Journal of Applied Computer Science
Stały URI zbioruhttp://hdl.handle.net/11652/3824
Journal of Applied Computer Science publishes original papers concerned with theory and practice of computer science and innovative computer technology as well as their application in engineering, biomedicine, ecology, socioeconomics and education.
Przeglądaj
Pozycja Interval Model of Dynamics of Dispersion of Harmful Pollution from Vehicular Traffic(Wydawnictwo Politechniki Łódzkiej, 2016) Dyvak, Mykola; Stakhiv, Petro; Pukas, Andriy; Voytyuk, Iryna; Porplytsya, Natalia; Maslyiak, YuriiThe method of structure identification of interval discrete dynamic models, based on principles of the bee colonies functioning is represented. An example of the implementation of method for modeling of air pollution by harmful vehicle emissions is considered.Pozycja Integrity Rules for Multiargument Relationships in Possibilistic Databases(Wydawnictwo Politechniki Łódzkiej, 2016) Myszkorowski, KrzysztofThe paper contains an analysis of multiargument relationships in possibilistic databases. A multiargument relationship may be formally presented using the relational notation R(X1, X2,...,Xn), where R is the name of the relationship and attributes Xi denote keys of entity sets which participate in it. The dependencies between all n attributes describe the integrity constraints and must not be infringed. They constitute a restriction for relationships of fewer attributes. In the paper it is considered a possible coexistence of associations between k < n attributes of the n-ary relationship. The analysis is carried out using the theory of fuzzy functional dependencies. The notion of functional dependency has been appropriately extended according to the representation of data.Pozycja Medical-Grade Network Security - Air-Gap Isolation and PossibleWeak Points(Wydawnictwo Politechniki Łódzkiej, 2016) Arendt, DanielModern medical imaging devices (MID) are usually connected to the network. Transfer of digital data to the Picture Archiving and Communication Systems (PACS) and then to Hospital Information Systems (HIS) without the internal network is not technically nor economically reasonable. It is estimated that by the interconnection of medical devices and providing remote access to them, health care costs will be cut by $ 63 billion till 2030. Sharing MID’s over public network by remote access can dramatically cut costs of medical care but creates risks well known from oce networks. The firewall/IDS and the air gap isolation techniques are there applicable. Medical society ask for advice what to choose or what are the threats of network operation of medical devices. Here will be given description of known attacks on the security of air gapped networks and cases of disorder operation of systems and ecient data transfer from networks traditionally known as invulnerable and impermeable. Analyzing the presented cases of successful attacks allows to identify weak points of the air-gap mechanism. In conclusion opinion how to straighten security of isolated networks will be given, on the other hand an eective IDS has advantage and many strong points.Pozycja Geometric Transformations Embedded into Convolutional Neural Networks(Wydawnictwo Politechniki Łódzkiej, 2016) Tarasiuk, Paweł; Pryczek, MichałThis paper presents a novel extension to convolutional neural networks. While CNNs are known for invariance to object translation, changes to the other parameters could make the image recognition tasks diffcult – that includes rotations and scaling. Some improvement in this area could be achieved with embedded geometric transformations used inside the CNNs. In order to provide a practical solution, which allows fast propagation and learning of the modified networks, “fast geometric transformations” are introduced.Pozycja Computational Complexity and Numerical Optimization of Adaptive Kuwahara Filter(Wydawnictwo Politechniki Łódzkiej, 2017) Bartyzel, KrzysztofAdaprive Kuwahara filter produces very interesting results and significantly improves the efficiency and performance of the original algorithm in the context of noise reduction without blurring the edges. This document contains the experimental and theoretical comparison of the computational complexity of the modified algorithm and the consideration of optimization methods.Pozycja Outlier Phenomenon in Data Interpretation for One Waves Scattering Problem(Wydawnictwo Politechniki Łódzkiej, 2017) Emets, Volodymyr F.; Rogowski, JanAn outlier is an observation (or measurement) that is different with respect to the other values contained in a given data set. Outliers can occur due to several causes. The measurement can be incorrectly observed, recorded or processed or otherwise is correctly measured but represents a rare event. In this paper it is shown that observed data can contain values that differ from expected ones and can be interpreted as an outlier, but in fact are caused by a specific physical phenomenon.Pozycja Resolving Classical Concurrency Problems Using Outlier Detection(Wydawnictwo Politechniki Łódzkiej, 2017) Smoliński, MateuszIn this paper outlier detection is used to determine anomaly between tasks to prevent occurrence of resource conflicts in prepared schedule. Determined conflictless schedule bases on controlling access of tasks to groups of shared resources. Proposed approach allows to prepare conflictless schedule of efficient parallel task processing without resource conflicts and is dedicated to environments of task processing with high contention of shared resources. In this paper the outlier detection is used to resolve two classical concurrency problems: readers and writers and dining philosophers. In opposition to other known solutions of concurrency problems, proposed approach can be applied to solve different problems and do not require to use additional mechanisms of task synchronization. The universality of proposed approach allows to prepare conflictless schedule even in environments, where classical concurrency problems will be significantly expanded and complicated.Pozycja Multidimensional Neo-Fuzzy-Neuron for Solving Medical Diagnostics Tasks in Online-Mode(Wydawnictwo Politechniki Łódzkiej, 2017) Mahmoud, Samer Mohamed Kanaan; Perova, Iryna; Pliss, IrynaIn this paper neuro-fuzzy approach for medical data processing is considered. Special capacities for methods and systems of Computational Intelligence were introduced for Medical Data Mining tasks, like transparency and interpretability of obtained results, ability to classify nonconvex and overlapped classes that correspond to various diagnoses, necessity to process data in online mode and so on. Architecture based on the multidimensional neo-fuzzy-neuron was designed for situation of many diagnoses. For multidimensional neo-fuzzy-neuron adaptive learning algorithms that are a modification of Widrow-Hoff algorithm were introduced. This system was approbate on nervous system diseases data set from University of California Irvine (UCI) Repository and show high level of classification results.Pozycja Digitizing of Analogue Data-Charts from Thermohygrographs(Wydawnictwo Politechniki Łódzkiej, 2017) Radon, JanA thermo-hygrograph is a chart recorder that measures and records both temperature and humidity in an analogue form. Converting the results into digital form is necessary to enhance evaluation of measurements archived on paper charts. Coordinate system of the charts is different than common Cartesian rectangular axis. Temperature and relative humidity axis are curved according to recorder pen holder ray. Different chart types, depending on particular thermohygrograph model, were used so far. In every case, however, the axis grid depicted in the background is geometrically precisely defined. So pattern recognition techniques could be used to find its location automatically. Temperature and relative humidity patterns can be retrieved automatically assuming that the color group of plotted lines is different than the background including the grid. Due to storing conditions, manual descriptions, discoloration and other factors, the plotted pattern cannot be unambiguously identified. Many randomly scattered pixels are interpreted as being part of a plotted line. Among additional measures, like excluding particular areas from analysis, manually removing and including points, a vector analysis of retrieved courses makes digitizing more effective.Pozycja Generalized Structure of the Algorithm for Automated Detection of Non Relevant and Wrong Information on Web Resources(Wydawnictwo Politechniki Łódzkiej, 2017) Dyvak, Mykola; Kovbasistyi, Andrii; Stakhiv, Petro; Lipiński, PiotrIn this article the algorithm for automated detection of non-relevant or wrong information on websites is introduced. The algorithm extracts the semantic information from the webpage using third party software and compares the semantic information with the reliable resources. Reliable information is identified by the means of majority voting or extracted from reliable databases.Pozycja Outlier Mining Using the DBSCAN Algorithm(Wydawnictwo Politechniki Łódzkiej, 2017) Nowak-Brzezińska, Agnieszka; Xięski, TomaszThis paper introduces an approach to outlier mining in the context of a real-world dataset containing information about the mobile transceivers operation. The goal of the paper is to analyze the influence of using different similarity measures and multiple values of input parameters for the densitybased clustering algorithm on the number of outliers discovered during the mining process. The results of the experiments are presented in section 4 in order to discuss the significance of the analyzed parameters.Pozycja Outlier Mining in Rule-Based Knowledge Bases(Wydawnictwo Politechniki Łódzkiej, 2017) Nowak-Brzezińska, AgnieszkaThis paper introduces an approach to outlier mining in the context of rule-based knowledge bases. Rules in knowledge bases are a very specific type of data representation and it is necessary to analyze them carefully, especially when they differ from each other. The goal of the paper is to analyze the influence of using different similarity measures and clustering methods on the number of outliers discovered during the mining process. The results of the experiments are presented in Section 6 in order to discuss the significance of the analyzed parameters.Pozycja Outlier Detection Using the Multiobjective Genetic Algorithm(Wydawnictwo Politechniki Łódzkiej, 2017) Duraj, Agnieszka; Chomątek, ŁukaszSince almost all datasets may be affected by the presence of anomalies which may skew the interpretation of data, outlier detection has become a crucial element of many datamining applications. Despite the fact that several methods of outlier detection have been proposed in the literature, there is still a need to look for new, more effective ones. This paper presents a new approach to outlier identification based on genetic algorithms. The study evaluates the performance and examines the features of several multiobjective genetic algorithms.Pozycja Simulation of Quantum Resonance in the Quantum Register(Wydawnictwo Politechniki Łódzkiej, 2018) Ostrowski, MarcinIn this paper, we examine whether a quantum computer can efficiently simulate resonant interaction between a pair of two-level quantum systems. We present an algorithm for simulating time evolution of such a system, implemented on standard two-input gates. We study the influence of accuracy of gates and decoherence on the quality of results.Pozycja Dedicated Type-2 Fuzzy Logic Systems: A Novel Approach to DeNOx Filtration Systems(Wydawnictwo Politechniki Łódzkiej, 2018) Niewiadomski, Adam; Kacprowicz, MarcinThe paper presents some novel research on applications of Type-2 Fuzzy Logic Systems to support the Selective Catalytic Reduction process (SCR). The aim of the research is to design and test higher order fuzzy logic systems and their genuine modifications to manage data in DeNOx systems responsible for controlling emission of nitrogen oxides (NO, NO2). Since in real applications, it is still performed under the supervision of a human expert, the scope is to replace, at least partially, his/her participation with dedicated type-2 fuzzy logic systems. As the result, it is shown that the proposed systems with new means of learning fuzzy IF-THEN rules allow us to compute parameters much closer to those determined by experts, even in a comparison to some earlier approaches based on traditional fuzzy logic.Pozycja Normalization Effects in Matching Pursuit Algorithm with Gabor Dictionaries(Wydawnictwo Politechniki Łódzkiej, 2018) Różański, Piotr T.The matching pursuit (MP) algorithm is a greedy method for signal decomposition used in video coding, data compression, and, particularly, analysis of EEG signals in various paradigms, including P300 and ER(D)S (motor imagery). An important issue for MP implementation is a correct treatment of normalization of atoms (functions) used in computations. Failing to account for normalization-related effects may affect both the numerical stability and the reliability of the algorithm. This paper describes these normalization effects, evaluates their impact on the algorithm’s performance, and describe the proper approach together with a ready-to-use implementation, available under a General Public Licence (GPL). Several performance optimizations used as a part of this implementation are also described.Pozycja Basic Mechanisms of Brownian String Analysis and Manipulation(Wydawnictwo Politechniki Łódzkiej, 2018) Bartyzel, KrzysztofThe paper presents the possibilities of using Brownian Strings as an example of Active Contour Model for linguistic description of objects in an image. Having only a notation composed of a combination of characters RULD we can calculate the statistics of the object, such as its surface area, width and height, centroid, and even image moments. The part is thoroughly discussed. The requirements for a combination of characters RULD to be called a Brownian contour are also presented and analysed carefully.Pozycja Robust Two-View Reconstruction Procedure for Geometrical Model Retrieving(Wydawnictwo Politechniki Łódzkiej, 2018) Walczak, Jakub; Wojciechowski, AdamIn this paper we present the enhancement of the standard two-view reconstruction procedure. An ordinary approach assumes determination of points’ correspondences followed by projection matrix estimation, to finally refine results with bundle adjustment taking as a cost function reprojection error. Our contribution is realized in two manners: introducing an additional step of outliers rejection, changing cost function of bundle adjustment process to Relative Reprojection Error (єᴿ) and applying central difference as a method for Jacobian matrix approximation. Tests revealed gain in average єᴿ with lower variance, for confidence level of 0.95. Besides accuracy improvement, the suggested modifications supply the final result in the time virtually independent on initial object’s complexity and, in most cases, shorter than the standard approach.Pozycja Heterogeneous Fog Generated with the E ect of Light Scattering and Blur(Wydawnictwo Politechniki Łódzkiej, 2018) Gawron, Michał; Boryczka, UrszulaThe development of computer graphics forces new requirements on the developers, which will make the virtual world more similar to the real world. One of these elements is the simulation of fog. Common fog algorithms mix the color of the scene with the color of the fog over a certain distance. However, one feature of the naturally foggy scenery is ignored. With the distance and density of the fog, the observed scenery or individual objects become more blurred. In this paper we will present our implementation of the distance fog in the Unreal Engine 4, including the effect of blurring the foggy areas, simulating of light scattering and variations in fog density using noise.Pozycja Virtual Reality in Investigation of Human Navigational Skills(Wydawnictwo Politechniki Łódzkiej, 2018) Nowak, PrzemysławIn recent years, virtual reality has been successfully employed in numerous studies concerning human navigational skills. This mini-survey reviews several of them, presenting their methodology and main findings, as well as discusses advantages and disadvantages of various types of virtual reality systems that have been adopted. Moreover, it provides an overview of navigational behaviors and a brief characterization of the possible cognitive processes that underlie them.