Katedra Architektury Systemów Komputerowych - Jednostki Administracyjne - MOST Wiedzy

Wyszukiwarka

Katedra Architektury Systemów Komputerowych

Filtry

wszystkich: 841

  • Kategoria
  • Rok
  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Katalog Publikacji

Rok 2011
  • 0-step K-means for clustering Wikipedia search results
    Publikacja

    - Rok 2011

    This article describes an improvement for K-means algorithm and its application in the form of a system that clusters search results retrieved from Wikipedia. The proposed algorithm eliminates K-means isadvantages and allows one to create a cluster hierarchy. The main contributions of this paper include the ollowing: (1) The concept of an improved K-means algorithm and its application for hierarchical clustering....

  • A New Model for context aware applications analysis and design
    Publikacja

    W artykule zostały opisane aplikacje kontekstowe, które działają w przestrzeniach inteligentnych, oraz zostały przeanalizowane ich właściwości. Na podstawie analizy zaproponowano nowe podejście do ich modelowania które zapewnia oddzielenie logiki aplikacji w zakresie adaptacji (do zmian środowiska) od jej realizacji. Zostały wykorzystane MVC i modele zmian stanu. Zaproponowano ilościową miarę poziomu kontekstowości a także sposób...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A proposition for integrating elements of game universe by means of behavioral trees

    Modern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...

  • Agile Methodology for Designing and Improving EnterpriseScenarios
    Publikacja

    - Rok 2011

    Przedstawiona została iteracyjna metoda projektowania i ulepszania scenariuszy biznesowych. Zaproponowana metoda definiuje etapy wytwarzania scenariuszy, zestaw metryki oceny jakości scenariuszy oraz zestaw procedur usprawnieniowych, które pozwalają zwiększyć wydajność scenariuszy, ich jakość oraz użyteczność. Proste studium przypadku zostało rozważane i jego ocena jakościowo-wydajnościowa omówiona. Jako przykład realizacji metody...

Rok 2012
Rok 2013
  • A Concept of Modeling and Optimization of Applications in Large Scale Systems
    Publikacja

    - Rok 2013

    The chapter presents the idea that includes modeling and subsequent optimization of application execution on large scale parallel and distributed systems. The model considers performance, reliability and power consumption. It should allow easy modeling of various classes of applications while reflecting key parameters of both the applications and two classes of target systems: clusters and volunteer based systems. The chapter presents...

  • A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints
    Publikacja

    The paper proposes a model, design, and implementation of an efficient multithreaded engine for execution of distributed service-based workflows with data streaming defined on a per task basis. The implementation takes into account capacity constraints of the servers on which services are installed and the workflow data footprint if needed. Furthermore, it also considers storage space of the workflow execution engine and its cost....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A ROLE PLAYING GAME NAME GENERATOR LEARNING ITS CREATIVITY FROM ARKADIA MUD PLAYERS
    Publikacja

    - Rok 2013

    The paper proposes an approach to creative generation of new names for the purposes of Role Playing Games in fantasy realms. The generator based on an existing database of na mes is able to propose a set of new names with regard to demanded attributes, such as: length of the name, sex and race of the character, a given p hrase as the origin for the generated name as well as subjective evaluations from former users. The software...

  • Adjusting Game Difficulty by Recreating Behavioral Trees of Human Player Actions
    Publikacja

    - Rok 2013

    This paper presents a proposition of a method for adjusting game difficulty to the current level of player's skills in one-on-one games. The method is based on recognition of human player's actions and recording of those actions in the form of behavioral trees. Such trees are later used to drive behaviors of computer-controlled opponents so that human player has beat hit own strategy and improve on it, to win subsequent games....

  • Algorytmy rozpoznawania zmian chorobowych
    Publikacja

    W pracy przedstawiono, opisano i porównano pod wzgledem skutecznosci wybrane algorytmy rozpoznawania chorób w filmach endoskopowych, zaimplementowane w ramach aplikacji Wspomagania Badan Medycznych. Dokonano oceny algorytmów w zaawansowanym srodowisku testowym, zbudowanym w oparciu o duzy zbiór obrazów z filmów endoskopowych, pozyskanych we współpracy z Gdanskim Uniwersytetem Medycznym. Jednoczesnie zaprezentowano sposób optymalizacji...

  • An Evaluation Engine for Dynamic Ranking of Cloud Providers
    Publikacja

    - Informatica - Rok 2013

    The paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...

    Pełny tekst do pobrania w portalu

  • An Overview of Image Analysis Techniques in Endoscopic Bleeding Detection

    Authors review the existing bleeding detection methods focusing their attention on the image processing techniques utilised in the algorithms. In the article, 18 methods were analysed and their functional components were identified. The authors proposed six different groups, to which algorithms’ components were assigned: colour techniques, reflecting features of pixels as individual values, texture techniques, considering spatial...

    Pełny tekst do pobrania w serwisie zewnętrznym

Rok 2017
  • A distributed system for conducting chess games in parallel

    This paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...

    Pełny tekst do pobrania w portalu

  • An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
    Publikacja

    - SENSORS - Rok 2017

    The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...

    Pełny tekst do pobrania w portalu

Rok 2016
  • A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPI Applications
    Publikacja

    - Rok 2016

    The paper presents a fail-safe NVRAM based mechanism for creation and recovery of data copies during parallel MPI application runtime. Specifically, we target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
    Publikacja

    - Annals of Computer Science and Information Systems - Rok 2016

    While many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...

    Pełny tekst do pobrania w portalu

  • Adaption of Open Science Paradigm at Gdańsk University of Technology
    Publikacja

    - Rok 2016

    The paper describes the basic principles standing behind Open Access and will try to dispel the doubts behind them. Further the solution adapted by the Gdańsk University of Technology is presented. Later on the systems that the University uses and means of their integration into a complex Open Science platform are described. Finally the procedures needed to publish a document in the repository alongside the University's policy...

    Pełny tekst do pobrania w portalu

  • Alternative Modeling of Volunteer Based Systems
    Publikacja

    - Rok 2016

    The canonical approach to model a flow of a voluntary based computing, as presented in Chapter 7 may tax the capacity of the simulator, especially when a more complex model of Voluntary Computing, proposed in [1], is used which would imply that, for typical heterogeneous groups of volunteers, several thousands of threads would have to be run inside the simulator, to mimic closely the behaviour of every volunteer. This chapter presents...

Rok 2023
Rok 2014
Rok 2009
  • A JEE-based modelling and execution environment for workflow applications with just-in-time service selection
    Publikacja

    - Rok 2009

    Artykuł prezentuje model scenariusza z dynamicznym wyborem usług do wykonania zadań scenariusza. Adekwatność rozwiązania została zaprezentowana dla zastosowań naukowych i biznesowych w warunkach kiedy dostępność usług się zmienia i usługi powinny być wybierane w trakcie działania scenariusza a nie przed jego rozpoczęciem. Pokazano, że dla scenariusza naukowego z powtarzalnymi symulacjami, algorytm dobiera usługi, aby zminimalizować...

  • A video monitoring system using ontology-driven identification of threats
    Publikacja

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Pełny tekst do pobrania w serwisie zewnętrznym

Rok 2015
Rok 2008
  • A model of an Ontology Oriented Threat Detection System (OOTDS)
    Publikacja

    Artykuł omawia projekt zorientowanego na ontologię systemu wykrywania zagrożeń (OOTDS) dla środowiska opisywalnego przez ontologię Bayesowską pierwszego rzędu wyrażoną w języku PR-OWL. Zakłada się, że środowisko monitorowane jest przez zbiór czujników dostarczających nieustannie systemowi OOTDS zdarzenia odzwierciedlające zmiany środowiska, wyrażone w specyficzny dla czujników sposób. Dedykowane moduły obsługi zdarzeń konwertują...

Rok 2018
  • A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache

    The paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...

    Pełny tekst do pobrania w portalu

  • Adopting Collaborative Games into Agile Software Development
    Publikacja

    - Rok 2018

    Although the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...

    Pełny tekst do pobrania w serwisie zewnętrznym

Rok 2020
  • Abdominal Aortic Aneurysm segmentation from contrast-enhanced computed tomography angiography using deep convolutional networks
    Publikacja
    • T. Dziubich
    • P. Białas
    • Ł. Znaniecki
    • J. Halman
    • J. Brzeziński

    - Rok 2020

    One of the most common imaging methods for diagnosing an abdominal aortic aneurysm, and an endoleak detection is computed tomography angiography. In this paper, we address the problem of aorta and thrombus semantic segmentation, what is a mandatory step to estimate aortic aneurysm diameter. Three end-to-end convolutional neural networks were trained and evaluated. Finally, we proposed an ensemble of deep neural networks with underlying...

    Pełny tekst do pobrania w serwisie zewnętrznym

Rok 2022
Rok 2006
  • Administrowanie systemami internetowymi
    Publikacja

    - Rok 2006

    Przedstawiono problematykę administrowania systemami internetowymi. Omówiono zasady konfguracji połączeń, integracji oraz konfguracji serwisów internetowych. Ponadto praca przedstawia zasady uwierzy-telniania użytkowników w rozproszonym systemach z wykorzystaniem mechanizmów usług katalogowych takich jak LDAP. Uwzględniono również problematykę bezpieczeństwa systemów internetowych ze szczególnym zwróceniem uwagi na najczęstsze...

Rok 2019
  • Advances in Architectures, Big Data, and Machine Learning Techniques for Complex Internet of Things Systems
    Publikacja

    - COMPLEXITY - Rok 2019

    Te feld of Big Data is rapidly developing with a lot of ongoing research, which will likely continue to expand in the future. A crucial part of this is Knowledge Discovery from Data (KDD), also known as the Knowledge Discovery Process (KDP). Tis process is a very complex procedure, and for that reason it is essential to divide it into several steps (Figure 1). Some authors use fve steps to describe this procedure, whereas others...

    Pełny tekst do pobrania w portalu

  • An Analysis of Neural Word Representations for Wikipedia Articles Classification
    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2019

    One of the current popular methods of generating word representations is an approach based on the analysis of large document collections with neural networks. It creates so-called word-embeddings that attempt to learn relationships between words and encode this information in the form of a low-dimensional vector. The goal of this paper is to examine the differences between the most popular embedding models and the typical bag-of-words...

    Pełny tekst do pobrania w serwisie zewnętrznym

Rok 2024
  • An intelligent cellular automaton scheme for modelling forest fires
    Publikacja

    - Ecological Informatics - Rok 2024

    Forest fires have devastating consequences for the environment, the economy and human lives. Understanding their dynamics is therefore crucial for planning the resources allocated to combat them effectively. In a world where the incidence of such phenomena is increasing every year, the demand for efficient and accurate computational models is becoming increasingly necessary. In this study, we perform a revision of an initial proposal...

    Pełny tekst do pobrania w portalu

Rok 2010
  • Analiza bezpieczeństwa scenariuszy usług
    Publikacja

    - Rok 2010

    Przedstawiono krótki opis architektury przetwarzania skierowanego na usługi. Omówiono problemy zabezpieczania na poziomie komunikujących sie komputerów, wymiany komunikatów SOAP oraz realizacji złożonych, interaktywnych scenariuszy Web Services. Porównano standardy bezpieczeństwa dotyczące Web Services.

Rok 2007