Filtry
wszystkich: 808
Wyniki wyszukiwania dla: computer networks
-
Krzysztof Cwalina dr inż.
OsobyKrzysztof Kamil Cwalina w 2013 r. uzyskał tytuł inżyniera na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej; w 2014 r. uzyskał tytuł magistra inżyniera, a w 2017 r. otrzymał stopień doktora nauk technicznych w dyscyplinie: telekomunikacja, także na WETI PG. Aktualnie pracuje na stanowisku adiunkta w Katedrze Systemów i Sieci Radiokomunikacyjnych Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki...
-
Results of implementation of Feed Forward Neural Networks for modeling of heat transfer coefficient during flow condensation for low and high values of saturation temperature
Dane BadawczeThis database present results of implementation of Feed Forward Neural Networks for modeling of heat transfer coefficient during flow condensation for low and high values of saturation temperature. Databse contain one table and 7 figures.
-
Maciej Sac dr inż.
OsobyMaciej Sac ukończył studia na Politechnice Gdańskiej w 2009 roku uzyskując tytuł zawodowy magistra inżyniera telekomunikacji. W roku 2022 uzyskał stopień naukowy doktora inżyniera w dziedzinie informatyka techniczna i telekomunikacja. Jego zainteresowania badawcze związane są z sieciami IP QoS, VoIP, IMS/NGN, SDN, a także usługami multimedialnymi i inżynierią ruchu telekomunikacyjnego. Obecnie jest zatrudniony na stanowisku adiunkta...
-
BETWEEN IDEA AND INTERPRETATION - DESIGN PROCESS AUGMENTATION
PublikacjaThe following paper investigates the idea of reducing the human digital intervention to a minimum during the advanced design process. Augmenting the outcome attributes beyond the designer's capabilities by computational design methods, data collection, data computing and digital fabrication, altogether imitating the human design process. The primary technical goal of the research was verification of restrictions and abilities used...
-
Real-time mask-wearing detection in video streams using deep convolutional neural networks for face recognition
Publikacja -
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublikacjaThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 3 V
Dane BadawczeThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 1 V
Dane BadawczeThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
The conducted immunity test of a power supply unit in the frequency range from 19 MHz to 26 MHz for the RF voltage level of 10 V
Dane BadawczeThe dataset presents a result of measurements that are a part of immunity tests to conducted disturbances, induced by radio-frequency fields. The immunity tests were carried out on the mains cable of the DF1723003TC NDN power supply unit. Tests of immunity of electronic systems to conducted disturbances in the frequency range from 19 MHz to 26 MHz were...
-
Magdalena Młynarczuk dr inż.
Osoby -
Andrzej Marczak dr inż.
Osoby -
Agnieszka Czapiewska dr inż.
Osoby -
Marcin Narloch dr inż.
Osoby -
Jarosław Magiera dr inż.
OsobyJarosław Magiera od 2009 r. jest pracownikiem Katedry Systemów i Sieci Radiokomunikacyjnych PG, aktualnie na stanowisku adiunkta. W 2015 uzyskał stopień dr inż. w dyscyplinie telekomunikacja za rozprawę pt. „Analiza i badania systemu antyspoofingowego GPS”. Jego zainteresowania naukowe obejmują zagadnienia takie jak m.in. wieloantenowe przetwarzanie sygnałów, detekcja i przeciwdziałanie zakłóceniom radiowym, estymacja parametrów...
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublikacjaProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
Oprogramowanie Systemów Elektronicznych 2023/2024
Kursy Online{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Oprogramowanie Systemów Elektronicznych 2021/2022
Kursy Online{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Infosystemy Elektroniczne 2023/2024
Kursy Online{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Infosystemy Elektroniczne 2021/2022
Kursy Online{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Vehicle detector training with minimal supervision
PublikacjaRecently many efficient object detectors based on convolutional neural networks (CNN) have been developed and they achieved impressive performance on many computer vision tasks. However, in order to achieve practical results, CNNs require really large annotated datasets for training. While many such databases are available, many of them can only be used for research purposes. Also some problems exist where such datasets are not...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Dane BadawczeNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublikacjaThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Jacek Stefański prof. dr hab. inż.
OsobyJacek Stefański ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej (PG) w 1993 r. W 2000 r. uzyskał stopień doktora nauk technicznych w dyscyplinie telekomunikacja, w 2012 r. stopień doktora habilitowanego, natomiast w 2020 r. tytuł profesora nauk inżynieryjno-technicznych. Obecnie pracuje na stanowisku profesora w Katedrze Systemów i Sieci Radiokomunikacyjnych (KSiSR) PG. W latach 2005-2009 był zatrudniony w Instytucie...
-
Mariusz Dzwonkowski dr inż.
Osoby -
Jacek Andrzej Litka mgr inż.
Osoby -
Olga Błaszkiewicz mgr inż.
Osoby -
Alicja Olejniczak mgr inż.
Osoby -
Przygotowanie, realizacja i ocena pomiarów terenowych do identyfikacji oporności hydraulicznej sieci wodociągowej
PublikacjaW procesie tworzenia komputerowego modelu przepływów (KMP) jednym z wiodących zadań jest przygotowanie i realizacja pomiarów terenowych w celu identyfikacji oporności hydraulicznej czynnej sieci wodociągowej. Motywacją autora do przedstawienia zasad postępowania w tym zakresie jest narastająca niefrasobliwość twórców KMP, którzy w nieuprawniony sposób używają paramodeli do rozwiązywania problemów inżynierskich. W pracy zdefiniowano...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for detection of organic gases (ethanol, acetone)
Dane BadawczeCarbon nanotube networks of different optical transparencies were investigated via resistance and 1/f noise measurements for detection of ethanol and acetone. The sensor resistive and noise responses were collected for dark and UV-assisted conditions, revealing the improvement in sensor sensitivity and limit of detection after applying UV light (275...
-
A Special Section on Intelligent User Interfaces in Healthcare (IUIH)
PublikacjaA concept of interface has evolved from the first appearance in the form of a command line interface to the established use of direct manipulation or WIMP (windows, icons, menus and pointing) interfaces in nearly all applications. Intelligent user interfaces (IUI) form a subfield of Human-Computer Interaction research. Optimal human-computer interactions are defined as ones where users are able to perform complex tasks more quickly...
-
DevEmo—Software Developers’ Facial Expression Dataset
PublikacjaThe COVID-19 pandemic has increased the relevance of remote activities and digital tools for education, work, and other aspects of daily life. This reality has highlighted the need for emotion recognition technology to better understand the emotions of computer users and provide support in remote environments. Emotion recognition can play a critical role in improving the remote experience and ensuring that individuals are able...
-
Wojciech Siwicki dr inż.
Osoby -
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublikacjaIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
An attempt to develop a model selection algorithm of computer simulation during the design process of mechanical response of any mechanical body
Publikacjan the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This article...
-
Hip endhoprothesis development using rapid prototyping methods
PublikacjaIntegrated product development based on Rapid Prototyping methods, connected with computer aided 3D design and computer aided engineering enables fast and full new product verification and validation. A case study derived from clinical and technological practice using hip implant construction is also included.
-
Application of auto calibration and linearization algorithms to improve sound quality of computer devices
PublikacjaAn application of auto calibration and linearization algorithms designed for correcting acoustic characteristics of selected computer devices was presented in the paper. The functionality of the algorithms were presented for two kind of computer devices: ultrabook class computer and portable device of All-In-One type. The algorithms were adjusted for the given type of the device on the basis of series of measurements conducted...
-
Gesture-based computer control system
PublikacjaIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Michał Hoeft dr inż.
OsobyMichał Hoeft z wyrożnieniem ukończył studia na Wydziale ETI Politechniki Gdańskiej w 2011. Obszary jego zainteresowań badawczych obejmują zarządzanie mobilnością w sieciach heterogenicznych oraz optymalizacje przełączania w sieciach IEEE 802.11. Michał Hoeft uczestniczył w licznych projektach B+R m. in. Inżynieria Internetu Przyszłości, PL-LAB2020 oraz netBaltic. Dodatkowo pełnił rolę recenzanta dla czasopism: Ad-Hoc Networks,...
-
Virtual touchpad - video-based multimodal interface
PublikacjaA new computer interface named Virtual-Touchpad (VTP) is presented. The Virtual-Touchpad provides a multimodal interface which enables controlling computer applications by hand gestures captured with a typical webcam. The video stream is processed in the software layer of the interface. Hitherto existing video-based interfaces analyzing frames of hand gestures are presented. Then, the hardware configuration and software features...
-
Eye-tracking everywhere - software supporting disabled people in interaction with computers
PublikacjaIn this paper we present comprehensive system for communication with computer by gaze. One of the main assumptions behind this work was to provide solution that can be used with standard RGB webcam. The proposed comprehensive system included the eye tracking module and user interface for convenient gaze interaction with computer. As a result a fully functional application was developed. The average accuracy of the eye tracking...
-
ASON/GMPLS connection control servers in virtual computer environment
PublikacjaIn the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...
-
A graphical approach to yield and boundary surfaces of selected hypoplastic constitutive equations
PublikacjaThe article describes how to identify the boundary and yield surface for hypoplastic constitutive equations proposed by Wu, Gudehus and Bauer. It is shown how to identify and plot the surfaces for any equation in this class. Calculation errors are analyzed characteristic for appleid set of numerical formulas. In the paper there are computer links to the source code prepared in the MATLAB system, based on istructions in the article....
-
Determining QoS in the Video Telephony Service in an IP Environment
PublikacjaIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Global Roots and Poles Finding Algorithm on Quantum Computer
PublikacjaIn this paper, the implementation of the global roots and poles finding algorithm for a complex-valued function of a complex variable on a quantum computer, which allows for solving general nonlinear algebraic equations, is presented. The considered function is sampled with the use of Delaunay’s triangulation on the complex plane and a phase quadrant, in which the value of the function is located, is computed on a classical computer...
-
Emotion Monitoring – Verification of Physiological Characteristics Measurement Procedures
PublikacjaThis paper concerns measurement procedures on an emotion monitoring stand designed for tracking human emotions in the Human-Computer Interaction with physiological characteristics. The paper addresses the key problem of physiological measurements being disturbed by a motion typical for human-computer interaction such as keyboard typing or mouse movements. An original experiment...
-
Semantics for an Interdisciplinary Computation
PublikacjaSemantics for an interdisciplinary computation is becoming increasingly difficult to capture while dealing with multi-domain problems. Expertise from Computer Science, Computer Engineering, Electrical Engineering, and other disciplines merges as engineering challenges in modern systems, such as, Cyber-Physical Systems, Smart Cities, and Bionic Systems must be tackled in a methodological manner. In this paper, a paradigm for formalization...
-
The Drawing Paradigm between Representation and Interaction with Virtual Image
PublikacjaTraditional drawing involves drawing on some surface, often a plane, e.g. a sheet of paper, a school board or a wall. This type of drawing therefore takes place in two dimensions of this surface. Transferring this activity to a computer, or rather to the surface of its screen, did not change the two-dimensional nature of this action. Practically all applications today, from Paint to sophisticated computer-aided design tools, still...
-
Software Tools to Measure the Duplication of Information
PublikacjaData stored in average computer system usually is not unique, portions of stored data are duplicated. When duplicated data are stored in separate files containing source code of computer program of student homework, a possibility of cheating should be seriously considered. This paper presents software tools built, in order to detect re-use of pieces of code in supplied text files. Three aspects of information atching are considered:...