Filtry
wszystkich: 6562
-
Katalog
- Publikacje 4518 wyników po odfiltrowaniu
- Czasopisma 281 wyników po odfiltrowaniu
- Konferencje 104 wyników po odfiltrowaniu
- Osoby 202 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 14 wyników po odfiltrowaniu
- Kursy Online 132 wyników po odfiltrowaniu
- Wydarzenia 10 wyników po odfiltrowaniu
- Dane Badawcze 1300 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MACHINE LEARNING, DEEP NEURAL NETWORKS, CEREBRAL MICROBLEEDS, CMB DETECTION, MR IMAGES
-
E-learning workshops with Norbert Berger
Kursy OnlineThe series of workshops supports MBA faculty in planning, designing, delivering and assessing blended and online modules for their cohorts. It is supplemented by individual coaching to create Moodle and conferencing solutions and their delivery.
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublikacjaAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublikacjaCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Evaluation of ChatGPT Applicability to Learning Quantum Physics
PublikacjaChatGPT is an application that uses a large language model. Its purpose is to generate answers to various questions as well as provide information, help solve problems and participate in conversations on a wide range of topics. This application is also widely used by students for the purposes of learning or cheating (e.g., writing essays or programming codes). Therefore, in this contribution, we evaluate the ability of ChatGPT...
-
Loosely-Tied Distributed Architecture for Highly Scalable E-Learning System
PublikacjaVast majority of modern e-learning products are based on client-server architecture and utilization of web-based technologies (WBT). Such approach permits easy creation of e-learning systems that do not require a complex, operating system dependant client software. Unfortunately there are also drawbacks of such solution. Because of the majority of mechanisms are located on the server, its usage levels trend to build up quickly...
-
Informal Workplace Learning and Employee Development. Growing in the Organizational New Normal
PublikacjaThe new paradigm in employee development assumes that employees should proactively direct their learning and growth. Most workplace learning is basically informal and occurs through daily work routines, peer-to-peer interactions, networking, and typically brings about significant positive outcomes to both individuals and organizations. Yet, workplace learning always occurs in a pre-defined context and this context has recently...
-
Orunia UPDATE AB&MSŁ&MR&ŁB
Kursy Online -
SYNTHESIZING MEDICAL TERMS – QUALITY AND NATURALNESS OF THE DEEP TEXT-TO-SPEECH ALGORITHM
PublikacjaThe main purpose of this study is to develop a deep text-to-speech (TTS) algorithm designated for an embedded system device. First, a critical literature review of state-of-the-art speech synthesis deep models is provided. The algorithm implementation covers both hardware and algorithmic solutions. The algorithm is designed for use with the Raspberry Pi 4 board. 80 synthesized sentences were prepared based on medical and everyday...
-
Machine-to-Machine communication and data processing approach in Future Internet applications
Publikacja -
Mispronunciation Detection in Non-Native (L2) English with Uncertainty Modeling
PublikacjaA common approach to the automatic detection of mispronunciation in language learning is to recognize the phonemes produced by a student and compare it to the expected pronunciation of a native speaker. This approach makes two simplifying assumptions: a) phonemes can be recognized from speech with high accuracy, b) there is a single correct way for a sentence to be pronounced. These assumptions do not always hold, which can result...
-
The Use of Photographs in the Teaching/Learning of Descriptive Geometry
PublikacjaThe article presents the concept of enriching the Descriptive Geometry course with photographs and several simplified real-life engineering tasks. The photographic images used for the exercises are tightly linked to engineering structures, the given specialization and the surrounding world. The photo image as a record of central projection of a real space can be useful for presentation and analysis of the properties of perspective....
-
Challenges and Possibilities of Deep Eutectic Solvent-Based Membranes
PublikacjaDeep eutectic solvents (DES) are a category of a new class of solvents that can overcome some of the main drawbacks of typical solvents and ionic liquids (ILs). DES have been widely investigated and applied by the research community in several applications since their invention. Over the past years, the use of DES has been directed to the production of new materials and items for new products and processes. This is the case for...
-
Vident-real: an intra-oral video dataset for multi-task learning
Dane BadawczeWe introduce Vident-real, a large dataset of 100 video sequences of intra-oral scenes from real conservative dental treatments performed at the Medical University of Gdańsk, Poland. The dataset can be used for multi-task learning methods including:
-
Direct detection of quantum entanglement
PublikacjaBasing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.
-
Sensorless Disturbance Detection for Five Phase Induction Motor with Third Harmonic Injection
PublikacjaThe paper presents a sensorless disturbance detection procedure that was done on a five phase induction motor with third harmonic injection. A test bench was developed where a three phase machine serves as disturbance generator of different frequencies. The control of the machines is based on multi scalar variables that ensures an independent control of the motor EMF and the rotor flux. For disturbance identification a speed observer...
-
Accuracy Investigations of Turbine Blading Neural Models Applied to Thermal and Flow Diagnostics
PublikacjaPossibility of replacing computional fluid dynamics simulations by a neural model for fluid flow and thermal diagnostics of steam turbines is investigated. Results of calculations of velocity magnitude of steam for 3D model of the stator of steam turbine is presented.
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Iterative Global Sensitivity Analysis Algorithm with Neural Network Surrogate Modeling
PublikacjaGlobal sensitivity analysis (GSA) is a method to quantify the effect of the input parameters on outputs of physics-based systems. Performing GSA can be challenging due to the combined effect of the high computational cost of each individual physics-based model, a large number of input parameters, and the need to perform repetitive model evaluations. To reduce this cost, neural networks (NNs) are used to replace the expensive physics-based...
-
Application of the Flipped Learning Methodology at a Business Process Modelling Course – A Case Study
PublikacjaFlipped learning has been known for a long time, but its modern use dates back to 2012, with the publication of Bergmann and Saams. In the last decade, it has become an increasingly popular learning method. Every year, the number of publications on implementing flipped learning experiments is growing, just as the amount of research on the effectiveness of this educational method. The aim of the article is to analyze the possibilities...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublikacjaDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Comparison of centralized and decentralized preemption in MPLS networks
PublikacjaPreemption is one of the crucial parts of the traffic engineering in MPLS networks. It enables allocation of high-priority paths even if the bandwidth on the preferred route is exhausted. This is achieved by removing previously allocated low-priority traffic, so as enough free bandwidth becomes available. The preemption can be performed either as a centralized or a decentralized process. In this article we discuss the differences...
-
Artificial Neural Network in Forecasting the Churn Phenomena Among Costumers of IT and Power Supply Services
PublikacjaThis paper presents an attempt to use an artificial neural network to investigate the churn phenomenon among the customers of a telecommunications operator. An attempt was made to create a data model based on the customer lifetime value (CLV) rather than on activity alone. A multilayered artificial neural network was used for the experiments. The results yielded a 99% successful identification rate for customers in no danger of...
-
Sorbents modified by deep eutectic solvents in microextraction techniques
PublikacjaIn recent years, considerable attention has been directed towards the employment of green solvents, specifically deep eutectic solvents (DES), in liquid phase microextraction techniques. However, comprehensive and organized knowledge regarding the modification of sorbent surface structures with DES remains limited. Therefore, this paper reviews the application of DES in modifying and improving the properties of sorbents for microextraction...
-
An application supporting the educational process of the respiratory system obstructive diseases detection
PublikacjaThe paper presents a description of functioning of a platform supporting the detection of obstructive diseases in the respiratory system education process. A 16-parameter model of the respiratory system simulated in the MATLAB/Simulink environment was set in the role of the tested patient. It has been linked to the control layer, developed in the LabVIEW environment, using the SIT library (Simulation Interface Toolkit). This layer...
-
Superhydrophobic sponges based on green deep eutectic solvents for spill oil removal from water
PublikacjaThe paper described a new method for crude oil-water separation by means of superhydrophobic melamine sponges impregnated by deep eutectic solvents (MS-DES). Due to the numerous potential of two-component DES formation, simple and quick screening of 156 non-ionic deep eutectic solvents using COSMO-RS (Conductor-like Screening Model for Real Solvents) computational model was used. DES which were characterized by high solubility...
-
Tagged images with LEGO bricks - Bionicle Hero Factory and Constraction
Dane BadawczeThe set contains images of LEGO bricks (from Bionicle Hero Factory and Constraction category). The images were prepared for training neural network for recognition and labeling of LEGO bricks. The images contain one brick each. The images were taken from different sides by handheld camera hovering over the bricks lying on a white, non reflective surface.
-
Tagged images with LEGO bricks - Plates Round Curved and Dishes
Dane BadawczeThe set contains images of LEGO bricks (from Plates Round Curved and Dishes category). The images were prepared for training neural network for recognition and labeling of LEGO bricks. The images contain one brick each. The images were taken from different sides by handheld camera hovering over the bricks lying on a white, non reflective surface.
-
Tagged images with LEGO bricks - Technic Steering Suspension and Engine
Dane BadawczeThe set contains images of LEGO bricks (from Technic Steering Suspension and Engine category). The images were prepared for training neural network for recognition and labeling of LEGO bricks. The images contain one brick each. The images were taken from different sides by handheld camera hovering over the bricks lying on a white, non reflective surface.
-
Molecularly imprinted polymers for the detection of volatile biomarkers
PublikacjaIn the field of cancer detection, the development of affordable, quick, and user-friendly sensors capable of detecting various cancer biomarkers, including those for lung cancer (LC), holds utmost significance. Sensors are expected to play a crucial role in the early-stage diagnosis of various diseases. Among the range of options, sensors emerge as particularly appealing for the diagnosis of various diseases, owing to their cost-effectiveness,...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Adaptive Hounsfield Scale Windowing in Computed Tomography Liver Segmentation
PublikacjaIn computed tomography (CT) imaging, the Hounsfield Unit (HU) scale quantifies radiodensity, but its nonlinear nature across organs and lesions complicates machine learning analysis. This paper introduces an automated method for adaptive HU scale windowing in deep learning-based CT liver segmentation. We propose a new neural network layer that optimizes HU scale window parameters during training. Experiments on the Liver Tumor...
-
Deep eutectic solvents – Ideal solution for clean air or hidden danger?
PublikacjaThe industrial sector is one of the fastest-growing sources of greenhouse gases, due to its excessive energy consumption to meet the rapidly growing demand for energy-intensive products. The use of deep eutectic solvents (DESs) has been studied extensively in order to cope with these harmful gases, but their usage can be an issue in respect to ecological reasons. Do deep eutectic solvents harm the atmosphere? Yes, these solvents...
-
Routing decisions independent of queuing delays in broadband leo networks
PublikacjaThis paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...
-
Fundamentals of Machine Design I
Kursy Online -
Fundamental of Machine Design III
Kursy Online -
Fundamentals of Machine Design II
Kursy Online -
Fundamentals of Machine Design III
Kursy Online -
Fundamentals of Machine Design I
Kursy Online -
Theoretical modelling of efficient fire safety water networks by certified domination
PublikacjaThis paper explores a new way of designing water supply networks for fire safety using ideas from graph theory, focusing on a method called certified domination. Ensuring a good water supply is crucial for fire safety in communities, this study looks at the rules and problems in Poland for how much water is needed to fight fires in different areas and how this can be achieved at a lowest possible cost. We present a way to plan...
-
Natural deep eutectic solvent based ultrasound assisted liquid-liquid micro-extraction method for methyl violet dye determination in contaminated river water
PublikacjaSimple and green natural deep eutectic solvent (NADES) based ultrasound assisted liquid-liquid micro-extraction (UA-LLME) method was developed for extraction and determination of methyl violet dye in contaminated river water samples using UV/Vis spectrophotometry. Choline chloride - decanoic acid based natural deep eutectic solvent was used for extraction. Important analytical parameters like pH, deep eutectic solvent volume/phase...
-
Systematic approach to binary classification of images in video streams using shifting time windows
Publikacjain the paper, after pointing out of realistic recordings and classifications of their frames, we propose a new shifting time window approach for improving binary classifications. We consider image classification in tewo steps. in the first one the well known binary classification algorithms are used for each image separately. In the second step the results of the previous step mare analysed in relatively short sequences of consecutive...
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublikacjaFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
Microbiological condition of sediments and bottom water in the area of Gdańsk Deep in Gulf of Gdańsk
Dane BadawczeThis dataset contains the results of microbiological analysis of bottom water and bottom sediments in the area of Gdańsk Deep in Gulf of Gdańsk. The tested samples were collected at 5 sites on 15th of December 2007. 5 samples of bottom water and 10 samples of sediments were collected for microbiological testing. Each of these samples were analysed for...
-
Application of spatial neural simulators of turbine blade rows to fluid flow diagnostics
PublikacjaThis chapter presents the results of neural modelling of fluid flow in steam turbine row. In modelling working conditions of the flow channel varied, thus the aim of the work was to reconstruct the reference state - distributions of velocity, pressure, and losses in flow channel - with high accuracy for fluid flow diagnostics.
-
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublikacjaOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Method of selecting the LS-SVM algorithm parameters in gas detection process
PublikacjaIn this paper we showed the method of resistive gas sensors data processing. The UV irradiation and temperature modulation was applied to improve gas sensors’ selectivity and sensitivity. Noise voltage across the sensor’s terminals (proportional to its resistance fluctuations) was recorded to estimate power spectral density. This function was an input data vector for LS-SVM (least squares – support vector machine) algorithm, which...
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublikacjaIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Facial features extraction for color, frontal images
PublikacjaThe problem of facial characteristic features extraction is discussed. Several methods of features extraction for color en--face photographs are discussed. The methods are based mainly on the colors features related to the specific regions of the human face. The usefulness of presented methods was tested on a database of en--face photographs consisting of 100 photographs.