Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The aim of this article is to describe the design, implementation and evaluation of the educational application to support learning of data mining algorithms. The role of the application is to help students to better understand the algorithms such as Naive Bayes classifier, decision trees and association rules. The application also includes a test area that allows students to generate and solve different...
This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering...
This paper describes the development of a specialized application for voice command recognition for the Jaguar V4 robot in conjunction with the Starkville, MS, USA Special Weapons and Tactics (SWAT) team during training. This training took place at The Center for Advanced Vehicular Systems (CAVS), which provides a specialized environment for police SWAT training. This reconfigurable space, setup during...
The article performs a comparative study between the image compression technique Local Binary Compressed format (LBC) proposed by the authors [11] and the standard image compression techniques used today (BMP, JPEG, PNG and GIF). The study is carried out for large medical images that need to be stored for longer periods of time. In the study, the most common types of medical images used are: X-rays...
As the concept of the Internet of Things (IoT) permeates the industry and our lives it becomes more and more advantageous to use its emerging services and capabilities. In this paper we explore the possibility of combining the data and services provided by the emerging IoT with remotely controlled robots using a concept of the so-called Intelligent Space (IS). We also provide an overview of infrastructure...
During the last decade many information systems started applying various biometric identification modules. This type of identification is secure and provides a real possibility to protect a system from an unapproved access. The paper presents a newly developed biometric identification approach that is suitable for many biometric signals. This work describes an evaluation of the approach on low-frequency...
A significant increase in wireless communication has been observed in the last decade. Traditional fixed spectrum allocation presents limitations to better spectrum utilization. Real-time secondary spectrum market seems to be appropriate approach to eliminating the problem of spectrum scarcity. Economic aspects of the new approach are still only partially investigated. Besides the conventional wholesale...
In order to provide high security level, different identification and verification methods are being used in information systems. A development of the new highly accurate methods are of great interest nowadays. Those methods that analyze biometric signals are becoming more widespread as biometric data can provide hardly forged information about a person. This paper presents the developed biometric...
In the past period, great efforts have been made to develop the methods for the detection of human beings based on a monitoring their respiratory motion. For that purpose, ultra-wideband sensors (radars) operating in the frequency band DC-5GHz can be used with advantage. The basic principle of respiratory motion detection consists in the identification of sensor signal components possessing a significant...
In the previous paper [1], we have described specification of the domain-specific declarative language for natural language processing and information extraction tasks. This paper extends the previous specification of the language with the extensions, which allow to specify sequences of words and corresponding meta-data annotations in the vocabulary. The paper describes syntax extensions and internal...
Medical diagnostic is a complex process consisting of many input variables, which the general practitioner (GP) or specialist should take into account before confirm the expected diagnosis. In the case of electronic records, they have an opportunity to support this process within simple understandable results of the correctly applied suitable methods from machine learning or statistics. We used a...
The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also...
The paper describes Computer Aided Software Engineering (CASE) tool, that supports programming of the experimental multi-core tile based System-on-a-Chip (SoC). SoC comprises cores, which are based on the data flow computation control principle. Proposed CASE tool allows creation of the program code in graphical form using Data Flow Graph (DFG) or in text representation using assembly language or...
Deep neural networks are intensively researched field of artificial intelligence. Big companies like Google, Microsoft, Baidu or Facebook are supporting research and development in this field. The recent victory over human player in the game of Go points to a huge potential of this approach. Machine learning approaches based on deep learning techniques bring significant gain over existing methods...
Reinforcement Learning (RL) methods became popular decades ago and still maintain to be one of the mainstream topics in computational intelligence. Countless different RL methods and variants can be found in the literature, each one having its own advantages and disadvantages in a specific application domain. Representation of the revealed knowledge can be realized in several ways depending on the...
The features of linear predicate logic (based on propositional linear logic enriched by the first order predicate logic principles) are implemented in logic programming language called Vorvan. Subsequently, the time-space extension of linear logic — Ludics theory, is applied to selected clause of given language.
Modeling the tumor growth under angiogenic inhibition is an important step towards designing tumor treatment therapies based on mathematical tools. Our goal is to create a model for tumor growth that describes the underlying physiological processes adequately while being as simple as possible. We propose a second-order model containing linear terms and one bilinear term modeling the dynamics of tumor...
In this paper we present an engineering proposal for a data processing system based at the Center for Intelligent Technologies. The proposed system forms the Intelligent Space using the collection of sensors including IP cameras, Kinect sensors and other. The proposed data processing infrastructure is based on the Fog Computing paradigm established by Cisco. The main reason for utilization of this...
This paper introduces a fuzzy knowledgebase reduction method with applying a clustering technique in the Fuzzy Rule Interpolation-based Q-learning (FRIQ-learning). The FRIQ-learning method stars with an empty knowledgebase, which is a fuzzy rule-base filled only with rules defining the boundaries of the problem space. Then the system builds the rule-base incrementally episode by episode, based on...
The multitude of events that rapidly take place on the political scene of the whole world have fundamental economic consequences in the development of all countries. Our study combines financial elements which may influence the economic relations that currently exist between the countries of the world and the ones belonging to the European Union in particular. The processing of the high quantity of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.