Journal of Applied Computer Science
Stały URI zbioruhttp://hdl.handle.net/11652/3824
Journal of Applied Computer Science publishes original papers concerned with theory and practice of computer science and innovative computer technology as well as their application in engineering, biomedicine, ecology, socioeconomics and education.
Przeglądaj
Pozycja Interval Model of Dynamics of Dispersion of Harmful Pollution from Vehicular Traffic(Wydawnictwo Politechniki Łódzkiej, 2016) Dyvak, Mykola; Stakhiv, Petro; Pukas, Andriy; Voytyuk, Iryna; Porplytsya, Natalia; Maslyiak, YuriiThe method of structure identification of interval discrete dynamic models, based on principles of the bee colonies functioning is represented. An example of the implementation of method for modeling of air pollution by harmful vehicle emissions is considered.Pozycja Geometric Transformations Embedded into Convolutional Neural Networks(Wydawnictwo Politechniki Łódzkiej, 2016) Tarasiuk, Paweł; Pryczek, MichałThis paper presents a novel extension to convolutional neural networks. While CNNs are known for invariance to object translation, changes to the other parameters could make the image recognition tasks diffcult – that includes rotations and scaling. Some improvement in this area could be achieved with embedded geometric transformations used inside the CNNs. In order to provide a practical solution, which allows fast propagation and learning of the modified networks, “fast geometric transformations” are introduced.Pozycja Medical-Grade Network Security - Air-Gap Isolation and PossibleWeak Points(Wydawnictwo Politechniki Łódzkiej, 2016) Arendt, DanielModern medical imaging devices (MID) are usually connected to the network. Transfer of digital data to the Picture Archiving and Communication Systems (PACS) and then to Hospital Information Systems (HIS) without the internal network is not technically nor economically reasonable. It is estimated that by the interconnection of medical devices and providing remote access to them, health care costs will be cut by $ 63 billion till 2030. Sharing MID’s over public network by remote access can dramatically cut costs of medical care but creates risks well known from oce networks. The firewall/IDS and the air gap isolation techniques are there applicable. Medical society ask for advice what to choose or what are the threats of network operation of medical devices. Here will be given description of known attacks on the security of air gapped networks and cases of disorder operation of systems and ecient data transfer from networks traditionally known as invulnerable and impermeable. Analyzing the presented cases of successful attacks allows to identify weak points of the air-gap mechanism. In conclusion opinion how to straighten security of isolated networks will be given, on the other hand an eective IDS has advantage and many strong points.Pozycja Integrity Rules for Multiargument Relationships in Possibilistic Databases(Wydawnictwo Politechniki Łódzkiej, 2016) Myszkorowski, KrzysztofThe paper contains an analysis of multiargument relationships in possibilistic databases. A multiargument relationship may be formally presented using the relational notation R(X1, X2,...,Xn), where R is the name of the relationship and attributes Xi denote keys of entity sets which participate in it. The dependencies between all n attributes describe the integrity constraints and must not be infringed. They constitute a restriction for relationships of fewer attributes. In the paper it is considered a possible coexistence of associations between k < n attributes of the n-ary relationship. The analysis is carried out using the theory of fuzzy functional dependencies. The notion of functional dependency has been appropriately extended according to the representation of data.Pozycja Computational Complexity and Numerical Optimization of Adaptive Kuwahara Filter(Wydawnictwo Politechniki Łódzkiej, 2017) Bartyzel, KrzysztofAdaprive Kuwahara filter produces very interesting results and significantly improves the efficiency and performance of the original algorithm in the context of noise reduction without blurring the edges. This document contains the experimental and theoretical comparison of the computational complexity of the modified algorithm and the consideration of optimization methods.Pozycja Generalized Structure of the Algorithm for Automated Detection of Non Relevant and Wrong Information on Web Resources(Wydawnictwo Politechniki Łódzkiej, 2017) Dyvak, Mykola; Kovbasistyi, Andrii; Stakhiv, Petro; Lipiński, PiotrIn this article the algorithm for automated detection of non-relevant or wrong information on websites is introduced. The algorithm extracts the semantic information from the webpage using third party software and compares the semantic information with the reliable resources. Reliable information is identified by the means of majority voting or extracted from reliable databases.Pozycja Digitizing of Analogue Data-Charts from Thermohygrographs(Wydawnictwo Politechniki Łódzkiej, 2017) Radon, JanA thermo-hygrograph is a chart recorder that measures and records both temperature and humidity in an analogue form. Converting the results into digital form is necessary to enhance evaluation of measurements archived on paper charts. Coordinate system of the charts is different than common Cartesian rectangular axis. Temperature and relative humidity axis are curved according to recorder pen holder ray. Different chart types, depending on particular thermohygrograph model, were used so far. In every case, however, the axis grid depicted in the background is geometrically precisely defined. So pattern recognition techniques could be used to find its location automatically. Temperature and relative humidity patterns can be retrieved automatically assuming that the color group of plotted lines is different than the background including the grid. Due to storing conditions, manual descriptions, discoloration and other factors, the plotted pattern cannot be unambiguously identified. Many randomly scattered pixels are interpreted as being part of a plotted line. Among additional measures, like excluding particular areas from analysis, manually removing and including points, a vector analysis of retrieved courses makes digitizing more effective.Pozycja Multidimensional Neo-Fuzzy-Neuron for Solving Medical Diagnostics Tasks in Online-Mode(Wydawnictwo Politechniki Łódzkiej, 2017) Mahmoud, Samer Mohamed Kanaan; Perova, Iryna; Pliss, IrynaIn this paper neuro-fuzzy approach for medical data processing is considered. Special capacities for methods and systems of Computational Intelligence were introduced for Medical Data Mining tasks, like transparency and interpretability of obtained results, ability to classify nonconvex and overlapped classes that correspond to various diagnoses, necessity to process data in online mode and so on. Architecture based on the multidimensional neo-fuzzy-neuron was designed for situation of many diagnoses. For multidimensional neo-fuzzy-neuron adaptive learning algorithms that are a modification of Widrow-Hoff algorithm were introduced. This system was approbate on nervous system diseases data set from University of California Irvine (UCI) Repository and show high level of classification results.Pozycja Outlier Phenomenon in Data Interpretation for One Waves Scattering Problem(Wydawnictwo Politechniki Łódzkiej, 2017) Emets, Volodymyr F.; Rogowski, JanAn outlier is an observation (or measurement) that is different with respect to the other values contained in a given data set. Outliers can occur due to several causes. The measurement can be incorrectly observed, recorded or processed or otherwise is correctly measured but represents a rare event. In this paper it is shown that observed data can contain values that differ from expected ones and can be interpreted as an outlier, but in fact are caused by a specific physical phenomenon.Pozycja Resolving Classical Concurrency Problems Using Outlier Detection(Wydawnictwo Politechniki Łódzkiej, 2017) Smoliński, MateuszIn this paper outlier detection is used to determine anomaly between tasks to prevent occurrence of resource conflicts in prepared schedule. Determined conflictless schedule bases on controlling access of tasks to groups of shared resources. Proposed approach allows to prepare conflictless schedule of efficient parallel task processing without resource conflicts and is dedicated to environments of task processing with high contention of shared resources. In this paper the outlier detection is used to resolve two classical concurrency problems: readers and writers and dining philosophers. In opposition to other known solutions of concurrency problems, proposed approach can be applied to solve different problems and do not require to use additional mechanisms of task synchronization. The universality of proposed approach allows to prepare conflictless schedule even in environments, where classical concurrency problems will be significantly expanded and complicated.Pozycja Outlier Mining Using the DBSCAN Algorithm(Wydawnictwo Politechniki Łódzkiej, 2017) Nowak-Brzezińska, Agnieszka; Xięski, TomaszThis paper introduces an approach to outlier mining in the context of a real-world dataset containing information about the mobile transceivers operation. The goal of the paper is to analyze the influence of using different similarity measures and multiple values of input parameters for the densitybased clustering algorithm on the number of outliers discovered during the mining process. The results of the experiments are presented in section 4 in order to discuss the significance of the analyzed parameters.Pozycja Outlier Mining in Rule-Based Knowledge Bases(Wydawnictwo Politechniki Łódzkiej, 2017) Nowak-Brzezińska, AgnieszkaThis paper introduces an approach to outlier mining in the context of rule-based knowledge bases. Rules in knowledge bases are a very specific type of data representation and it is necessary to analyze them carefully, especially when they differ from each other. The goal of the paper is to analyze the influence of using different similarity measures and clustering methods on the number of outliers discovered during the mining process. The results of the experiments are presented in Section 6 in order to discuss the significance of the analyzed parameters.Pozycja Outlier Detection Using the Multiobjective Genetic Algorithm(Wydawnictwo Politechniki Łódzkiej, 2017) Duraj, Agnieszka; Chomątek, ŁukaszSince almost all datasets may be affected by the presence of anomalies which may skew the interpretation of data, outlier detection has become a crucial element of many datamining applications. Despite the fact that several methods of outlier detection have been proposed in the literature, there is still a need to look for new, more effective ones. This paper presents a new approach to outlier identification based on genetic algorithms. The study evaluates the performance and examines the features of several multiobjective genetic algorithms.Pozycja Dedicated Type-2 Fuzzy Logic Systems: A Novel Approach to DeNOx Filtration Systems(Wydawnictwo Politechniki Łódzkiej, 2018) Niewiadomski, Adam; Kacprowicz, MarcinThe paper presents some novel research on applications of Type-2 Fuzzy Logic Systems to support the Selective Catalytic Reduction process (SCR). The aim of the research is to design and test higher order fuzzy logic systems and their genuine modifications to manage data in DeNOx systems responsible for controlling emission of nitrogen oxides (NO, NO2). Since in real applications, it is still performed under the supervision of a human expert, the scope is to replace, at least partially, his/her participation with dedicated type-2 fuzzy logic systems. As the result, it is shown that the proposed systems with new means of learning fuzzy IF-THEN rules allow us to compute parameters much closer to those determined by experts, even in a comparison to some earlier approaches based on traditional fuzzy logic.Pozycja Normalization Effects in Matching Pursuit Algorithm with Gabor Dictionaries(Wydawnictwo Politechniki Łódzkiej, 2018) Różański, Piotr T.The matching pursuit (MP) algorithm is a greedy method for signal decomposition used in video coding, data compression, and, particularly, analysis of EEG signals in various paradigms, including P300 and ER(D)S (motor imagery). An important issue for MP implementation is a correct treatment of normalization of atoms (functions) used in computations. Failing to account for normalization-related effects may affect both the numerical stability and the reliability of the algorithm. This paper describes these normalization effects, evaluates their impact on the algorithm’s performance, and describe the proper approach together with a ready-to-use implementation, available under a General Public Licence (GPL). Several performance optimizations used as a part of this implementation are also described.Pozycja A Memory Model for Emotional Decision-Making Agent in a Game(Wydawnictwo Politechniki Łódzkiej, 2018) Rogalski, Jakub; Szajerman, DominikVirtual characters are an important part of many modern computer games. This paper describes a graph-based memory system designed for artificial agents that also simulate simple emotions. The system was tested using virtual simulation environment and it showed many new and desirable AI behaviours. These behaviours include simple preferences, reactions based on bot’s opinion of a stimuli or improvement of bot’s ability to find objects to interact with.Pozycja Recommendations for Image Acquisition for 3D Room Scanning(Wydawnictwo Politechniki Łódzkiej, 2018) Kaczmarek, Adam; Szwoch, Mariusz; Bartoszewski, DariuszProper image acquisition plays an extremely important role in 3D scanning of rooms, determining the completeness and correctness of the created model. Any mistakes made at this stage can cause a need to supplement the set of photographs or even to repeat the photo session, e.g. in case of changing the lighting conditions. This paper presents a set of recommendations minimizing the risk of making a mistake at the stage of acquiring photographs of interiors. These recommendations were based on numerous experiments carried out as part of the STERIO project which main goal is to develop a complete technology of faithful reconstruction of the real world interior sceneries in a virtual world of video games using stereophotogrammetry methods.Pozycja Numerical Models of Hierarchical Threshold Secret Sharing and Broadcasting with Encryption(Wydawnictwo Politechniki Łódzkiej, 2018) Kapusta, Joanna; Smarzewski, RyszardIn the paper there are presented two new models of encrypted hierarchical secret sharing schemes based on barycentric Hermite formula. Moreover an application of the second scheme to design a novel broadcast encryption protocol is proposed. The protocol allows to send a decoding key to any user via broadcast channel and revoke some users without the necessity of updating encrypted private keys of the other users of the system. To ensure the safety of user private keys the protocol uses one-way functions that fulfill special conditions.Pozycja Discretisation of Thermal Diffusion Equation in Multilayer Structures with Variable Material Parameters and Different Thicknesses(Wydawnictwo Politechniki Łódzkiej, 2018) Sobieski, Wojciech; Trykozko, AnnaThe paper presents details of discretisation of a thermal diffusion equation in one-dimensional space in terms of the Finite Volume Method. In the following sections, the method of space discretisation is discussed along with the approximation of a spatial derivative, matrix notation of a system of equations, special cases, approximation of three types of boundary conditions and derivative approximation over time. Much attention is also given to the issue of averaging material properties which can generally be different in adjacent cells.The study aims to analyse various multilayer structures for their suitability as heat storage. The launch of studies described in the paper has been driven by the lack of methods for effective heat storage, which is currently one of the key problems faced by the renewable energy industry.Pozycja Virtual Money for Purchases in School Shops and for Educational Applications: eZloty(Wydawnictwo Politechniki Łódzkiej, 2018) Pawlak, Michał; Guziur, Jakub; Poniszewska-Marańda, Aneta; Stolarek, JanRecent developments in Polish legislation concerning the healthiness of products in schools shops and results of law compliance verification resulted in a need for a way to supervise purchases in school shops. In this article, a solution for this problem is presented in a form of an online payment platform utilizing virtual currency called eZloty. The platform is based on blockchain technology which allows storing transaction history in an immutable form. As a result, eZloty payment system would enable supervision of products bought in schools, thus creating a possibility for more directed actions promoting healthy food and compliance with ministry regulations.