Filtry
wszystkich: 29961
-
Katalog
- Publikacje 5898 wyników po odfiltrowaniu
- Czasopisma 713 wyników po odfiltrowaniu
- Konferencje 173 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 238 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 24 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 165 wyników po odfiltrowaniu
- Wydarzenia 25 wyników po odfiltrowaniu
- Dane Badawcze 22720 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
NOTES on INTUITIONISTIC FUZZY SETS
Czasopisma -
Automatic Singing Voice Recognition EmployingNeural Networks and Rough Sets
PublikacjaCelem badań jest automatyczne rozpoznawanie głosów śpiewaczych w kategorii rodzaju i jakości technicznej śpiewu. W artykule opisano stworzoną bazę danych głosów, która zawiera próbki głosu śpiewaków profesjonalnych i amatorskich. W dalszej części opisano parametry zdefiniowane w oparciu o zjawiska biomechaniczne w narządzie głosu podczas śpiewania. W oparciu o stworzone macierze parametrów wytrenowano i porównano automatyczne klasyfikatory...
-
Numerically efficient algorithm for compact microwave device optimization with flexible sensitivity updating scheme
PublikacjaAn efficient trust-region algorithm with flexible sensitivity updating management scheme for electromagnetic (EM)-driven design optimization of compact microwave components is proposed. During the optimization process, updating of selected columns of the circuit response Jacobian is performed using a rank-one Broyden formula (BF) replacing finite differentiation (FD). The FD update is omitted for directions sufficiently well aligned...
-
Fast and reliable knowledge-based design closure of antennas by means of iterative prediction-correction scheme
PublikacjaA novel framework for expedited antenna optimization with an iterative prediction-correction scheme is proposed. The methodology is comprehensively validated using three real-world antenna structures: narrow-band, dual-band and wideband, optimized under various design scenarios. The keystone of the proposed approach is to reuse designs pre-optimized for various sets of performance specifications and to encode them into metamodels...
-
Modelling of the Polish Electricity Generation Subsystem in MARKAL Program with Emphasis on the EU Emissions Trading Scheme
PublikacjaThis paper addresses issues related to greenhouse gas emissions in the European Union and measures to reduce them, in particular the European Emissions Trading Scheme (EU ETS). A model of the Polish electricity generation subsystem, taking into account EU ETS mechanisms, has been developed using the MARKAL optimization package. Data collected on the basis of available projects, regulations and statistics were entered into the model....
-
Evolutionary Sets Of Safe Ship Trajectories: A New Approach To Collision Avoidance
PublikacjaThe paper introduces a new method of solving multi-ship encounter situations for both open waters and restricted water regions. The method, called evolutionary sets of safe trajectories combines some of the assumptions of game theory with evolutionary programming and aims to find optimal set of safe trajectories of all ships involved in an encounter situation. In a two-ship encounter situation it enables the operator of an on-board...
-
Active Learning Based on Crowdsourced Data
PublikacjaThe paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublikacjaW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Analysis of Learning Outcomes in Medical Education with the Use of Fuzzy Logic
PublikacjaThe national curricula of the EU member states are structured around learning outcomes, selected according to Bloom’s Taxonomy. The authors of this paper claim that using Bloom’s Taxonomy to phrase learning outcomes in medical education in terms of students’ achievements is difficult and unclear. This paper presents an efficient method of assessing course learning outcomes using Fuzzy Logic.
-
Data Structures (Doctoral Studies)
Kursy OnlineThe course covers basic data structures and computer algorithms used in information tehcnology applications.
-
Fuzzy Sets in the GIS Environment in the Location of Objects on the Surface of Water Bodies
PublikacjaThe issue presented here focuses on concerns about the localization of the object on water surface. The article shows how to facilitate localization process by applying mathematical solutions characterized by simplicity, rapid action and delivering credible results. The paper shows the results of background experiments, which enabled to collect technical parameters needed for conducting simulation testing. The research has been...
-
Assessment of Subsoil Subsidence Under the Railway Surface with the Use of Fuzzy Sets
PublikacjaThe cause of the subsidence of the railway track is the subsidence of the track bed itself and it is often related to the subsidence of the subsoil. Such settlement leads to: uneven longitudinal railways and track twist. These phenomena have a negative impact on the comfort and safety of driving, and in extreme cases lead to a train derailment. It has been shown that the magnitude of these settlements is determined by many parameters...
-
Data Mining Path
Kursy OnlineWithin this path, various issues regarding data mining and their practical application in various systems are discussed. 4 semestr specjalności ISI i ZAD
-
S-scheme heterojunction Bi2O3-ZnO/Bentonite clay composite with enhanced photocatalytic performance
PublikacjaThe industrial waste water is always a bottleneck problem in the modern civilization of the present era. In a quest to develop effective methods for the elimination of lethal pollutants from the waste water and water remediation, this work is focused on the development of a rapid and proficient approach for preparing supported binary metal oxide catalyst for photocatalytic advance oxidation process used in waste water treatment...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Data Warehouses DE 2022/2023
Kursy OnlineThe aim of the course is to familiarize students with the development process of data warehouses for BI systems. The course is prepared for students of Data Engineering.
-
Data Warehouses DE 2023/2024
Kursy OnlineThe aim of the course is to familiarize students with the development process of data warehouses for BI systems. The course is prepared for students of Data Engineering.
-
Muon spin rotation/relaxation measurements of the noncentrosymmetric superconductorMg10Ir19B16
Publikacja -
Photophysical and theoretical studies of diphenylacetylene derivatives with restricted rotation
Publikacja -
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
High Dynamic Range Microwave Displacement and Rotation Sensors Based on the Phase of Transmission in Groove Gap Waveguide Technology
PublikacjaThis research is focused on the design and realization of displacement sensors in gap waveguide technology. It is shown that with a small but fundamental change in the structure of a conventional gap waveguide, a linear displacement can be sensed. To this end, a unique feature of gap waveguides, i.e. the fact that no electrical connection between the top and bottom parts of the gap waveguide is required, is used. It is further shown...
-
Algorithms and Data Structures 2022
Kursy OnlineWETI, DS, Algorithms and Data Structures
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Scientific Data
Czasopisma -
Data Warehouses 2022/2023
Kursy OnlineThe aim of the course is to familiarize students with the development process of data warehouses for BI systems. The course is prepared for students of Informatics - 5th semester.
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
Kursy Online -
Harmony Search for Data Mining with Big Data
PublikacjaIn this paper, some harmony search algorithms have been proposed for data mining with big data. Three areas of big data processing have been studied to apply new metaheuristics. The first problem is related to MapReduce architecture that can be supported by a team of harmony search agents in grid infrastructure. The second dilemma involves development of harmony search in preprocessing of data series before data mining. Moreover,...
-
Developing sets of experience knowledge structure
PublikacjaW pracy omówiono zasady tworzenia opisu zwanego zbiorem doświadczeń tworzonego w celu reprezentacji wiedzy
-
On proper (1,2)‐dominating sets in graphs
PublikacjaIn 2008, Hedetniemi et al. introduced the concept of (1,)-domination and obtained some interesting results for (1,2) -domination. Obviously every (1,1) -dominating set of a graph (known as 2-dominating set) is (1,2) -dominating; to distinguish these concepts, we define a proper (1,2) -dominating set of a graph as follows: a subset is a proper (1,2) -dominating set of a graph if is (1,2) -dominating and it is not a (1,1) -dominating...
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublikacjaIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
Medical-Grade PCL Based Polyurethane System for FDM 3D Printing—Characterization and Fabrication
PublikacjaThe widespread use of three-dimensional (3D) printing technologies in medicine has contributed to the increased demand for 3D printing materials. In addition, new printing materials that are appearing in the industry do not provide a detailed material characterization. In this paper, we present the synthesis and characterization of polycaprolactone (PCL) based medical-grade thermoplastic polyurethanes, which are suitable for forming...
-
Technical physics (Data Engineering)
Kursy OnlineField of study: Data Engineering; Subject name: Technical physics; Lecture notes and other course materials.
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Quantitative Active Dynamic Thermal IR-Imaging and Thermal Tomography in Medical Diagnostic
PublikacjaPrinciples of Active dynamic thermal (ADT) IR-imaging and Thermal Tomography are described in details. Basic medical applications of this new modality are also discussed.
-
Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids
PublikacjaSmart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....
-
The Bridge of Data Project Objectives
PublikacjaOpen Research Data (ORD) is one of the emerging trends for researchers across the globe. However, it has to be stressed that the level of implementation and awareness of ORD varies between countries. Many initiatives have been created in Polish scientific institutions to support the process of opening publications. These are mainly Open Access (OA) repositories, implementing the so-called green road of OA. However, only a few universities...
-
BRITISH MEDICAL JOURNAL
Czasopisma -
Olfactory receptor-based biosensors as potential future tools in medical diagnosis
PublikacjaThe detection of biomarkers is the future of non-invasive medical diagnosis and screening. Discovery and identification of reliable disease specific volatile organic compounds is dependent on repeatable, accurate analysis of trace level gaseous analytes mainly in breath samples. Natural variety of the olfactory systems and the compounds capable of gas molecules binding creates wide possibilities of acquisition and implementation...
-
DATA JOURNALS AND DATA PAPERS IN VARIOUS RESEARCH AREAS AND SCIENTIFIC DISCIPLINES – BIBLIOMETRIC ANALYSIS BASED ON INCITES
PublikacjaThe main aim of this work is to provide insight into a bibliometric analysis of Data Journals and Data Papers in terms of research areas, disciplines, publication year and country. In particular, we calculated many bibliometric indicators, especially: the number of publications and citations. Furthermore, this work also investigated the top 20 journals in which scientists published the largest number of Data Papers. It was found...
-
An analysis of observability and detectability for different sets of measured outputs - CSTR case study
PublikacjaA problem of proving the observability/detectability at a given measured output for non-linear biochemical systems has been addressed in this paper. A theory of indistinguishable state trajectories has been used to prove the properties of the observability or detectability of this system. It is related to taking system dynamics into consideration depending on initial conditions and the impact of inputs taking into account a given...
-
Evolutionary Sets of Safe Ship Trajectories Within Traffic Separation Schemes
PublikacjaThe paper presents the continuation of the author's research on Evolutionary Sets of Safe Ship Trajectories (ESoSST) methodology. In an earlier paper (Szlapczynski, 2011) the author described the foundations of this methodology, which used Evolutionary Algorithms (EA) to search for an optimal set of safe trajectories for all the ships involved in an encounter. The methodology was originally designed for open waters or restricted...
-
International Journal of Applied Cryptography
Czasopisma -
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
The molecular entities in linked data dataset
Publikacja -
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublikacjaThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
SYNTHESIZING MEDICAL TERMS – QUALITY AND NATURALNESS OF THE DEEP TEXT-TO-SPEECH ALGORITHM
PublikacjaThe main purpose of this study is to develop a deep text-to-speech (TTS) algorithm designated for an embedded system device. First, a critical literature review of state-of-the-art speech synthesis deep models is provided. The algorithm implementation covers both hardware and algorithmic solutions. The algorithm is designed for use with the Raspberry Pi 4 board. 80 synthesized sentences were prepared based on medical and everyday...