2024-03-29T12:28:10Z
http://ijet.pl/index.php/ijet/oai
oai:ojs.ijet.ise.pw.edu.pl:article/3432
2021-09-23T11:53:37Z
ijet:INFORMAT
Comparison of intelligent control methods for the ore jigging process
Kulakova, Yelena
Wójcik, Waldemar
Suleimenov, Batyrbek
Smolarz, Andrzej
Neural network, Ore jiggling, Control algorithm, fuzzy logic, correlation
Efficient control of the process of jigging ore of small and fine grain allows avoiding the loss of valuable material in production residual. Due to the multi-dimensionality and multi-connectivity of this enrichment process, classical control methods do not allow achieving the maximum technological indicators of enrichment. This paper proposes investigating intelligent algorithms for controlling the jigging process, which determine the key variables - the level of the natural «bed» and the ripple frequency of the jigging machine. Algorithms are developed using fuzzy logic, neural and hybrid networks. The adequacy of intelligent algorithms was evaluated using the following criteria: correlation of expert and model values (R); Root Mean Square Error (RMSE); Mean absolute percentage error (MAPE). To assess the adequacy of the obtained algorithms, a test sample of input variables, different from the training one, was compiled. As a consequence, we determined an algorithm that gives a minimal discrepancy between the calculated and experimental data.
Electronics and Telecommunications Committee
2021-08-30
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.137821
International Journal of Electronics and Telecommunications; Vol 67, No 3 (2021); 363-368
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.137821/857
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.137821/2951
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.137821/2952
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1768
2019-06-16T00:37:10Z
ijet:INFORMAT
The Transforming Method Between Two Reversible Functions
Skorupski, Andrzej
Gracki, Krzysztof
This paper presents an original method of designing some special reversible circuits. This method is intended for the most popular gate set with three types of gates CNT (Control, NOT and Toffoli). The presented algorithm is based on two types of cascades with these reversible gates. The problem of transformation between two reversible functions is solved. This method allows to find optimal reversible circuits. The paper is organized as follows. Section 1 and 2 recalls basic concepts of reversible logic. Especially the two types of cascades of reversible function are presented. In Section 3 there is introduced a problem of analysis of the cascades. Section 4 describes the method of synthesis of the optimal cascade for transformation of the given reversible function into another one.
Electronics and Telecommunications Committee
2019-02-16
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-123562
International Journal of Electronics and Telecommunications; Vol 65, No 1 (2019); 33-38
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-123562/564
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1372
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1373
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1374
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1375
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1376
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1377
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1378
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1379
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1380
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1381
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1382
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123562/1383
Copyright (c) 2019 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4466
2024-03-18T16:07:31Z
ijet:INFORMAT
Implementation of Language Models within an Infrastructure Designed for Natural Language Processing
Walkowiak, Bartosz
Walkowiak, Tomasz
information and communication technology; artificial intelligence
This paper explores cost-effective alternatives for resource-constrained environments in the context of language models by investigating methods such as quantization and CPU-based model implementations.The study addresses the computational efficiency of language models during inference and the development of infrastructure for text document processing. The paper discusses related technologies, the CLARIN-PL infrastructure architecture, and implementations of small and large language models. The emphasis is on model formats, data precision, and runtime environments (GPU and CPU). It identifies optimal solutions through extensive experimentation.In addition, the paper advocates for a more comprehensive performance evaluation approach. Instead of reporting only average token throughput, it suggests considering the curve's shape, which can vary from constant to monotonically increasing or decreasing functions. Evaluating token throughput at various curve points, especially for different output token counts, provides a more informative perspective.
Electronics and Telecommunications Committee
European Regional Development Fund
2024-03-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149525
International Journal of Electronics and Telecommunications; Vol 70, No 1 (2024); 153-159
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149525/1194
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149525/4474
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149525/4475
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149525/4476
Copyright (c) 2024 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/441
2015-12-29T16:11:29Z
ijet:INFORMAT
An Android Security Policy Enforcement Tool
Cotterell, Kathryn
Welch, Ian
Chen, Aaron
Mobile computing; Java; Android; Security
The Android operating system (OS) has become the dominant smart phone OS in recent years due to its accessibility, usability and its open-source philosophy. Consequently, this has also made it a popular target for attackers who aim to install malware on Android devices and take advantage of Android’s coarse-grained, non-revoking permission system. This project designs, implements and evaluates a security tool named COMBdroid, which addresses these security concerns in Android by enforcing fine-grained, user-defined policies. COMBdroid modifies an application before installation, allowing it to override points of security vulnerabilities at run-time. As a proof of concept we have implemented three policies in COMBdroid. This paper documents the development process of COMBdroid, deriving design decisions from the literature review, detailing the design and implementation, and proving the program’s effectiveness through evaluation.
Electronics and Telecommunications Committee
2015-12-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0040
International Journal of Electronics and Telecommunications; Vol 61, No 4 (2015); 311-320
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0040/197
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0040/321
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0040/388
Copyright (c) 2015 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4131
2023-05-18T20:31:22Z
ijet:INFORMAT
Metrological Aspects of Controlling the Rotational Movement Parameters of the Auger for Dewatering Solid Waste in a Garbage Truck
Wójcik, Waldemar
Bereziuk, Oleh V.
Lemeshev, Mykhailo
Bohachuk, Volodymyr
Polishchuk, Leonid
Bezsmertna, Oksana
Smailova, Saule
Kurmagazhanova, Saule
In the article, a device for measuring the parameters of the rotational movement of the auger for dewatering solid waste is proposed based on the analysis of signal processing methods and measurement of physical quantities. It can be used in the development of high-performance special vehicles for transporting waste as the main link in the structure of machines for the collection and primary processing of solid waste. The structural scheme of the means and block diagram of the microcontroller control program algorithm for implementation of the device for measuring the parameters of the rotational motion are proposed. The main technical characteristics of the proposed means are given. The results of experimental tests for measuring the parameters of rotational motion are shown. The results of experimental studies, which are given in the work, confirmed the reliability of the measured parameters.
Electronics and Telecommunications Committee
2023-05-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144355
International Journal of Electronics and Telecommunications; Vol 69, No 2 (2023); 233-238
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144355/1085
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.144355/3970
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.144355/3988
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2362
2020-06-01T14:11:57Z
ijet:INFORMAT
The Algorithm for Reversible Circuits Synthesis
Skorupski, Andrzej
Gracki, Krzysztof
In this paper the new synthesis method for reversible networks is proposed. The method is suitable to generate optimal circuits. The examples will be shown for three variables reversible functions but the method is scalable to larger number of variables. The algorithm could be easily implemented with high speed execution and without big consuming storage software. Section 1 contains general concepts about the reversible functions. In Section 2 there are presented various descriptions of reversible functions. One of them is the description using partitions. In Section 3 there are introduced the cascade of the reversible gates as the target of the synthesis algorithm. In order to achieve this target the definitions of the rest and remain functions will be helpful. Section 4 contains the proposed algorithm. There is introduced a classification of minterms distribution for a given function. To select the successive gates in the cascade the condition of the improvement the minterms distribution must be fulfilled. Section 4 describes the algorithm how to improve the minterms distributions in order to find the optimal cascade. Section 5 shows the one example of this algorithm.
Electronics and Telecommunications Committee
2020-06-01
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131875
International Journal of Electronics and Telecommunications; Vol 66, No 2 (2020); 281-286
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131875/693
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131875/1781
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131875/2205
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131875/2206
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/767
2017-10-31T00:24:38Z
ijet:INFORMAT
A Method for Estimating the Least Number of Objects in Fuzzy Clusters
Viattchenin, Dmitri A.
Yaroma, Aliaksandr
pattern recognition; possibilistic clustering; fuzzy cluster
The theoretical note deals with the problem of estimation of the value of the least number of objects in fuzzy clusters for following detection of the optimal number of objects in fuzzy clusters through heuristic possibilistic clustering. A technique for detecting the optimal maximal number of elements in the a priori unknown number of fuzzy clusters of the sought clustering structure is reminded and a procedure for finding the initial minimal value of the number of objects in fuzzy clusters is proposed. Numerical examples are considered and conclusions are formulated.
Electronics and Telecommunications Committee
2017-10-31
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0046
International Journal of Electronics and Telecommunications; Vol 63, No 4 (2017); 341-346
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0046/407
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2017-0046/651
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2017-0046/652
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2017-0046/675
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2017-0046/676
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4290
2023-10-28T09:18:15Z
ijet:INFORMAT
Fuzzy alliance and coalitions that can be formed by alliance agents
Mashkov, Viktor
Smolarz, Andrzej
Lytvynenko, Volodymyr
Alliance; Coalition; Multi-agent systems; Modeling and Simulation.
The paper deals with alliances and coalitions that can be formed by the agents or entities. Alliance agents are assumed to cooperate and form coalitions for performing the tasks or missions. It is considered that alliance agents are unselfish. That is, they are more interested in achieving the common goal(s) than in getting personal benefits. In the paper, the concept of fuzzy alliance was introduced. A fuzzy alliance is considered as a generalization of a traditional alliance allowing agents to decide on the capabilities that their agents can and want to deliver to the coalition. Coalitions that fuzzy alliance agents can form were considered. The definition of the “best” coalition was explained. The method of how to find the “best” coalition among all possible coalitions was suggested and verified by computer simulation.
Electronics and Telecommunications Committee
2023-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147692
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023); 713-718
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147692/1155
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147692/4276
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147692/4289
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/196
2015-03-31T18:42:10Z
ijet:INFORMAT
On Some Aspects of Genetic and Evolutionary Methods for Optimization Purposes
Woźniak, Marcin
Połap, Dawid
computational intelligence; genetic algorithm; heuristic algorithm; optimization
In this paper, the idea of applying Baldwin effect in a hybrid genetic algorithm with gradient local search is formulated. For two different test functions is examined proposed version of algorithm. Research results are presented and discussed to show potential efficiency of applied Baldwin effect.
Electronics and Telecommunications Committee
2015-02-25
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0001
International Journal of Electronics and Telecommunications; Vol 61, No 1 (2015); 7-16
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0001/101
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0001/127
oai:ojs.ijet.ise.pw.edu.pl:article/3333
2022-05-31T02:27:45Z
ijet:INFORMAT
Intelligent Data Sensitive Security Model for Big Data in Healthcare using Fuzzy Logic
Dubey, Somya
Verma, Dhanraj
An intelligent security model for the big data environment is presented in this paper. The proposed security framework is data sensitive in nature and the level of security offered is defined on the basis of the data secrecy standard. The application area preferred in this work is the healthcare sector where the amount of data generated through the digitization and aggregation of medical equipments readings and reports is huge. The handling and processing of this great amount of data has posed a serious challenge to the researchers. The analytical outcomes of the study of this data are further used for the advancement of the medical prognostics and diagnostics. Security and privacy of this data is also a very important aspect in healthcare sector and has been incorporated in the healthcare act of many countries. However the security level implemented conventionally is of same level to the complete data which not a smart strategy considering the varying level of sensitivity of data. It is inefficient for the data of high sensitivity and redundant for the data of low sensitivity. An intelligent data sensitive security framework is therefore proposed in this paper which provides the security level best suited for the data of given sensitivity. Fuzzy logic decision making technique is used in this work to determine the security level for a respective sensitivity level. Various patient attributes are used to take the intelligent decision about the security level through fuzzy inference system. The effectiveness and the efficacy of the proposed work is verified through the experimental study.
Electronics and Telecommunications Committee
2022-05-31
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.139874
International Journal of Electronics and Telecommunications; Vol 68, No 2 (2022); 245-250
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.139874/961
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2022.139874/2835
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2022.139874/3330
Copyright (c) 2022 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2105
2020-06-01T14:11:57Z
ijet:INFORMAT
Rapid text entry using mobile and auxiliary devices for people with speech disorders communication
Krak, Iurii V.
Barmak, Olexander V.
Bahrii, Ruslan O.
Wójcik, Waldemar
Rakhmetullina, Saule
Amirgaliyeva, Saltanat
information technology; alternative communication; ambiguous virtual keyboard; text prediction; statistical language model; N-gram.
The article considers information technology for the realization of human communication using residual human capabilities, obtained by organizing text entry using mobile and auxiliary devices. The components of the proposed technology are described in detail: the method for entering text information to realize the possibility of introducing a limited number of controls and the method of predicting words that are most often encountered after words already entered in the sentence. A generalized representation of the process of entering text is described with the aid of an ambiguous virtual keyboard and the representation of control signals for the selection of control elements. The approaches to finding the optimal distribution of the set of alphabet characters for different numbers of control signals are given. The method of word prediction is generalized and improved, the statistical language model with "back-off" is used, and the approach to the formation of the training corpus of the spoken Ukrainian language is proposed.
Electronics and Telecommunications Committee
2020-06-01
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131874
International Journal of Electronics and Telecommunications; Vol 66, No 2 (2020); 273-279
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131874/692
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131874/2204
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/442
2015-12-29T16:19:51Z
ijet:INFORMAT
Real-Time Cloud-based Game Management System via Cuckoo Search Algorithm
Połap, Dawid
Wozniak, Marcin
Napoli, Christian
Tramontana, Emiliano
Computational Intelligence; Heuristic Algorithm
This paper analyses the idea of applying Swarm Intelligence in the process of managing the entire 2D board game in a real-time environment. For the proposed solution Game Management System is used as a cloud resource with a dedicated intelligent control agent. The described approach has been analysed on the basis of board games like mazes. The model and the control algorithm of the system is described and examined. The results of the experiments are presented and discussed to show possible advantages and disadvantages of the proposed method.
Electronics and Telecommunications Committee
2015-12-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0043
International Journal of Electronics and Telecommunications; Vol 61, No 4 (2015); 333-338
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0043/200
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0043/322
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0043/323
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0043/351
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0043/391
Copyright (c) 2015 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4143
2023-10-28T09:18:15Z
ijet:INFORMAT
The Role of Faster R-CNN Algorithm in the Internet of Things to Detect Mask Wearing: The Endemic Preparations
Al-Khowarizmi, Al-Khowarizmi
Nasution, Marah Doly
Rahmat, Romi Fadillah
Lubis, Arif Ridho
Lubis, Muharman
Faster R-CNN; IoT; Mask; Endemic
Faster R-CNN is an algorithm development that continuously starts from CNN then R-CNN and Faster R-CNN. The development of the algorithm is needed to test whether the heuristic algorithm has optimal provisions. Broadly speaking, faster R-CNN is included in algorithms that are able to solve neural network and machine learning problems to detect a moving object. One of the moving objects in the current phenomenon is the use of masks. Where various countries in the world have issued endemic orations after the Covid 19 pandemic occurred. Detection tool has been prepared that has been tested at the mandatory mask door, namely for mask users. In this paper, the role of the Faster R-CNN algorithm has been carried out to detect masks poured on Internet of Thinks (IoT) devices to automatically open doors for standard mask users. From the results received that testing on the detection of moving mask objects when used reaches 100% optimal at a distance of 0.5 to 1 meter and 95% at a distance of 1.5 to 2 meters so that the process of sending detection signals to IoT devices can be carried out at a distance of 1 meter at the position mask users to automatic doors
Electronics and Telecommunications Committee
2023-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147689
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023); 691-696
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147689/1152
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147689/3986
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2552
2020-11-22T18:22:53Z
ijet:INFORMAT
Modeling of Distributed Ledger Deployment View
Górski, Tomasz
Bednarski, Jakub
Software architecture; Deployment view; Architectural views model 1+5; Unified Modeling Language extensibility mechanisms; Distributed Ledger Technology; Blockchain
The Distributed Ledger Technology (DLT) is a peer-to-peer model of sharing data among collaborating parties in a decentralized manner. An example of DLT is a blockchain where data form blocks in an append-only chain. Software architecture description usually comprises multiple views. The paper concentrates on the Deployment view of the DLT solution within the 1+5 architectural views model. The authors have proposed Unified Modeling Language (UML) extensibility mechanisms to describe the needed additional semantic notation to model deployment details. The paper covers both the network and node levels. The proposed stereotypes and tagged values have enriched the UML Deployment diagram. We have gathered those modeling elements in dedicated UML Profile for Distributed Ledger Deployment. We have applied the profile to model the Deployment view of a renewable energy management system that uses the R3Cordaframework. The system records information about inbound and outbound energy to/from a renewable energy grid.
Electronics and Telecommunications Committee
2020-11-22
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134020
International Journal of Electronics and Telecommunications; Vol 66, No 4 (2020); 619-625
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134020/743
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.134020/2183
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.134020/2184
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.134020/2318
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1067
2018-08-01T11:38:49Z
ijet:INFORMAT
Benchmark tests on heuristic methods in the darts game
Woźniak, Marcin
Ksiazek, Kamil
Połap, Dawid
Games are among problems that can be reduced to optimization, for which one of the most universal and productive solving method is a heuristic approach. In this article we present results of benchmark tests on using 5 heuristic methods to solve a physical model of the darts game. Discussion of the scores and conclusions from the research have shown that application of heuristic methods can simulate artificial intelligence as a regular player with very good results.
Electronics and Telecommunications Committee
2018-04-27
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-119358
International Journal of Electronics and Telecommunications; Vol 64, No 2 (2018); 115-121
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-119358/491
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4321
2023-10-28T09:18:15Z
ijet:INFORMAT
ADDP: Anomaly Detection based on Denoising Pretraining
Ge, Xianlei
Li, Xiaoyan
Zhang, Zhipeng
artificial intelligence;image processing;deep learning
Acquiring labels in anomaly detection tasks is expensive and challenging. Therefore, as an effective way to improve efficiency, pretraining is widely used in anomaly detection models, which enriches the model's representation capabilities, thereby enhancing both performance and efficiency in anomaly detection. In most pretraining methods, the decoder is typically randomly initialized. Drawing inspiration from the diffusion model, this paper proposed to use denoising as a task to pretrain the decoder in anomaly detection, which is trained to reconstruct the original noise-free input. Denoising requires the model to learn the structure, patterns, and related features of the data, particularly when training samples are limited. This paper explored two approaches on anomaly detection: simultaneous denoising pretraining for encoder and decoder, denoising pretraining for only decoder. Experimental results demonstrate the effectiveness of this method on improving model’s performance. Particularly, when the number of samples is limited, the improvement is more pronounced.
Electronics and Telecommunications Committee
School of Electronic Engineering, Huainan Normal University, China
College of Computing and Information Technologies, National University, Philippines
2023-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147693
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023); 719-726
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147693/1156
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147693/4296
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147693/4297
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/229
2015-03-31T18:53:33Z
ijet:INFORMAT
A Software Architecture Assisting Workflow Executions on Cloud Resources
Borowik, Grzegorz
Woźniak, Marcin
Fornaia, Andrea
Giunta, Rosario
Napoli, Christian
Pappalardo, Giuseppe
Tramontana, Emiliano
software architecture; dependability; workflows; cloud computing; monitoring
An enterprise providing services handled by means of workflows needs to monitor and control their execution, gather usage data, determine priorities, and properly use computing cloud-related resources. This paper proposes a software architecture that connects unaware services to components handling workflow monitoring and management concerns. Moreover, the provided components enhance dependability of services while letting developers focus only on the business logic.
Electronics and Telecommunications Committee
2015-02-25
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0002
International Journal of Electronics and Telecommunications; Vol 61, No 1 (2015); 17-23
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0002/104
oai:ojs.ijet.ise.pw.edu.pl:article/3741
2023-02-27T00:37:28Z
ijet:INFORMAT
An Efficient Hybrid Classifier Model for Customer Churn Prediction
Anitha, M A
Sherly, K K
Customer churn prediction is used to retain customers at the highest risk of churn by proactively engaging with them. Many machine learning-based data mining approaches have been previously used to predict client churn. Although, single model classifiers increase the scattering of prediction with a low model performance which degrades reliability of the model. Hence, Bag of learners based Classification is used in which learners with high performance are selected to estimate wrongly and correctly classified instances thereby increasing the robustness of model performance. Furthermore, loss of interpretability in the model during prediction leads to insufficient prediction accuracy. Hence, an Associative classifier with Apriori Algorithm is introduced as a booster that integrates classification and association rule mining to build a strong classification model in which frequent items are obtained using Apriori Algorithm. Also, accurate prediction is provided by testing wrongly classified instances from the bagging phase using generated rules in an associative classifier. The proposed models are then simulated in Python platform and the results achieved high accuracy, ROC score, precision, specificity, F-measure, and recall.
Electronics and Telecommunications Committee
2023-02-27
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144325
International Journal of Electronics and Telecommunications; Vol 69, No 1 (2023); 11-18
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144325/1049
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.144325/3886
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.144325/3887
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2126
2020-09-10T21:07:43Z
ijet:INFORMAT
Information Technologies for Assessing the Quality of IT-specialties Graduates' Training of University by Means of Fuzzy Logic and Neural Networks
Azarova, Anzhelika O.
Azarova, Larysa E.
Pavlov, Sergii V.
Kaplun, Iryna S.
Savina, Nataliia B.
Wójcik, Waldemar
Smailova, Saule
Kalizhanova, Aliya
The information technologies for assessing the quality of IT-specialties graduates' training of university by means of fuzzy logic and neural networks are developed in the article. It makes possible taking into account a wide set of estimation and output parameters, influence of the external and internal factors and allows to simplify the assessing process by means of modern mathematical apparatuses of artificial intelligence.
Electronics and Telecommunications Committee
2020-09-07
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131893
International Journal of Electronics and Telecommunications; Vol 66, No 3 (2020); 411-416
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131893/713
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131893/2224
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/444
2015-12-29T17:48:01Z
ijet:INFORMAT
Cascade feed forward neural network-based model for air pollutants evaluation of single monitoring stations in urban areas
Capizzi, Giacomo
Lo Sciuto, Grazia
Monforte, P
Napoli, Christian
Neural networks; Synthetic Aperture Radar; Mahalanobis Distance
In this paper, air pollutants concentrations for N O2 , N O, N Ox and P M 10 in a single monitoring station are predicted using the data coming from other different monitoring stations located nearby. A cascade feed forward neural network based modeling is proposed. The main aim is to provide a methodology leading to the introduction of virtual monitoring station points consistent with the actual stations located in the city of Catania in Italy.
Electronics and Telecommunications Committee
2015-12-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0042
International Journal of Electronics and Telecommunications; Vol 61, No 4 (2015); 327-332
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0042/225
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0042/326
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0042/406
Copyright (c) 2015 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4172
2023-07-31T01:06:51Z
ijet:INFORMAT
Community Clustering on Fraud Transactions Applied the Louvain-Coloring algorithm
Mardiansyah, Heru
Suwilo, Saib
Nababan, Erna Budhiarti
Efendi, Syahril
Computer Science
Clustering is a technique in data mining capable of grouping very large amounts of data to gain new knowledge based on unsupervised learning. Clustering is capable of grouping various types of data and fields. The process that requires this technique is in the business sector, especially banking. In the transaction business process in banking, fraud is often encountered in transactions. This raises interest in clustering data fraud in transactions. An algorithm is needed in the cluster, namely Louvain's algorithm. Louvain's algorithm is capable of clustering in large numbers, which represent them in a graph. So, the Louvain algorithm is optimized with colored graphs to facilitate research continuity in labeling. In this study, 33,491 non-fraud data were grouped, and 241 fraud transaction data were carried out. However, Louvain's algorithm shows that clustering increases the amount of data fraud with an accuracy of 88%.
Electronics and Telecommunications Committee
2023-07-31
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.146512
International Journal of Electronics and Telecommunications; Vol 69, No 3 (2023); 593-598
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.146512/1134
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.146512/4023
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.146512/4062
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.146512/4064
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2699
2021-05-11T08:41:30Z
ijet:INFORMAT
Efficient Wireless Sensor Network for Radiation Detection in Nuclear Sites
Hashima, Sherief
Mahmoud, Imbaby Ismail
WSN, ML, MAB, Smart radiation sensor
Due to the severe damages of nuclear accidents, there is still an urgent need to develop efficient radiation detection wireless sensor networks (RDWSNs) that precisely monitor irregular radioactivity. It should take actions that mitigate the severe costs of accidental radiation leakage, especially around nuclear sites that are the main sources of electric power and a lot of health and industrial applications. Recently, leveraging machine learning (ML) algorithms to RDWSNs is a promising solution due to its several pros, such as online learning and self-decision making. This paper addresses a novel and efficient ML-based RDWSNs that utilizes millimeter waves (mmWaves) to cope with future networks requirements. Specifically, we leverage an online learning multi-armed bandit (MAB) algorithm called Thomson sampling (TS) to a 5G enabled RDWSN to efficiently forward the measured radiation levels of the distributed radiation sensors within the monitoring area. The utilized sensor nodes are lightweight smart radiation sensors that are mounted on mobile devices and measure radiations using software applications installed in these mobiles. Moreover, a battery aware TS (BA-TS) algorithm is proposed to forward the sensed radiation levels to fusion decision center efficiently. BA-TS reflects the remaining battery of each mobile device to prolong the network lifetime. Simulation results ensure the efficiency of the proposed BA-TS algorithm regards throughput and network lifetime over TS and exhaustive search method.
Electronics and Telecommunications Committee
2021-05-11
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135961
International Journal of Electronics and Telecommunications; Vol 67, No 2 (2021); 175-180
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135961/798
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2158
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2159
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2161
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2162
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2163
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2164
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2165
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2166
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2167
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2168
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2431
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135961/2432
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1413
2018-10-28T22:48:21Z
ijet:INFORMAT
The Method of Reversible Circuits Design with One-gate Prediction
Skorupski, Andrzej
computer science
This paper presents an original method of designing reversible circuits. This method is destined to most popular gate set with three types of gates CNT (Control, NOT and Toffoli). The presented algorithm based on graphical representation of the reversible function is called s-maps. This algorithm allows to find optimal or quasi-optimal reversible circuits. The paper is organized as follows. Section 1 recalls basic concepts of reversible logic. Especially the cascade of the gates as realization of reversible function is presented. In Section 2 there is introduced a classification of minterms distribution. The s-maps are the representation of the reversible functions where the minterms distribution is presented. The choice of the first gate in the cascade depends on possibility of improving the distribution. Section 3 describes the algorithm, namely how to find the optimal or quasi-optimal solutions of the given function.
Electronics and Telecommunications Committee
Institute of Computer Science, Warsaw University of Technology
2018-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-123556
International Journal of Electronics and Telecommunications; Vol 64, No 4 (2018); 535-540
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-123556/508
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123556/1153
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-123556/1154
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4476
2024-03-18T16:07:31Z
ijet:INFORMAT
Adding Parallelism to Sequential Programs – a Combined Method
Daszczuk, Wiktor Bohdan
Czejdo, Denny Bogdan
Grześkowiak, Wojciech
programming languages; algorithms; concurrency; parallelism; parallel programming
The article outlines a contemporary method for creating software for multi-processor computers. It describes the identification of parallelizable sequential code structures. Three structures were found and then carefully examined. The algorithms used to determine whether or not certain parts of code may be parallelized result from static analysis. The techniques demonstrate how, if possible, existing sequential structures might be transformed into parallel-running programs. A dynamic evaluation is also a part of our process, and it can be used to assess the efficiency of the parallel programs that are developed. As a tool for sequential programs, the algorithms have been implemented in C#. All proposed methods were discussed using a common benchmark.
Electronics and Telecommunications Committee
2024-03-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149523
International Journal of Electronics and Telecommunications; Vol 70, No 1 (2024); 135-144
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149523/1192
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149523/4483
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149523/4484
Copyright (c) 2024 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/437
2015-12-29T16:05:06Z
ijet:INFORMAT
Is swarm intelligence able to create mazes?
Polap, Dawid
Wozniak, Marcin
Napoli, Christian
Tramontana, Emiliano
Computational Intelligence; Heuristic Algorithm
In this paper, the idea of applying Computational Intelligence in the process of creation board games, in particular mazes, is presented. For two different algorithms the proposed idea has been examined. The results of the experiments are shown and discussed to present advantages and disadvantage.
Electronics and Telecommunications Committee
2015-12-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-elete2015-0039
International Journal of Electronics and Telecommunications; Vol 61, No 4 (2015); 305-310
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-elete2015-0039/196
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-elete2015-0039/324
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-elete2015-0039/387
Copyright (c) 2015 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3683
2023-02-27T00:37:28Z
ijet:INFORMAT
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol
Oleiwi, Zahraa
Dihin, Rasha
Alwan, Ali
One of the most recent challenges in communicationsystem and network system is the privacy and security ofinformation and communication session. Blockchain is one oftechnologies that use in sensing application in different importantenvironments such as healthcare. In healthcare the patient privacyshould be protected use high security system. Key agreementprotocol based on lattice ensure the authentication and highprotection against different types of attack especiallyimpersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improvedframework using lattice based key agreement protocol forapplication of block chain, with security analysis of manyliteratures that proposed different protocols has been presentedwith comparative study. The resultant new framework based onlattice overcome the latency limitation of block chain in the oldframework and lowered the computation cost that depend onElliptic curve Diffie-Hellman. Also, it ensures high privacy andprotection of patient’s information
Electronics and Telecommunications Committee
2023-02-27
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.143902h
International Journal of Electronics and Telecommunications; Vol 69, No 1 (2023); 5-10
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.143902h/1048
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2022.143902h/3309
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2125
2020-09-10T21:07:44Z
ijet:INFORMAT
Model of integral assessment of innovation implementation in higher educational establishments
Yaremko, Svetlana A.
Nikolina, Irina I.
Kuzmina, Elena М.
Pugach, Serghiy S.
Wójcik, Waldemar
Denissova, Nataliya
Kozbakova, Ainur
The concept of innovative educational environment of higher education establishment is considered and its main components are highlighted. The model of the integrated assessment of implementing innovations in higher education establishment is constructed. The developed model for assessing the level of development of the innovative educational environment of a specific higher education establishment during a certain period has been applied and a graphical analysis of the calculation results has been carried out.
Electronics and Telecommunications Committee
2020-09-07
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131894
International Journal of Electronics and Telecommunications; Vol 66, No 3 (2020); 417-423
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131894/714
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131894/2236
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/641
2016-09-08T11:39:19Z
ijet:INFORMAT
Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs)
Graniszewski, Waldemar
Arciszewski, Adam
virtualisation, virtualmachines, benchmark, performance, hypervisor, virtual machine monitor, vmm
Virtualization of operating systems and network infrastructure plays an important role in current IT projects. With the number of services running on different hardware resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their competitors. In this paper we evaluate performance of different solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard benchmark tools to compare efficiency of main hardware components, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented.
Electronics and Telecommunications Committee
Institute of Control and Industrial Electronics, Faculty of Electrical Engineering, Warsaw University of Technology, Warsaw, Poland
2016-09-08
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0031
International Journal of Electronics and Telecommunications; Vol 62, No 3 (2016); 231-236
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0031/301
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2016-0031/525
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2016-0031/539
Copyright (c) 2016 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4204
2023-10-28T09:18:15Z
ijet:INFORMAT
Cognitive Modeling and Formation of the Knowledge Base of the Information System for Assessing the Rating of Enterprises
Kryvoruchko, Olena
Desyatko, Alona
Karpunin, Igor
Hnatchenko, Dmytro
Lakhno, Myroslav
Malikova, Feruza
Turdaliev, Ayezhan
information security; audit; Bayesian network; artificial neural networks
A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base (KB) for an intelligent information system (IIS). This IIS is developed to assess the financial condition (FC) of the company. Moreover, for circumstances related to the identification of individual weakly structured factors (signs). The proposed model makes it possible to increase the understanding of the analyzed economic processes related to the company's financial system. An iterative algorithm for IIS has been developed that implements a model of cognitive modeling. The scientific novelty of the proposed approach lies in the fact that, unlike existing solutions, it is possible to adjust the structure of the algorithm depending on the characteristics of a particular company, as well as form the information basis for the process of assessing the company's FC and the parameters of the cognitive model.
Electronics and Telecommunications Committee
-
2023-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147690
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023); 697-705
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147690/1153
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147690/4054
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147690/4055
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147690/4056
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/89
2014-09-30T17:52:02Z
ijet:INFORMAT
Numerical Implementation of the Fictitious Domain Method for Elliptic Equations
Temirbekov, Almas N.
Wójcik, Waldemar
In this paper, we consider an elliptic equation with strongly varying coefficients. Interest in the study of these equations is connected with the fact that this type of equation is obtained when using the fictitious domain method. In this paper, we propose a special method for the numerical solution of elliptic equations with strongly varying coefficients. A theorem is proved for the rate of convergence of the iterative process developed. A computational algorithm and numerical calculations are developed to illustrate the effectiveness of the proposed method.
Electronics and Telecommunications Committee
2014-09-30
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.2478-eletel-2014-0027
International Journal of Electronics and Telecommunications; Vol 60, No 3 (2014); 219-223
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.2478-eletel-2014-0027/37
oai:ojs.ijet.ise.pw.edu.pl:article/3233
2021-05-11T08:41:30Z
ijet:INFORMAT
Cycles in Bayesian Networks
Litvinenko, Natalya
Mamyrbayev, Orken
Wójcik, Waldemar
Zhamangarin, Dusmat
Bayesian networks, directed graphs, directed cycles, propagation, Bayesian evidence
The article is devoted to some critical problems of using Bayesian networks for solving practical problems, in which graph models contain directed cycles. The strict requirement of the acyclicity of the directed graph representing the Bayesian network does not allow to efficiently solve most of the problems that contain directed cycles. The modern theory of Bayesian networks prohibits the use of directed cycles. The requirement of acyclicity of the graph can significantly simplify the general theory of Bayesian networks, significantly simplify the development of algorithms and their implementation in program code for calculations in Bayesian networks.
Electronics and Telecommunications Committee
2021-05-11
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135962
International Journal of Electronics and Telecommunications; Vol 67, No 2 (2021); 181-186
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135962/799
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135962/2727
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135962/2728
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135962/2729
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135962/2739
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2021.135962/2740
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1614
2019-02-16T00:04:57Z
ijet:INFORMAT
Weak RSA Key Discovery on GPGPU
Russek, Paweł
Karbownik, Przemysław
Wiatr, Kazimierz
cryptography; Internet security; intrusion prevention; accelerated computing; caching methods; big numbers computing;
We address one of the weaknesses of the RSA ciphering systems \textit{i.e.} the existence of the private keys that are relatively easy to compromise by the attacker. The problem can be mitigated by the Internet services providers, but it requires some computational effort. We propose the proof of concept of the GPGPU-accelerated system that can help detect and eliminate users' weak keys.We have proposed the algorithms and developed the GPU-optimised program code that is now publicly available and substantially outperforms the tested CPU processor. The source code of the OpenSSL library was adapted for GPGPU, and the resulting code can perform both on the GPU and CPU processors. Additionally, we present the solution how to map a triangular grid into the GPU rectangular grid \textendash{} the basic dilemma in many problems that concern pair-wise analysis for the set of elements. Also, the comparison of two data caching methods on GPGPU leads to the interesting general conclusions. We present the results of the experiments of the performance analysis of the selected algorithms for the various RSA key length, configurations of GPU grid, and size of the tested key set.
Electronics and Telecommunications Committee
National Science Centre (NCN)
2019-02-16
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-123561
International Journal of Electronics and Telecommunications; Vol 65, No 1 (2019); 25-31
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-123561/516
Copyright (c) 2019 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4456
2024-03-18T16:07:31Z
ijet:INFORMAT
Authorial approach to the detection of selected psychological traits based on handwritten texts
Woda, Marek Sławomir
Oliwa, Grzegorz
prediction; handwritten texts; personality traits; machine learning; neural networks
The study sought to use computer techniques to detect selected psychological traits based on the nature of the writing and to evaluate the effectiveness of the resulting software. Digital image processing and deep neural networks were used. The work is complex and multidimensional in nature, and the authors wanted to demonstrate the feasibility of such a topic using image processing techniques and neural networks and machine learning. The main studies that allowed the attribution of psychological traits were based on two models known from the literature, KAMR and DA. The evaluation algorithms that were implemented allowed the evaluation of the subjects and the assignment of psychological traits to them. The DA model turned out to be more effective than the KAMR model.
Electronics and Telecommunications Committee
2024-03-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149524
International Journal of Electronics and Telecommunications; Vol 70, No 1 (2024); 145-152
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149524/1193
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149524/4459
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2024.149524/4460
Copyright (c) 2024 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/440
2015-12-29T16:13:57Z
ijet:INFORMAT
Searching Design Patterns Fast by Using Tree Traversals
Cicciarella, Stefano
Napoli, Christian
Tramontana, Emiliano
Design pattern; source code analysis; software architecture; tree traversal
Large software systems need to be modified to remain useful. Changes can be more easily performed when their design has been carefully documented. This paper presents an approach to quickly find design patterns that have been implemented into a software system. The devised solution greatly reduces the performed checks by organising the search for a design pattern as tree traversals, where candidate classes are carefully positioned into trees. By automatically tagging classes with design pattern roles we make it easier for developers to reason with large software systems. Our approach can provide documentation that lets developers understand the role each class is playing, assess the quality of the code, have assistance for refactoring and enhancing the functionalities of the software system.
Electronics and Telecommunications Committee
2015-12-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0041
International Journal of Electronics and Telecommunications; Vol 61, No 4 (2015); 321-326
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2015-0041/198
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0041/320
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.1515-eletel-2015-0041/389
Copyright (c) 2015 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3804
2022-08-27T21:26:15Z
ijet:INFORMAT
Redefining Sports: Esports, Environments, Signals and Functions
Białecki, Andrzej
Białecki, Robert
Gajewski, Jan
The sports landscape is constantly changing due to innovation and entrepreneurship. The availability of technology led to the emergence of esports and augmented sports. Biofeedback and sensing technologies can be used for athlete monitoring and training purposes. Research on motor control deals with planning and execution of bodily movements and provides some insights towards formal presentation of sports.Previous research provided many sports categorization models. On many occasions, published articles failed to distinguish recreational/leisure competitive gameplay activity (gaming) from athletic performance (esports). Our goal was to define esports by extending existing universal sport definitions and propose a novel modular computational framework for categorizing sports through environments and signals.We have fulfilled our goals by illustrating how signals flow within competitive (sports) environments. Our esports definition introduces esports as a group of sports similar to motorsports. Moreover, we have defined mathematical foundations for signal processing by various actors (athletes, referees, environments, intermediate processing steps). We have demonstrated that representing sports as a multidimensional signal can lead to the categorization of sports through computation. We claim that our approach could be applied to transfer training methods from similar sports, analysis of the training process, and referee error measurement.Our study was not without limitations. Further research is required to validate our theoretical model by embedding available variables in latent space to calculate similarity measures between sports.
Electronics and Telecommunications Committee
2022-08-27
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.141272
International Journal of Electronics and Telecommunications; Vol 68, No 3 (2022); 541-548
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.141272/998
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2022.141272/3417
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2022.141272/3418
Copyright (c) 2022 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2124
2020-09-10T21:07:44Z
ijet:INFORMAT
Improved method of searching the associative rules while developing the software
Savchuk, Tamara O.
Pryimak, Nataliia V.
Slyusarenko, Nina V.
Smolarz, Andrzej
Smailova, Saule
Amirgaliyev, Yedilkhan
As the delivery of the good quality software in time is very important part of the software development process, it's very important task to organize this process very accurately. For this a new method of the searching associative rules where proposed. It is based on the classification of the all tasks on three different groups, depending on their difficulty, and after this, searching associative rules among them, which will help to define the time necessary to perform specific task by specific developer
Electronics and Telecommunications Committee
2020-09-07
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131895
International Journal of Electronics and Telecommunications; Vol 66, No 3 (2020); 425-430
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131895/715
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131895/1625
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131895/1847
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2020.131895/2235
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/742
2018-04-29T19:24:17Z
ijet:INFORMAT
Voice recognition through the use of Gabor transform and heuristic algorithm
Woźniak, Marcin
Połap, Dawid
Increasingly popular use of verification methods based on specific characteristics of people like eyeball, fingerprint or voice makes inventing more accurate and irrefutable methods of that urgent. In this work we present the voice verification based on Gabor transformation. The proposed approach involves creation of spectrogram, which serves as a habitat for the population of selected heuristic algorithm. The use of heuristic allows for the features extraction to enable identity verification using classical neural network. The results of the research are presented and discussed to show efficiency of the proposed methodology.
Electronics and Telecommunications Committee
2017-04-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0021
International Journal of Electronics and Telecommunications; Vol 63, No 2 (2017); 159-164
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0021/384
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4315
2023-10-28T09:18:15Z
ijet:INFORMAT
Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway
Lakhno, Valerii
Shalabayeva, Maira
Kryvoruchko, Olena
Desyatko, Alona
Chubaievskyi, Vitaliy
Alibiyeva, Zhibek
ecological safety; hardware-software complex; monitoring; environment; emergency situation; railway transport
A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed hardware-software system consists of several main components. The first software component, based on the queueing theory (QT), simulates the workload of emergency response units at the RY accident site. It also interacts with a central data processing server and information collection devices. A transmitter for these devices was built on the ATmega328 microcontroller. The hardware part of the environmental monitoring system at the RY accident site is also based on the ATmega328 microcontroller. In the hardware-software system for monitoring the EnvState at the RY accident site, the data processing server receives information via the MQTT protocol from all devices about the state of each sensor and the device's location at the RY accident or disaster site, accompanied by EnvState contamination. All data is periodically recorded in a database on the server in the appropriate format with timestamps. The obtained information can then be used by specialists from the emergency response headquarters.
Electronics and Telecommunications Committee
2023-10-28
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147691
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023); 707-712
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147691/1154
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147691/4233
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147691/4234
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.24425-ijet.2023.147691/4235
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/154
2015-03-10T23:31:30Z
ijet:INFORMAT
Prefiltering in Wavelet Analysis Applying Cubic B-Splines
Rakowski, Waldemar
Applied informatics, Signal processing
Wavelet transform algorithms (Mallat's algorithm, a trous algorithm) require input data in the form of a sequence of numbers equal to the signal projectioncoefficients on a space spanned by integer-translated copies of a scaling function.After sampling of the continuous-time signal, it is most frequently possible to compute only approximated values of the signal projection coefficients by choosing a specific signal approximation. Calculation of the signal projection coefficientsbased on the signal interpolation by means of cubic B-splines is proposed in the paper.
Electronics and Telecommunications Committee
2014-12-10
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.2478-eletel-2014-0044
International Journal of Electronics and Telecommunications; Vol 60, No 4 (2014); 331-340
2300-1933
eng
http://ijet.pl/index.php/ijet/article/view/10.2478-eletel-2014-0044/55
http://ijet.pl/index.php/ijet/article/downloadSuppFile/10.2478-eletel-2014-0044/49