Wyniki wyszukiwania dla: LABORATORY CLASSES
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Child accidents
Dane BadawczeData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: children - drivers, passengers and . vulnerable road user.. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Alcohol and drug accidents
Dane BadawczeData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: Offenders under influence of alcohol or drug - driver or pedestrian. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublikacjaDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
NLP Questions Answering Using DBpedia and YAGO
PublikacjaIn this paper, we present results of employing DBpedia and YAGO as lexical databases for answering questions formulated in the natural language. The proposed solution has been evaluated for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference). Our method uses dependency trees generated from the user query. The trees are browsed for paths leading from the root of the tree to the question...
-
Applying case studies to teaching architectural investment
PublikacjaCase studies enable students to encounter practical issues during their education. Experiments conducted in class employing this method often feature simplified models of real-world situations. However, they still enable students to encounter actual problems, to which theoretical knowledge is applied. In architectural education, students carrying out semester projects usually rely on data provided by the teacher, without wondering...
-
Action Plan “Women”
PublikacjaEmployees of a company are not the first alternative coming into one’s mind when searching suitable successor for the business. Those belonging to the company’s management group are in many cases asked for their interest in being a successor, but the lower level an employee is in the hierarchy, the less probably he/she is inquired of his/her interest in becoming a successor. The contemporary entrepreneur may have had conflicts...
-
Domination subdivision and domination multisubdivision numbers of graphs
PublikacjaThe domination subdivision number sd(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the domination number of G. It has been shown [10] that sd(T)<=3 for any tree T. We prove that the decision problem of the domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the domination multisubdivision number...
-
Paired domination subdivision and multisubdivision numbers of graphs
PublikacjaThe paired domination subdivision number sdpr(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the paired domination number of G. We prove that the decision problem of the paired domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the paired domination muttisubdivision number of a nonempty graph...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Virtual reality technology in architectural education
PublikacjaContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Difference in Perceived Speech Signal Quality Assessment Among Monolingual and Bilingual Teenage Students
PublikacjaThe user perceived quality is a mixture of factors, including the background of an individual. The process of auditory perception is discussed in a wide variety of fields, ranging from engineering to medicine. Many studies examine the difference between musicians and non-musicians. Since musical training develops musical hearing and other various auditory capabilities, similar enhancements should be observable in case of bilingual...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublikacjaBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Application Isssues of the Semi-Markov Reliability Model
PublikacjaPredicting the reliability of marine internal combustion engines, for instance, is of particular importance, as it makes it possible to predict their future reliability states based on the information on the past states. Correct reliability prediction is a complex process which consists in processing empirical results obtained from operating practice, complemented by analytical considerations. The process of technical state changes...
-
Visual Content Learning in a Cognitive Vision Platform for Hazard Control (CVP-HC)
PublikacjaThis work is part of an effort for the development of a Cognitive Vision Platform for Hazard Control (CVP-HC) for applications in industrial workplaces, adaptable to a wide range of environments. The paper focuses on hazards resulted from the nonuse of personal protective equipment (PPE). Given the results of previous analysis of supervised techniques for the problem of classification of a few PPE (boots, hard hats, and gloves...
-
Learning design of a blended course in technical writing
PublikacjaBlending face-to-face classes with e-learning components can lead to a very successful outcome if the blend of approaches, methods, content, space, time, media and activities is carefully structured and approached from both the student’s and the tutor’s perspective. In order to blend synchronous and asynchronous e-learning activities with traditional ones, educators should make them inter-dependent and develop them according to...
-
DBpedia and YAGO Based System for Answering Questions in Natural Language
PublikacjaIn this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...
-
From unextendible product bases to genuinely entangled subspaces
PublikacjaUnextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...
-
Automatic Clustering of EEG-Based Data Associated with Brain Activity
PublikacjaThe aim of this paper is to present a system for automatic assigning electroencephalographic (EEG) signals to appropriate classes associated with brain activity. The EEG signals are acquired from a headset consisting of 14 electrodes placed on skull. Data gathered are first processed by the Independent Component Analysis algorithm to obtain estimates of signals generated by primary sources reflecting the activity of the brain....
-
The exposure to UV filters: Prevalence, effects, possible molecular mechanisms of action and interactions within mixtures
PublikacjaSubstances that can absorb sunlight and harmful UV radiation such as organic UV filters are widely used in cosmetics and other personal care products. Since humans use a wide variety of chemicals for multiple purposes it is common for UV filters to co-occur with other substances either in human originating specimens or in the environment. There is increasing interest in understanding such co-occurrence in form of potential synergy, antagonist,...
-
Dataset Related Experimental Investigation of Chess Position Evaluation Using a Deep Neural Network
PublikacjaThe idea of training Articial Neural Networks to evaluate chess positions has been widely explored in the last ten years. In this paper we investigated dataset impact on chess position evaluation. We created two datasets with over 1.6 million unique chess positions each. In one of those we also included randomly generated positions resulting from consideration of potentially unpredictable chess moves. Each position was evaluated...
-
QoS Extensions for Flow-Awareness Networks
PublikacjaThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
"Shaping space" programme as a tool for educating youth about architecture
PublikacjaThe Polish Architectural Policy’s vision of a systematic promotion of spatial culture has made its way into the national curriculum for 2009 – 2016 designed for various stages of child and teenager education. The objective of this effort was to furnish a basis for a system of architectural education which allows teaching society to be more conscious in their decisions as to spatial order with the effect of improving the quality...
-
Tagged images with LEGO bricks moving on the conveyor belt
Dane BadawczeThe data set conatins tagged images conatining LEGO bricks used for traning LEGO bricks detecting network. The dataset contains frames taken from video recordings of lego bricks moving on a conveyor belt. The images conatin from 0 to 7 bricks. In total there are 5459 tagged lego bricks in 4340 images and 3390 images without any bricks in them. The images...
-
Lighting requirements for pedestrian crossings - positive contrast
PublikacjaFor many years now in Poland there has been a large number of road accidents at pedestrian crossings during night periods [5, 11]. One of the technical solutions that can improve this condition is the use of proper lighting for pedestrian crossings. The designated pedestrian crossing should be visible in different weather conditions and at different times of the day. In case of night vision restrictions use artificial lighting...
-
Set of Experience and Decisional DNA: Experience-Based Knowledge Structures
PublikacjaThis chapter presents a description of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA), argumentation for a knowledge representation, composition, configuration and metrics. SOEKS is a combination of filtered and amalgamated information obtained from formal decision events. It facilitates effective explicit representation of decisional experience taken from different technologies. SOEKS comprises variables,...
-
Explicit solvent repulsive scaling replica exchange molecular dynamics ( RS‐REMD ) in molecular modeling of protein‐glycosaminoglycan complexes
PublikacjaGlycosaminoglcyans (GAGs), linear anionic periodic polysaccharides, are crucial for many biologically relevant functions in the extracellular matrix. By interacting with proteins GAGs mediate processes such as cancer development, cell proliferation and the onset of neurodegenerative diseases. Despite this eminent importance of GAGs, they still represent a limited focus for the computational community in comparison to other classes...
-
Potential and Use of the Googlenet Ann for the Purposes of Inland Water Ships Classification
PublikacjaThis article presents an analysis of the possibilities of using the pre-degraded GoogLeNet artificial neural network to classify inland vessels. Inland water authorities monitor the intensity of the vessels via CCTV. Such classification seems to be an improvement in their statutory tasks. The automatic classification of the inland vessels from video recording is a one of the main objectives of the Automatic Ship Recognition and...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
The computational complexity of the backbone coloring problem for planar graphs with connected backbones
PublikacjaIn the paper we study the computational complexity of the backbone coloring problem for planar graphs with connected backbones. For every possible value of integer parameters λ≥2 and k≥1 we show that the following problem: Instance: A simple planar graph GG, its connected spanning subgraph (backbone) HH. Question: Is there a λ-backbone coloring c of G with backbone H such that maxc(V(G))≤k? is either NP-complete or polynomially...
-
Two examples of Quantum Dynamical Semigroups
PublikacjaThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
A business simulation method in educating architects
PublikacjaIn this article, the authors analyse the application of the business simulation method as a support tool in educating undergraduate architecture students. While running a fictional architectural practice, students learn about the role of an architect in the investment process and are introduced to economic aspects of running a small practice, including the importance of cash flow. They are also made aware about the importance of...
-
Segmentation-Based BI-RADS ensemble classification of breast tumours in ultrasound images
PublikacjaBackground: The development of computer-aided diagnosis systems in breast cancer imaging is exponential. Since 2016, 81 papers have described the automated segmentation of breast lesions in ultrasound images using arti- ficial intelligence. However, only two papers have dealt with complex BI-RADS classifications. Purpose: This study addresses the automatic classification of breast lesions into binary classes (benign vs. ma- lignant)...
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublikacjaTwo mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...
-
Food Classification from Images Using a Neural Network Based Approach with NVIDIA Volta and Pascal GPUs
PublikacjaIn the paper we investigate the problem of food classification from images, for the Food-101 dataset extended with 31 additional food classes from Polish cuisine. We adopted transfer learning and firstly measured training times for models such as MobileNet, MobileNetV2, ResNet50, ResNet50V2, ResNet101, ResNet101V2, InceptionV3, InceptionResNetV2, Xception, NasNetMobile and DenseNet, for systems with NVIDIA Tesla V100 (Volta) and...
-
2-bondage in graphs
PublikacjaA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Analysis of MArkers of Exposure to Constituents of Environmental Tobacco Smoke (ETS)
PublikacjaTobacco smoke is a complex mixture of more than 4000 chemical compounds, many of which are harmful to human health. These compounds belong to various chemical classes, including amides, imides, lactams, carboxylic acids, aldehydes, ketones, alcohols, phenols, amines, hydrocarbons, ethers, and inorganic compounds. There are three types of tobacco smoke streams: the mainstream, the sidestream, and environmental tobacco smoke (ETS)....
-
Improving css-KNN Classification Performance by Shifts in Training Data
PublikacjaThis paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...
-
Extended investigation of performance-energy trade-offs under power capping in HPC environments
Publikacja—In the paper we present investigation of performance-energy trade-offs under power capping using modern processors. The results are presented for systems targeted at both server and client markets and were collected from Intel Xeon E5 and Intel Xeon Phi server processors as well as from desktop and mobile Intel Core i7 processors. The results, when using power capping, show that we can find various interesting combinations of...
-
Anomalous Behavior of Hyaluronan Crosslinking Due to the Presence of Excess Phospholipids in the Articular Cartilage System of Osteoarthritis
PublikacjaLubrication of articular cartilage is a complex multiscale phenomenon in synovial joint organ systems. In these systems, synovial fluid properties result from synergistic interactions between a variety of molecular constituent. Two molecular classes in particular are of importance in understanding lubrication mechanisms: hyaluronic acid and phospholipids. The purpose of this study is to evaluate interactions between hyaluronic acid...
-
On Computational Aspects of Greedy Partitioning of Graphs
PublikacjaIn this paper we consider a problem of graph P-coloring consisting in partitioning the vertex set of a graph such that each of the resulting sets induces a graph in a given additive, hereditary class of graphs P. We focus on partitions generated by the greedy algorithm. In particular, we show that given a graph G and an integer k deciding if the greedy algorithm outputs a P-coloring with a least k colors is NP-complete for an infinite...
-
Fuzzy Gaussian Decision Tree
PublikacjaThe Decision Tree algorithm is one of the first machine learning algorithms developed. It is used both as a standalone model and as an ensemble of many cooperating trees like Random Forest, AdaBoost, Gradient Boosted Trees, or XGBoost. In this work, a new version of the Decision Tree was developed for classifying real-world signals using Gaussian distribution functions and a fuzzy decision process. The research was carried out...
-
The structure of revenues of non-public universities in 2010 from didactic activity by sources of financing (in%)
Dane BadawczeIncome from teaching activities of non-public universities accounted for almost 1/5 of income from teaching activities of all types of universities. Non-public universities generated the highest revenues from fees for teaching classes, which accounted for over half of the revenues from this title in relation to all universities.The average cost of education...
-
In search of the new: American volunteers’ opinions about their participation in the Teaching English in Poland (TEIP) Program
PublikacjaThe Teaching English in Poland (TEIP) program relies on summer camps during which native English speakers, American volunteers, teach Polish children and adolescents using the language immersion method – during everyday activities, sports and art classes, and similar occasions. A vital aspect of the evaluation of the program is researching its impact on the young people; however, the opinions of the volunteers regarding their...
-
Identification of synergistic and antagonistic actions of environmental pollutants: Bisphenols A, S and F in the presence of DEP, DBP, BADGE and BADGE·2HCl in three component mixtures
PublikacjaEcosystems are facing increased pressure due to the emission of many classes of emerging contaminants. However, very little is known about the interactions of these pollutants, such as bisphenols (BPs), plasticizers or pharmaceuticals. By employing bioluminescent bacteria (Microtox assay), we were able to define interactions between selected emerging pollutants (namely BPA, BPS, BPF, BADGE, BADGE·2HCl, DEP, DBP) in ternary mixtures, at...
-
Time-domain description of point-source acoustic wavefields as a useful approach in ultrasonic techniques
PublikacjaIn traditional acoustics, field problems are usually treated in the frequency domain, broadband fields being reduced to superposition of harmonic spectrum components. However, this approach is inherently acausal and it is known that in case of arbitrary signals, the distribution-based, time-domain description can be more effective. The present paper is an attempt to expand the time-domain linear systems formalism onto space problems...
-
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
PublikacjaIn this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...
-
Double bondage in graphs
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...
-
On the size of identifying codes in triangle-free graphs
PublikacjaIn an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...
-
Analysis of the impact of AOP on source code quality: Paradox of aspect-oriented separation of concerns
PublikacjaAlmost four decades ago, Parnas advocated modularity for the sake of changeability, independent development, and comprehensibility. The recipe for modularization is to define a clean interface, hide an implementation detail, keep low coupling and high cohesion. Although modules have taken many forms over the years from functions and procedures to classes, no form has been capable of expressing so-called crosscutting concerns in...