia-Gdansk mainly concerns communication availability and adapted to the multimodal technology of transport and transshipment. Developing specialized tech-terminals serving a specific type of load, causes development of the...
-
Recognition of Emotions in Speech Using Convolutional Neural Networks on Different Datasets
PublikacjaArtificial Neural Network (ANN) models, specifically Convolutional Neural Networks (CNN), were applied to extract emotions based on spectrograms and mel-spectrograms. This study uses spectrograms and mel-spectrograms to investigate which feature extraction method better represents emotions and how big the differences in efficiency are in this context. The conducted studies demonstrated that mel-spectrograms are a better-suited...
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Computational methods for calculation of binding free energy for ligand-receptor complexes
PublikacjaAccurate description of the molecular complexes energetic influence is required for understanding of many biological functions carried out by proteins. Therefore, estimation of binding free energy for ligand-receptor complexes is of highest importance for structure-based ligand design and drug discovery approaches.Experimental methods of determination of difference in Gibbs'es free energy have many limitations. Thus, computational...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Effect of Simultaneous Valve Closures in Hydraulic Piping Systems
PublikacjaThe paper investigates wave interference (between pressure waves) occurring in simple hydraulic systems. Water hammer was induced by simultaneous closure of three valves located at the reservoirs of a “Y” type hydraulic system. Numerical simulations were carried out with the help of the freeware computer package Allievi enabling the reader to replicate results in a direct manner. The influence of the following quantities has been...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublikacjaComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Dynamic soil improvement by hybrid technologies
PublikacjaHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublikacjaCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublikacjaRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublikacjaNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
Visualization of a lifeboat motion during lowering along ship’s side
PublikacjaThis paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublikacjaAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublikacjaCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublikacjaRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Running performance of an aerodynamic journal bearing with squeeze film effect
PublikacjaResults of theoretical and experimental studies concerning the performance of an aerodynamic journal bearing of which running is assisted by squeeze film ultrasonic levitation (SFUL) are presented in this paper. The SFUL mechanism not only can separate journal from the bearing at the start and stop phases of operation but also can significantly contribute to the dynamic stability of the bearing when it runs at speed. Computer calculations...
-
Food analysis using artificial senses.
PublikacjaNowadays, consumers are paying great attention to the characteristics of food such as smell, taste, and appearance. This motivates scientists to imitate human senses using devices known as electronic senses. These include electronic noses, electronic tongues, and computer vision. Thanks to the utilization of various sensors and methods of signal analysis, artificial senses are widely applied in food analysis for process monitoring...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublikacjaA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Multimedia interface using head movements tracking
PublikacjaThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublikacjaModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Role of research and development in internationalization of high-tech firms: Empirical results from Poland
PublikacjaThe article focuses on the significance of research and development (R&D) in driving the internationalization of Polish high-tech firms. R&D is essential for businesses to remain competitive and adapt their products to the specific requirements of different markets. The study aims to investigate the relationship between R&D and the internationalization process of high-tech firms based in Poland, with a focus on the innovation context....
-
Virtual reality technology in architectural education
PublikacjaContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...