Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 42
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This article reflects on key concepts of historical thinking proposed by doctoral students and young researchers. Established concepts such as the social role of history, professional historian and (imagined) space are still important to the new generation of historians. At the same time, some new concepts are emerging, such as political exhumations, mass graves, motion, embodied historical research, ahistorical memory politics, websites as historical sources, critical heritage studies and heritagisation, treason, preposterous history – an idea taken from Mieke Bal, and “Supreme Peace” – a notion drawn from the Chinese philosophy of history. To interpret these concepts, I build word clouds as a way of creating knowledge involving non‑human factors (algorithms) while enabling speculative interpretations of the relations between words. The idea of a secure past comes to the fore and I therefore examine whether historical security and being secure in history could be considered important elements of interdisciplinary security studies.
Go to article

Bibliography

Adamczyk, Marcin. „Teoretyczne wprowadzenie do badań nad bezpieczeństwem”. W Polska – Europa – świat wczoraj i dziś, red. Magdalena Debita, Marcin Adamczyk, 54–74. Poznań: Media‑Expo Wawrzyniec Wierzejewski, 2017.
Austin, John Langshaw. Mówienie i poznawanie: rozprawy i wykłady filozoficzne. Warszawa: Wydawnictwo Naukowe PWN, 1993.
Bal, Mieke. Quoting Caravaggio: Contemporary Art, Preposterous History. Chicago: University of Chicago Press, 1999.
Bal, Mieke. Wędrujące pojęcia w naukach humanistycznych: krótki przewodnik. Warszawa: Narodowe Centrum Kultury, 2012.
Pihlainen, Kalle, „The Distinction of History: On Valuing the Insularity of the Historical Past”. Rethinking History 20, nr 3 (2016): 414–432.
Pokruszyński, Witold. Filozoficzne aspekty bezpieczeństwa. Józefów: Wydawnictwo WSGE im. Alcide De Gasperi w Józefowie, 2011.
White, Hayden. Przeszłość praktyczna. Kraków: Universitas, 2014.
Go to article

Authors and Affiliations

Ewa Domańska
1
ORCID: ORCID

  1. Uniwersytet im. Adama Mickiewicza w Poznaniu
Download PDF Download RIS Download Bibtex

Abstract

The biggest software development companies conduct daily more than hundreds deployments which influence currently operating IT (Information Technology) systems. This is possible due to the availability of automatic mechanisms which are providing their functional testing and later applications deployment. Unfortunately, nowadays, there are no tools or even a set of good practices related to the problem on how to include IT security issues into the whole production and deployment processes. This paper describes how to deal with this problem in the large mobile telecommunication operator environment.

Go to article

Authors and Affiliations

Grzegorz Siewruk
Wojciech Mazurczyk
Andrzej Karpiński
Download PDF Download RIS Download Bibtex

Abstract

Defects affect the properties and behavior of the casting during its service life. Since the defects can occur due to different reasons, they

must be correctly identified and categorized, to enable applying the appropriate remedial measures. several different approaches for

categorizing casting defects have been proposed in technical literature. They mainly rely on physical description, location, and formation

of defects. There is a need for a systematic approach for classifying investment casting defects, considering appropriate attributes such as

their size, location, identification stage, inspection method, consistency, appearance of defects. A systematic approach for categorization of

investment casting defects considering multiple attributes: detection stage, size, shape, appearance, location, consistency and severity of

occurrence. Information about the relevant attributes of major defects encountered in investment casting process has been collected from

an industrial foundry. This has been implemented in a cloud-based system to make the system freely and widely accessible.

Go to article

Authors and Affiliations

Amit V. Sata
Download PDF Download RIS Download Bibtex

Abstract

The article presents a method for 3D point cloud segmentation. The point cloud comes from a FARO LS scanner – the device creates a dense point cloud, where 3D points are organized in the 2D table. The input data set consists of millions of 3D points – it makes widely known RANSAC algorithms unusable. We add some modifi cations to use RANSAC for such big data sets.

Go to article

Authors and Affiliations

Leszek Luchowski
Przemysław Kowalski
Download PDF Download RIS Download Bibtex

Abstract

The process of designing and creating an integrated distributed information system for storing digitized works of scientists of research institutes of the Almaty academic city is analyzed. The requirements for the storage of digital objects are defined; a comparative analysis of the open source software used for these purposes is carried out. The system fully provides the necessary computing resources for ongoing research and educational processes, simplifying the prospect of its further development, and allows to build an advanced IT infrastructure for managing intellectual capital, an electronic library that is intended to store all books and scientific works of the Kazakhstan Engineering Technological University and research institutes of the Almaty academic city.

Go to article

Authors and Affiliations

Nurlan M. Temirbekov
Tahir M. Takabayev
Dossan R. Baigereyev
Waldemar Wójcik
Konrad Gromaszek
Almas N. Temirbekov
Bakytzhan B. Omirzhanova
Download PDF Download RIS Download Bibtex

Abstract

A review of a new Polish translation of Aristophanes’ Clouds by Olga Śmiechowicz.
Go to article

Authors and Affiliations

Tomasz Mojsik
1

  1. Wydział Historii i Stosunków Międzynarodowych, Uniwersytet w Białymstoku
Download PDF Download RIS Download Bibtex

Abstract

A response to the review of a new Polish translation of Aristophanes’ Clouds, which appeared in the previous issue of “Meander”.
Go to article

Authors and Affiliations

Olga Śmiechowicz
1
ORCID: ORCID

  1. Wydział Polonistyki, Uniwersytet Jagielloński
Download PDF Download RIS Download Bibtex

Abstract

This paper deals with a methodology for the implementation of cloud manufacturing (CM) architecture. CM is a current paradigm in which dynamically scalable and virtualized resources are provided to users as services over the Internet. CM is based on the concept of coud computing, which is essential in the Industry 4.0 trend. A CM architecture is employed to map users and providers of manufacturing resources. It reduces costs and development time during a product lifecycle. Some providers use different descriptions of their services, so we propose taking advantage of semantic web technologies such as ontologies to tackle this issue. Indeed, robust tools are proposed for mapping providers’ descriptions and user requests to find the most appropriate service. The ontology defines the stages of the product lifecycle as services. It also takes into account the features of coud computing (storage, computing capacity, etc.). The CM ontology will contribute to intelligent and automated service discovery. The proposed methodology is inspired by the ASDI framework (analysis–specification–design–implementation), which has already been used in the supply chain, healthcare and manufacturing domains. The aim of the new methodology is to propose an easy method of designing a library of components for a CM architecture. An example of the application of this methodology with a simulation model, based on the CloudSim software, is presented. The result can be used to help the industrial decision-makers who want to design CM architectures.

Go to article

Authors and Affiliations

E. Talhi
J.-C. Huet
V. Fortineau
S. Lamouri
Download PDF Download RIS Download Bibtex

Abstract

Confidential algorithm for the approximate graph vertex covering problem is presented in this article. It can preserve privacy of data at every stage of the computation, which is very important in context of cloud computing. Security of our solution is based on fully homomorphic encryption scheme. The time complexity and the security aspects of considered algorithm are described.
Go to article

Authors and Affiliations

Daniel Waszkiewicz
Aleksandra Horubała
Piotr Sapiecha
Michał Andrzejczak
Download PDF Download RIS Download Bibtex

Abstract

The idea of using the Cloud of Things is becoming more critical for e-government, as it is considered to be a useful mechanism of facilitating the government’s work. The most important benefit of using the Cloud of Things concept is the increased productivity that the e-governments would achieve; which eventually would lead to significant cost savings; which in turn would have a highly anticipated future impact on egovernments. E-government’s diversity goals face many challenges; trust is one of the major challenges that it is facing when deploying the Cloud of Things. In this study, a new trust framework is proposed which supports trust with the Internet of Things devices interconnected to the cloud; to support the services that are provided by e-government to be delivered in a trusted manner. The proposed framework has been applied to a use case study to ensure its trustworthiness in a real mission. The results show that the proposed trust framework is useful to ensure achieving a trusted environment for the Cloud of Things for it to continue providing and gathering the data needed for the services that are offered by users through E-government.

Go to article

Authors and Affiliations

Hasan Abualese
Thamer Al-Rousan
Bassam Al-Shargabi
Download PDF Download RIS Download Bibtex

Abstract

This paper proposes an advanced routing method in the purpose of increasing IoT routing device’s power-efficiency, which allows to centralize routing tables computing as well as to push loading, related to routing tables computation, towards the Cloud environment at all. We introduced a phased solution for the formulated task. Generally, next steps were performed: stated requirements for the system with Cloud routing, proposed possible solution, and developed the whole system’s structure. For a proper study of the efficiency, the experiment was conducted using the developed system’s prototype for real-life cases, each represents own cluster size (several topologies by each size), used sizes are: 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27 and 29. Expectable results for this research – decrease the time of cluster’s reaction on topology changes (delay, needed to renew routing tables), which improves system’s adaptivity.

Go to article

Authors and Affiliations

Valentyn Faychuk
Orest Lavriv
Bohdan Strykhalyuk
Olga Shpur
Ivan Demydov
Roman Bak
Download PDF Download RIS Download Bibtex

Abstract

The rapid development of the global economy has led to an increasing demand for resources. The disparity between the supply and demand of resources continues to be prominent and shows a situation of short supply. Resource investment projects with large amounts and long construction periods face many risks due to various unpredictable factors. Cultural, legal, economic and other environments vary between different countries. Therefore, comprehensive risk identification, understanding, evaluation, and analysis are important prerequisites for the success of mineral investment. In this paper, the risk of mineral resources investment in host countries is identified. A risk evaluation index system is established to objectively evaluate the risk environment of the host country. The risk evaluation index system includes four first-level indexes: political and legal risk, social and cultural risk, economic and financial risk, and natural risk. The subjective weight was determined by sending questionnaires to experts and scholars in the industry and conducting data processing. The entropy method was used to determine the objective weight. Finally, the subjective weight and the objective weight were combined to obtain a group of scientific and accurate combined weights. The matter-element theory was introduced into the cloud model and a risk assessment model based on the cloud matter-element theory was constructed with comprehensive consideration of the fuzziness and randomness of risks. Eight countries with relatively rich mineral resources were taken as cases to verify the model application. The research results provide a theoretical basis and decision-making methods for mineral enterprise investment.
Go to article

Authors and Affiliations

Jie Hou
1
Guoqing Li
1
Jiahong Ling
1
Lianyun Chen
2
Wei Zhao
3
ORCID: ORCID
Baoli Sheng
3

  1. University of Science and Technology Beijing, China
  2. University of Science and Technology Beijing, China; Shandong Gold Group Co., Ltd., Jinan, China
  3. Sanshandao Gold Mine, Shandong Gold Group Mining (Laizhou) Co., Ltd., Yantai, China
Download PDF Download RIS Download Bibtex

Abstract

The paper aims at the higher reactive power management complexity caused by the access of distributed power, and the problem such as large data exchange capacity, low accuracy of reactive power distribution, a slow convergence rate, and so on, may appear when the controlled objects are large. This paper proposes a reactive power and voltage control management strategy based on virtual reactance cloud control. The coupling between active power and reactive power in the system is effectively eliminated through the virtual reactance. At the same time, huge amounts of data are treated to parallel processing by using the cloud computing model parallel distributed processing, realize the uncertainty transformation between qualitative concept and quantitative value. The power distribution matrix is formed according to graph theory, and the accurate allocation of reactive power is realized by applying the cloud control model. Finally, the validity and rationality of this method are verified by testing a practical node system through simulation.

Go to article

Authors and Affiliations

Wei Min Zhang
Yan Xia Zhang
Download PDF Download RIS Download Bibtex

Abstract

Recently, Google Earth Engine (GEE) provides a new way to effectively classify land cover utilizing available in-built classifiers. However, there have a few studies on the applications of the GEE so far. Therefore, the goal of this study is to explore the capacity of the GEE platform in terms of land cover classification in Dien Bien Province of Vietnam. Land cover classification in the year of 2003 and 2010 were performed using multiple-temporal Landsat images. Two algorithms – GMO Max Entropy and Classification and Regression Tree (CART) integrated into the Google Earth Engine (GEE) plat-form – were applied for this classification. The results indicated that the CART algorithm performed better in terms of mapping land use. The overall accuracy of this algorithm in the year of 2003 and 2010 were 80.0% and 81.6%, respective-ly. Significant changes between 2003 and 2010 were found as an increase in barren land and a reduction in forest land. This is likely due to the slash-and-burn agricultural practice of ethnic minorities in the province. Barren land seems to occur more at locations near water sources, reflecting the local people’s unsuitable farming practice. This study may provide use-ful information in land cover change in Dien Bien Province, as well as analysis mechanisms of this change, supporting en-vironmental and natural resource management for the local authorities.

Go to article

Authors and Affiliations

Luong B. Nguyen
Download PDF Download RIS Download Bibtex

Abstract

With the rapid development of remote sensing technology, our ability to obtain remote sensing data has been improved to an unprecedented level. We have entered an era of big data. Remote sensing data clear showing the characteristics of Big Data such as hyper spectral, high spatial resolution, and high time resolution, thus, resulting in a significant increase in the volume, variety, velocity and veracity of data.This paper proposes a feature supporting, salable, and efficient data cube for timeseries analysis application, and used the spatial feature data and remote sensing data for comparative study of the water cover and vegetation change. In this system, the feature data cube building and distributed executor engine are critical in supporting large spatiotemporal RS data analysis with spatial features. The feature translation ensures that the geographic object can be combined with satellite data to build a feature data cube for analysis. Constructing a distributed executed engine based on dask ensures the efficient analysis of large-scale RS data. This work could provide a convenient and efficient multidimensional data services for many remote sens-ing applications.
Go to article

Authors and Affiliations

Yassine Sabri
1
Fadoua Bahja
1
Henk Pet
2

  1. Laboratory of Innovation in Management and Engineering for Enterprise (LIMIE), ISGA Rabat, 27 Avenuel Oqba, Agdal, Rabat, Morocco
  2. Terra Motion Limited, 11 Ingenuity Centre, Innovation Park, Jubilee Campus, University of Nottingham, Nottingham NG7 2TU, UK
Download PDF Download RIS Download Bibtex

Abstract

The unpredictable and huge data generation nowadays by smart devices from IoT and mobile Crowd Sensing applications like (Sensors, smartphones, Wi-Fi routers) need processing power and storage. Cloud provides these capabilities to serve organizations and customers, but when using cloud appear some limitations, the most important of these limitations are Resource Allocation and Task Scheduling. The resource allocation process is a mechanism that ensures allocation virtual machine when there are multiple applications that require various resources such as CPU and I/O memory. Whereas scheduling is the process of determining the sequence in which these tasks come and depart the resources in order to maximize efficiency. In this paper we tried to highlight the most relevant difficulties that cloud computing is now facing. We presented a comprehensive review of resource allocation and scheduling techniques to overcome these limitations. Finally, the previous techniques and strategies for allocation and scheduling have been compared in a table with their drawbacks.
Go to article

Authors and Affiliations

Abbas M. Ali Al-muqarm
1 2
Naseer Ali Hussien
3

  1. University of Kufa, Iraq
  2. Computer Technical Engineering Department, The Islamic University, Iraq
  3. Alayen University, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Workflow Scheduling is the major problem in Cloud Computing consists of a set of interdependent tasks which is used to solve the various scientific and healthcare issues. In this research work, the cloud based workflow scheduling between different tasks in medical imaging datasets using Machine Learning (ML) and Deep Learning (DL) methods (hybrid classification approach) is proposed for healthcare applications. The main objective of this research work is to develop a system which is used for both workflow computing and scheduling in order to minimize the makespan, execution cost and to segment the cancer region in the classified abnormal images. The workflow computing is performed using different Machine Learning classifiers and the workflow scheduling is carried out using Deep Learning algorithm. The conventional AlexNet Convolutional Neural Networks (CNN) architecture is modified and used for workflow scheduling between different tasks in order to improve the accuracy level. The AlexNet architecture is analyzed and tested on different cloud services Amazon Elastic Compute Cloud- EC2 and Amazon Lightsail with respect to Makespan (MS) and Execution Cost (EC).
Go to article

Bibliography

  1. A.M. Manasrah and H. Ba Ali, “Workflow scheduling using hybrid GA-PSO algorithm in cloud computing,” Wireless Commun. Mob. Comput., vol. 15, no. 3, pp. 1–16, 2018, doi: 10.1155/2018/1934784.
  2.  S.G. Ahmad, C.S. Liew, E.U. Munir, A.T. Fong, and S.U. Khan, “A hybrid genetic algorithm for optimization of scheduling workflow applications in heterogeneous computing systems,” J. Parallel Distrib. Comput., vol. 87, no. 2, pp. 80–90, 2016, doi: 10.1016/j. jpdc.2015.10.001.
  3.  H. Alaskar, A. Hussain, N. Al-Aseem, P. Liatsis, and D. Al-Jumeily, “Application of convolutional neural networks for automated ulcer detection in wireless capsule endoscopy images,” Sensors., vol. 19, no. 6, pp. 1265–1281, 2019, doi: 10.3390/s19061265.
  4.  L. Teylo, L. Arantes, P. Sens, and L.M.A. Drummond, “A dynamic task scheduler tolerant to multiple hibernations in cloud environments,” J. Cluster Comput., vol. 21, no. 5, pp. 1–23, 2020, doi: 10.1007/s10586-020-03175-2.
  5.  M. Sardaraz and M. Tahir, “A parallel multi-objective genetic algorithm for scheduling scientific workflows in cloud computing,” Int. J. Distri. Sensor Net., vol. 16, no. 8, pp. 1–10, 2020, doi: 10.1177/1550147720949142.
  6.  M. Hosseinzadeh, M.Y. Ghafour, and H.K. Hama, “Multi-objective task and workflow scheduling approaches in cloud computing: a comprehensive review,” J. Grid Comput., vol. 18, no. 3, pp. 327–356, 2020, doi: 10.1007/s10723-020-09533-z.
  7.  C.L. Chen, M.L. Chiang, and C.B. Lin, “The high performance of a task scheduling algorithm using reference queues for cloud- computing data centers,” Electronics, . vol. 9, no. 1, pp. 371–379, 2020, doi: 10.3390/electronics9020371.
  8.  Y. Hu, H. Wang, and W. Ma, “Intelligent Cloud workflow management and scheduling method for big data applications,” J. Cloud Comp, vol. 9, no. 1, pp. 1–13, 2020, doi: 10.1186/s13677-020-00177-8.
  9.  M. Grochowski, A. Kwasigroch, and A. Mikołajczyk,” Selected technical issues of deep neural networks for image classification purposes,” Bull. Polish Acad. Sci. Tech. Sci., vol. 67, no. 2, pp. 363–376, 2019, doi: 10.24425/bpas.2019.128485.
  10.  A.A. Nasr, N.A. El-Bahnasawy, and G. Attiya, “Cost-effective algorithm for workflow scheduling in cloud computing under deadline constraint,” Arab. J. Sci. Eng., vol.44, no. 4, pp. 3765–3780, 2019, doi: 10.1007/s13369-018-3664-6.
  11.  Z. Swiderska-Chadaj, T. Markiewicz, J. Gallego, G. Bueno, B. Grala, and M. Lorent, “Deep learning for damaged tissue detection and segmentation in Ki-67 brain tumor specimens based on the U-net model,” Bull. Polish Acad. Sci. Tech. Sci., vol. 66, no. 6, pp. 849–856, 2018, doi: 10.24425/bpas.2018.125932.
  12.  Y. Cui and Z. Xiaoqing, “Workflow tasks scheduling optimization based on genetic algorithm in Clouds,” in IEEE 3rd Int. Conf. on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, 2018, pp. 6–10, doi: 10.1109/ICCCBDA.2018.8386458.
  13.  T. Wang, Z. Liu, Y. Chen, Y. Xu, and X. Dai, “Load balancing task scheduling based on Genetic algorithm in Cloud Computing,” in IEEE 12th Int. Conf. on Dependable, Autonomic and Secure Computing, Dalian, 2014, pp. 146–152, doi: 10.1109/DASC.2014.35.
  14.  X. Zhao, Y. Wu, G. Song, Z. Li, Y. Zhang, and Y. Fan, “A deep learning model integrating FCNNs and CRFs for brain tumor segmentation,” Med. Imag. Anal., vol. 43, no. 4, pp.  98–111, 2018, doi: 10.1016/j.media.2017.10.002.
  15.  C. Liu, R. Zhao, W. Xie, and M. Pang, “Pathological lung segmentation based on random forest combined with deep model and multi- scale superpixels,” Neu. Proc, Let., vol. 52, no. 2, pp. 1631–1649, 2020, doi: 10.1007/s11063-020-10330-8.
  16.  C. Zhang, J. Zhao, Ji. Niu, and D. Li, “New convolutional neural network model for screening and diagnosis of mammograms,” PLoS One., vol. 15, no. 8, pp. 67–80, 2020, doi: 10.1371/journal.pone.0237674.
  17.  L.D. Nicanor, H.R. Orozco Aguirre, and V.M. Landassuri Moreno, “An assessment model to establish the use of services resources in a cloud computing scenario,” J. High Perf. Vis. Int., vol. 12, no. 5, pp. 83–100, 2020, doi: 10.1007/978-981-15-6844-2_7.
  18.  V. Magudeeswaran and J. Fenshia Singh, “Contrast limited fuzzy adaptive histogram equalization for enhancement of brain images,” Int. J. Imag. Sys. and Tech., vol. 27, no. 1, pp. 98–103, 2017, doi: 10.1002/ima.22214.
  19.  S.P. Cleary and J.S. Prell, “Liberating native mass spectrometry from dependence on volatile salt buffers by use of Gábor transform,” Int. J. Imag. Syst. Tech., vol. 20, no. 4, pp. 519–523, 2019, doi: 10.1002/cphc.201900022.
  20.  V. Srivastava, R.K. Purwar, and A. Jain, “A dynamic threshold‐based local mesh ternary pattern technique for biomedical image retrieval,” Int. J. Imag. Sysy. Tech., vol.29, no. 2, pp. 168–179, 2019, doi: 10.1002/ima.22296.
  21.  J.H. Johnpeter and T. Ponnuchamy, “Computer aided automated detection and classification of brain tumors using CANFIS classification method,” Int. J. Imag. Sysy. Tech., vol.29, no. 4, pp. 431–438, 2019, doi: 10.1002/ima.22318.
  22.  N. Kumar and D. Kumar, “Classification using artificial neural network optimized with bat algorithm”, Int. J. Innovative Tech. Exploring Eng. (IJITEE), vol. 9, no. 3, pp.  696–700, 2020, doi: 10.35940/ijitee.C8378.019320.
  23.  A.S. Mahboob and S.H. Zahiri, “Automatic and heuristic complete design for ANFIS classifier, network: computation in neural systems,” J. Net. Comput. Neu. Syst., vol. 30, no. 4, pp. 31–57, 2019, doi: 10.1080/0954898X.2019.1637953.
  24.  C. Shorten and T.M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” J. Big. Data., vol.  60, no. 6, pp. 1–48, 2019, doi: 10.1186/s40537-019-0197-0.
Go to article

Authors and Affiliations

P. Tharani
1
A.M. Kalpana
1

  1. Department of Computer Science and Engineering, Government College of Engineering, Salem-636011, Tamil Nadu, India
Download PDF Download RIS Download Bibtex

Abstract

The problem of performing software tests using Testing-as-a-Service cloud environment is considered and formulated as an~online cluster scheduling on parallel machines with total flowtime criterion. A mathematical model is proposed. Several properties of the problem, including solution feasibility and connection to the classic scheduling on parallel machines are discussed. A family of algorithms based on a new priority rule called the Smallest Remaining Load (SRL) is proposed. We prove that algorithms from that family are not competitive relative to each other. Computer experiment using real-life data indicated that the SRL algorithm using the longest job sub-strategy is the best in performance. This algorithm is then compared with the Simulated Annealing metaheuristic. Results indicate that the metaheuristic rarely outperforms the SRL algorithm, obtaining worse results most of the time, which is counter-intuitive for a metaheuristic. Finally, we test the accuracy of prediction of processing times of jobs. The results indicate high (91.4%) accuracy for predicting processing times of test cases and even higher (98.7%) for prediction of remaining load of test suites. Results also show that schedules obtained through prediction are stable (coefficient of variation is 0.2‒3.7%) and do not affect most of the algorithms (around 1% difference in flowtime), proving the considered problem is semi-clairvoyant. For the Largest Remaining Load rule, the predicted values tend to perform better than the actual values. The use of predicted values affects the SRL algorithm the most (up to 15% flowtime increase), but it still outperforms other algorithms.

Go to article

Authors and Affiliations

J. Rudy
C. Smutnicki
Download PDF Download RIS Download Bibtex

Abstract

Cloud-based computational environments can offer elastic and flexible services to wide audiences. Małopolska Educational Cloud was originally developed to support the day-to-day collaboration of geographically scattered schools with universities which organized online classes, led by university teachers, as an amendment to face-to-face teaching. Due to the centralized management and ubiquitous access, both the set of services provided by MEC and their usage patterns can be adjusted rapidly. In this paper we show how – during the COVID-19 pandemic – the flexibility of Małopolska Educational Cloud was leveraged to speed up the transition from in-class to remote teaching, both in the classes and schools which were already involved in the MEC project, and newly added ones. We also discuss the actions that were required to support the smooth transition and draw conclusions for the future.
Go to article

Bibliography

  1.  K. Zieliński, Ł. Czekierda, F. Malawski, R. Straś, and S. Zieliński, “Recognizing value of educational collaboration between high schools and universities facilitated by modern ICT,” J. Comput. Assisted Learn., vol. 33, no. 6, pp. 633–648, 2017.
  2.  Ł. Czekierda, K. Zieliński, and S. Zieliński, “Automated orchestration of online educational collaboration in cloud-based environments,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 17, no. 1, pp. 1–26, 2021.
  3.  “WHO coronavirus disease (COVID-19) pandemic,” https://www.who.int/emergencies/diseases/novel-coronavirus-2019, accessed: 2020-12- 30.
  4.  N. Fernandes, “Economic effects of coronavirus outbreak (COVID-19) on the world economy,” IESE Business School Working Paper No. WP-1240-E, 2020, doi: 10.2139/ssrn.3557504.
  5.  V. Venkatesh, “Impacts of COVID-19: A research agenda to support people in their fight,” Int. J. Inf. Manage., vol. 55, p. 102197, 2020.
  6.  A. Tubadji, F. Boy, and D.J. Webber, “Narrative economics, public policy and mental health,” Covid Econ., vol. 20, pp. 109–131, 2020.
  7.  “UNESCO COVID-19 impact on education,” https://en.unesco.org/covid19/educationresponse, accessed: 2020-12-30.
  8.  G. Vial, “Understanding digital transformation: A review and a research agenda,” J. Strategic Inf. Syst., vol. 28, no. 2, pp. 118–144, 2019.
  9.  Y.K. Dwivedi, D.L. Hughes, C. Coombs, I. Constantiou, Y. Duan, J.S. Edwards et al., “Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life,” Int. J. Inf. Manage., vol. 55, p. 102211, 2020.
  10.  T.D. Oyedotun, “Sudden change of pedagogy in education driven by COVID-19: Perspectives and evaluation from a developing country,” Res. Globalization, vol. 2, p. 100029, 2020.
  11.  M. Assunção Flores and M. Gago, “Teacher education in times of COVID-19 pandemic in Portugal: national, institutional and pedagogical responses,” J. Educ. Teach., vol. 46, no. 4, pp. 507–516, 2020.
  12.  N. Iivari, S. Sharma, and L. Ventä-Olkkonen, “Digital transformation of everyday life–how COVID-19 pandemic transformed the basic education of the young generation and why information management research should care?” Int. J. Inf. Manage., vol. 55, p. 102183, 2020.
  13.  L. Mishra, T. Gupta, and A. Shree, “Online teachinglearning in higher education during lockdown period of COVID-19 pandemic,” Int. J. Educ. Res. Open, vol. 1, p. 100012, 2020.
  14.  A. Qazi, et al., “Conventional to online education during COVID-19 pandemic: Do develop and underdeveloped nations cope alike,” Child. Youth Serv. Rev., vol. 119, p. 105582, 2020.
  15.  I. Asanov, F. Flores, D. McKenzie, M. Mensmann, and M. Schulte, “Remote-learning, time-use, and mental health of Ecuadorian high- school students during the COVID-19 quarantine,” World Dev., vol. 138, p. 105225, 2021.
  16.  M. Adnan and K. Anwar, “Online learning amid the COVID-19 pandemic: Students’ perspectives,” J. Pedagogic. Sociol. Psychol., vol. 2, no. 1, pp. 45–51, 2020.
  17.  C.M. Toquero, “Challenges and opportunities for higher education amid the COVID-19 pandemic: The Philippine context,” Pedag. Res., vol. 5, no. 4, 2020.
  18.  K.H. Mok, W. Xiong, G. Ke, and J.O.W. Cheung, “Impact of COVID-19 pandemic on international higher education and student mobility: Student perspectives from mainland China and Hong Kong,” Int. J. Educ. Res., vol. 105, p. 101718, 2021.
  19.  S.P. Becker, R. Breaux, C.N. Cusick, M.R. Dvorsky, N.P. Marsh, E. Sciberras, and J.M. Langberg, “Remote learning during COVID-19: Examining school practices, service continuation, and difficulties for adolescents with and without attention-deficit/hyperactivity disorder,” J. Adolesc. Health, vol. 67, no. 6, pp. 769–777, 2020.
  20.  M. Kogan, S.E. Klein, C.P. Hannon, and M.T. Nolte, “Orthopaedic education during the COVID-19 pandemic,” J. Am. Acad. Orthop. Surg., vol. 28, no. 11, pp. e456–e464, 2020.
  21.  V.A. Jones, K.A. Clark, C. Puyana, and M.M. Tsoukas, “Rescuing medical education in times of COVID-19,” Clin. Dermatol., vol. 39, no. 1, pp. 33–40, 2021.
  22.  N. Carroll and K. Conboy, “Normalising the “new normal”: Changing tech-driven work practices under pandemic time pressure,” Int. J. Inf. Manage., vol. 55, p. 102186, 2020.
  23.  W. Ali, “Online and remote learning in higher education institutes: A necessity in light of COVID-19 pandemic,” High. Educ. Stud., vol. 10, no. 3, 2020.
  24.  F.M. Reimers and A. Schleicher, “A framework to guide an education response to the COVID-19 pandemic of 2020,” OECD. Retrieved April, vol. 14, no. 2020, pp. 2020–04, 2020.
Go to article

Authors and Affiliations

Łukasz Czekierda
1
Filip Malawski
1
Robert Straś
1
Krzysztof Zieliński
1
ORCID: ORCID
Sławomir Zieliński
1

  1. AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

The research was aimed at analysing the factors that affect the accuracy of merging point clouds when scanning over longer distances. Research takes into account the limited possibilities of target placement occurring while scanning opposite benches of quarries or open-pit mines, embankments from opposite banks of rivers etc. In all these cases, there is an obstacle/void between the scanner and measured object that prevents the optimal location of targets and enlarging scanning distances. The accuracy factors for cloud merging are: the placement of targets relative to the scanner and measured object, the target type and instrument range. Tests demonstrated that for scanning of objects with lower accuracy requirements, over long distances, it is optimal to choose flat targets for registration. For objects with higher accuracy requirements, scanned from shorter distances, it is worth selecting spherical targets. Targets and scanned object should be on the same side of the void.

Go to article

Authors and Affiliations

G. Lenda
P. Lewińska
J. Siwiec
Download PDF Download RIS Download Bibtex

Abstract

Terrestrial laser scanner (TLS) is a new class of survey instruments to capture spatial data developed rapidly. A perfect facility in the oil industry does not exist. As facilities age, oil and gas companies often need to revamp their plants to make sure the facilities still meet their specifications. Due to the complexity of an oil plant site, there are difficulties in revamping, having all dimensions and geometric properties, getting through narrow spaces between pipes and having the description label of each object within a facility site. So it is needed to develop an accurate observations technique to overcome these difficulties. TLS could be an unconventional solution as it accurately measures the coordinates identifying the position of each object within the oil plant and provide highly detailed 3D models. This paper investigates creating 3D model for Ras Gharib oil plant in Egypt and determining the geometric properties of oil plant equipment (tank, vessels, pipes . . . etc.) using TLS observations and modeling by CADWORX program. The modeling involves an analysis of several scans of the oil plant. All the processes to convert the observed points cloud into a 3D model are described. The geometric properties for tanks, vessels and pipes (radius, center coordinates, height and consequently oil volume) are also calculated and presented. The results provide a significant improvement in observing and modeling of an oil plant and prove that the TLS is the most effective choice for generating a representative 3D model required for oil plant revamping.

Go to article

Authors and Affiliations

Ahlam I. Elgndy
Zaki M. Zeidan
Ashraf A. Beshr
Download PDF Download RIS Download Bibtex

Abstract

The focus of research works on cavitation has changed since the 1960s; the behaviour of a single bubble is no more the area of interest for most scientists. Its place was taken by the cavitating flow considered as a whole. Many numerical models of cavitating flows came into being within the space of the last fifty years. They can be divided into two groups: multifluid and homogeneous (i.e., single-fluid) models. The group of homogenous models contains two subgroups: models based on transport equation and pressure based models. Several works tried to order particular approaches and presented short reviews of selected studies. However, these classifications are too rough to be treated as sufficiently accurate. The aim of this paper is to present the development paths of numerical investigations of cavitating flows with the use of homogeneous approach in order of publication year and with relatively detailed description. Each of the presented model is accompanied by examples of the application area. This review focuses not only on the list of the most significant existing models to predict sheet and cloud cavitation, but also on presenting their advantages and disadvantages. Moreover, it shows the reasons which inspired present authors to look for new ways of more accurate numerical predictions and dimensions of cavitation. The article includes also the division of source terms of presented models based on the transport equation with the use of standardized symbols.

Go to article

Authors and Affiliations

Agnieszka Niedźwiedzka
Günter H. Schnerr
Wojciech Sobieski
Download PDF Download RIS Download Bibtex

Abstract

In the paper, a noise map service designated for the user interested in environmental noise is presented. Noise prediction algorithm and source model, developed for creating acoustic maps, are working in the cloud computing environment. In the study, issues related to the noise modelling of sound propagation in urban spaces are discussed with a particular focus on traffic noise. Examples of results obtained through a web application created for that purpose are shown. In addition, these are compared to results obtained from the commercial software simulations based on two road noise prediction models. Moreover, the computing performance of the developed application is investigated and analyzed. In the paper, a flowchart simulating the operation of the noise web-based service is presented showing that the created application is easy to use even for people with little experience in computer technology.
Go to article

Authors and Affiliations

Karolina Marciniuk
Bożena Kostek
Maciej Szczodrak

This page uses 'cookies'. Learn more