The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Evolutionary algorithms are optimization methods inspired by natural evolution. They usually search for the optimal solution in large space areas. In Evolutionary Algorithms it is very important to select an appropriate balance between the ability of the algorithm to explore and exploit the search space. The paper presents a hybrid system consisting of a Genetic Algorithm and an Evolutionary Strategy...
The paper uses machine learning methods to deal with the problem of reducing the cost of applying mutation testing. A method of classifying mutants of a program using structural similarity is proposed. To calculate such a similarity each mutant is firstly converted into a hierarchical graph, which represents the mutant's control flow, variables and conditions. Then using such a graph form graph kernels...
This paper presents methods solving MS-RCPSP as a main task-resource-time assignment optimization problem. In the paper there are presented four variants of Evolutionary Algorithm applied to MS-RCPSP problem: concerning prioritization the tasks (or resources), combined task-resources prioritizing approach and co-evolution based approach that effectively solves problem dividing it to two subproblems...
Deep neural networks enjoy high interest and have become the state-of-art methods in many fields of machine learning recently. Still, there is no easy way for a choice of network architecture. However, the choice of architecture can significantly influence the network performance. This work is the first step towards an automatic architecture design. We propose a genetic algorithm for an optimization...
The paper is devoted to the problem of automatic geometry evaluation of the log moving through the conveyor. The video sequence obtained from the single camera is used as the input data. The principal restrictions of the target objects described for the given task, and the requirements to the video recording of the manufacturing process are formulated on the basis of datasets from more than .5M video...
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness...
The Ambient intelligence (AmI) paradigm refers to electronic environments which are sensitive and responsive to the presence of people. Queue systems are practically used in various institutions and commercial enterprises constituting a challenge for the intelligent environments in smart cities. The management of the customer flows guarantees elimination or reduction of the queues as well as the economic...
This article proposes an ontology design pattern leading knowledge providers to represent knowledge in more normalized, precise and inter-related ways, hence in ways that help automatic matching and exploitation of knowledge from different sources. This pattern is also a knowledge sharing best practice that is domain and language independent. It can be used as a criteria for measuring the quality...
In this paper the authors present the results of research to develop the visual system for autonomous flying agent. The core elements of the vision system which were designed and implemented in the earlier stage of the project are brought together. The second aim is to show capabilities of a simulation environment designed and developed by the authors in order to enable testing of the vision systems...
IoT applications has some characteristics that set it apart from other fields mainly due to the multitude of different types of sensors producing data. In monitoring applications, data processing requires real-time or soft real-time responses in order to aid systems to make important decisions but also predictive analysis to leverage the potential of IoT by data mining vast datasets. This paper presents...
The paper is concerned with the application of mobile ad hoc networks to phenomena clouds boundary detection and tracking. Self-organizing, coherent networks comprised of sensors and radio transceivers that maintain a continuous communication with each other and a central operator are considered. The attention is focused on the methodology for determining the temporarily optimal network topology for...
Collaboration in business environments is an ongoing trend that is enabled by and based on cloud computing. It supports flexible and ad-hoc reconfiguration and integration of different services, which are provided and used via the internet, and implemented within business processes. This is an important competitive advantage for the participating stakeholders. However, trust, policy compliance, and...
This paper addresses the problem of selecting the most appropriate project management and communication software for a project having specific requirements. A four-stage procedure featuring the weighted regularized Hasse method is used to compare and rank the candidate tools. The ranking of the tools takes into consideration the importance of the functional and non-functional features of the project...
In control applications, we often encounter systems that respond to the change of control signal in an undesirable way. To adjust system output, there arises the need to know system parameters, so the identification has to be performed. The aim of this paper is to compare upstanding identification error that is the consequence of dataset size, input signal type, and quantization error occurring in...
The aim of our study is to investigate ERP project critical success factors (CSFs) with a focus on higher education institutes (HEIs). We conducted a systematic literature review to identify specific CSFs affecting HEIs' project outcome. Building on these results, we led several interviews within selected German HEIs. Overall, there is little literature dealing with the HEIs' CSFs, but nearly all...
IEEE 802.11 WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) to initiate the Request to Send / Clear to Send (RTS/CTS) handshaking mechanism that solves the hidden node problem. However RTS/CTS also causes the exposed node problem where a node is unnecessarily prevented from accessing the wireless channel even when such access will not disrupt another nodes ongoing transmission...
An Enterprise Architecture (EA) is used for the design and realization of the business processes, along with user roles, applications, data, and technical infrastructures. Over time, maintaining an EA update may become a complex issue, let alone an organization-wide architecture and its related artifacts. EA practices provide much of the required guidelines for the design and development of EAs. However,...
Due to high availability of e-commerce websites providing similar services and products, the website usability becomes one of the most critical factors affecting online businesses' success. Therefore, website quality and user experience evaluation is an important research task. There are multiple methodologies for performing the evaluation. The proposed in our earlier studies PEQUAL methodology extends...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.