Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 35
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Neonatal sepsis, defi ned as sepsis occurring within the fi rst 28 days of life, is associated with signifi cant morbidity and mortality. It is undeniable that fi nding and appliance of biomarkers in clinical practice is of great importance, aiming at the early recognition of the impending clinical deterioration and the prompt and targeted therapeutic intervention. Aft er systematic and thorough research of the limited relevant literature, we attempt to present a documented point-of-view on the diagnostic value of TREM-1 and its soluble form both in early and late onset neonatal sepsis.

Go to article

Authors and Affiliations

Dimitrios Patoulias
Maria-Styliani Kalogirou
Ioannis Patoulias
Download PDF Download RIS Download Bibtex

Abstract

Nowadays, it's hard to stay togdifficult to remain Yourself. How we behave in critical situations and if fight for our identity, our specificity, depends on us. How to live, we would not seem to us that we live in? The issues taken in this article are related to the specificity of highlander, and our choices which play an important role in my life. The first part of the article describes the basic concepts, including specificity, being yourself, singularity. In the next part a signpost were shown, which „saves” described highlander specificity. The aim of the article is to show the (frequently forged) highland value in aspect of creating ourself, our attitude towards life, which involve a lot of positives. I assert that the specificity of the highland is the value of itself creation.
Go to article

Authors and Affiliations

Anna Wojtas-Rduch
Download PDF Download RIS Download Bibtex

Abstract

The aim of the paper is to analyse the Italian medical terminology, in particular will be taken into consideration the link between names of different illnesses and rhetoric procedures that might have influenced their lexical form. The examples of medical nomenclature will enable to illustrate the attitude towards the concept of illness and to show the complexity of phenomena perception and the impossibility to understand them completely. For this reason literary tropes, especially metonymy, enable to create terminology, although it will be never enough sufficient to guarantee the highest precision of these concepts.

Go to article

Authors and Affiliations

Katarzyna Maniowska
Download PDF Download RIS Download Bibtex

Abstract

The paper aims to discuss the specific characteristics of Italian employment contract from a linguistic point of view as well as from the point of view of the translation. First of all, the employment contract as a legal document will be discussed in regard to the text classifi cation proposed by Sabatini (1990). Moreover, the general typology of Italian and Polish employment contracts will be taken into consideration. The analysis is complemented by Polish equivalents of the main Italian terms and phrases used usually in the employment contact. The fi nal comments will be dedicated to the issue of translation procedures used for dealing with the translation shifts proposed by Vinay and Darbelnet (1958) and Cosmai (2007).
Go to article

Authors and Affiliations

Lucyna Marcol-Cacoń
Download PDF Download RIS Download Bibtex

Abstract

The paper aims to analyse the relationship between the city space and the art present in public spaces and narrative located therein. Analysis of selected examples of contemporary art in urban space and literature allows the conclusion, that interdisciplinary narrativity descending from a literary work, allows for the transfer of meanings from public art objects to the city space and individual narratives of recipients. Not just the meanings, that the artists intend to convey, but also the meanings individually interpreted by those, who observe the work.

Go to article

Authors and Affiliations

Ernestyna Szpakowska-Loranc
Download PDF Download RIS Download Bibtex

Abstract

The aim of this paper is to analyse various animal-specifi c complex lexical units together with patterns that can be held responsible for their underlying conceptual structure. Many examples of the data investigated in the paper seem to represent compounds as they are traditionally understood in the literature of the subject (see, among others, Bauer 2003; Katamba and Stonham 2006; Lieber and Štekauer 2009; Fàbregas and Scalise 2012; Bauer et al. 2013); however, others do not meet the basic criteria for compoundhood as postulated by, for example, Altakhaineh (2016). In my research I use the term animal-specifi c complex lexical units with reference to all animal-related composite expressions being the result of the working of metaphor-metonymy interaction.

Go to article

Authors and Affiliations

Robert Kiełtyka
Download PDF Download RIS Download Bibtex

Abstract

The energy sector, particularly that related to renewable energy, is growing rapidly. The analysis of factors influencing the production of electricity from solar radiation is important in terms of the ever-increasing number of photovoltaic (PV) installations. In Poland, the vast majority of installed PV capacity belongs to prosumers, so a comparative analysis was conducted for two domestic installations, one in southern Poland and the other located in central Poland. Operating conditions were compared, specifically with regard to irradiance, outdoor temperature and the calculated temperature of photovoltaic cells. The specific yield was then compared in daily, monthly and annual statements. The effects of the previously mentioned parameters on the energy yields of the two installations were considered. The installation in southern Poland in 2022 produced 5,136.6 kWh, which corresponds to a specific yield of 1,019.17 kWh/kWp, while the energy production of the installation in central Poland was 4,248.9 kWh, which corresponds to a specific yield of 965.67 kWh/kWp.
Go to article

Authors and Affiliations

Emilia Kazanecka
1
Piotr Olczak
2
ORCID: ORCID

  1. Mineral and Energy Economy Research Institute, Polish Academy of Sciences; AGH University of Science andTechnology, Kraków, Poland
  2. Mineral and Energy Economy Research Institute, Polish Academy of Sciences, Poland
Download PDF Download RIS Download Bibtex

Abstract

Slender systems are mostly studied when Euler’s load or follower load is considered. The use of those types of external loads results in well-known divergence or flutter shape of the characteristic curve. In this study, one takes into account the specific load which allows one to obtain an interesting divergence – pseudo flutter shape of characteristic curves on the external load–vibration frequency plane. The curves can change inclination angle as well as one can observe the change in vibration modes along them. The shape of those curves depends not only on the parameters of the slender system but also on loading heads that induce the specific load. In this study, one considers the slender multimember system in which cracks are present and weaken the host structure. The results of theoretical as well as numerical simulations are focused on the influence of the parameters of the loading heads on vibrations, stability, and loading capacity of the investigated system as well as on the possibility of partial reduction of unwanted crack effect.
Go to article

Authors and Affiliations

Krzysztof Sokół
1
ORCID: ORCID
Krzysztof Kuliński
2

  1. Department of Mechanics and Machine Design Foundations, Czestochowa University of Technology, Czestochowa, Poland
  2. Department of Civil Engineering, Czestochowa University of Technology, Czestochowa, Poland
Download PDF Download RIS Download Bibtex

Abstract

Structural solutions in terms of fish ladders and the use of natural materials to construct them often raise concerns regarding the possibility of using the standard calculation methods. The fish ladder being designed on the Wisłok river consists of three pools, separated from each other by baffles made of rock boulders. The purpose of this study was to analyze water surface profiles for fish ladder at specific values of flow rates. The paper presents the results of hydraulic calculations under the conditions of constant flow rate based on the concept of a minimum specific energy. According to this method, water flow through boulders is critical. Thus, it does not take into account head losses, which are hard to estimate and which are the integral part of typical calculation methods, e.g. the use of equations to determine the flow rate of a weir. An additional advantage of this method is that there is no need to assume the flow pattern of one specific weir. Verification calculations of the water depths were conducted using the HEC–RAS software, under an assumption of an one-dimensional steady water flow. Water depths in the fish ladder, calculated using both methods, were similar, despite the adopted different calculation concepts, and can be used in ichthyologic analyses.
Go to article

Authors and Affiliations

Michał Kubrak
1
ORCID: ORCID
Błażej Smoliński
1
ORCID: ORCID
Jaromír Riha
2
ORCID: ORCID
Apoloniusz Kodura
1
ORCID: ORCID
Paweł Popielski
1
ORCID: ORCID
Kamil Jabłoński
3

  1. Warsaw University of Technology, Faculty of Building Services, Hydro and Environmental Engineering, ul. Nowowiejska 20, 00-653 Warsaw, Poland
  2. Brno University of Technology, Faculty of Civil Engineering, Veverí 331/95, 602 00 Brno, Czech Republic
  3. Energoprojekt-Warszawa SA, Al. Niepodległosci 58, 02-626 Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper comprises the review of all 23 known valid species along with synonyms and polytomic keys based on morphological features. Mature specimens of 8 species occur in fishes, 4 in birds, 11 in mammals. Each species settles in a definite section of the digestive tract. The structure of a population is dependent upon the time which has passed since the moment of invasion and the intensity of infestation. Acathocephalans can be found in hosts all the year round, but incomplete seasonality of the occurrence of 2 fish parasites has been recorded. Fish parasites show wide specificity in relation to the hosts mentioned while bird and mammal parasites specificity is narrow. The majority of acanthocephalan species have circumpolar distribution but only 3 have been found inside the polar circle and the other 7 are common in the environs of subcontinental archipelagoes. Acanthocephalans do not yield precedence as far as the diversity of species and infestation intensity are concerned in the Antarctic to other groups of parasite helminths. Their great importance results from their mass occurrence in the vertebrates which are the focus of. man's practical interests — fishes, seals and whales.

Go to article

Authors and Affiliations

Krzysztof Zdzitowiecki
Download PDF Download RIS Download Bibtex

Abstract

The purpose of the study was to evaluate selected mechanical properties and structural characteristics of samples manufactured using composite filament fabrication (CFF) technology from Onyx material, whichwas filled with continuous glass fiber. Selected mechanical properties were correlated with the density of the resulting composite to determine the specific strength of the fabricated parts. The test specimens were manufactured on a Mark Two Enterprise machine (Markforged, USA) using composite filament fabrication (CFF) technology. The material used was polyamide 6.6 with a 20% short carbon fiber content with the trade name Onyx. Continuous glass fiber was used to reinforce the fabrication. The density of the manufactured samples was determined using a hydrostatic method. Methanol was used as the liquid. By determining the density of the samples, it was possible to estimate through appropriate calculations what specific strength and specific modulus the obtained composites would have. Determination of tensile and flexural strengths was carried out in accordance with ISO 527-1:2012 and ISO 178:2003. Determination of the impact tensile strength of the samples was carried out in accordance with ISO 8256, the beams were tested using the A method. Due to the high impact tensile strength, two 1 mm notches with an angle of 45°were made on the specimens. The image of the sample structure obtained by the CFF method was recorded using a CT scanner. A thermogravimetric test (TG) of the Onyx matrix material was carried out. The samples were tested approximately 72 hours after fabrication. Filling the samples with continuous glass fiber above 50% leads to a slight increase in impact resistance. The density of the composite increased by only 16% relative to the reference samples, resulting in a 389% increase in the maximum average flexural strength. Despite significant discontinuities in the structure of the produced composite, it was possible to record an increase in tensile strength and Young’s modulus by 606% and 370%, respectively.
Go to article

Authors and Affiliations

Dawid Marciniak
1
ORCID: ORCID
Dariusz Sykutera
1
ORCID: ORCID
Piotr Czyżewski
1

  1. Faculty of Mechanical Engineering, Department of Manufacturing Techniques, Bydgoszcz University of Science and Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

The presence of art in historic representative buildings is widespread and common. It is not surprising, therefore, that it is a frequent tool used in the transformation processes of these structures. A surprise, however, may be a situation where, instead of the art from the period of the creation of a given monument, the contemporary, multimedia or engaging the viewer cultural activities occur. Therefore, the key questions are the role of such forms of intervention in the historical representative interiors and the possibility of co-existing old and new. It is not without significance for objects under conservator’s protection that there are special requirements that the intervention must fulfill to be installed. The subject of considerations in this work are case studies of the application of contemporary multimedia art in the representative spaces of historical objects. The purpose of the article is to examine types of such artistic interventions resulting from the relationship between a work of art and exhibition space and their mutual influence.

Go to article

Authors and Affiliations

Joanna Szechlicka
Katarzyna Urbanowicz
Download PDF Download RIS Download Bibtex

Abstract

Glass and ceramic industries are the main consumption areas of quartz sand, which is a formed as a result of the weathering of igneous metamorphic rocks. In such industries, it is very important to select the correct ball size in order to grind the raw material to the desired particle size in optimum time. In this study, the changes in the specific rate of breakage of the quartz sand sample were investigated by using cylpebs of three different sizes. For this purpose, three different mono-size samples were prepared according to 4√2 series in the range of 0.090-0.053 mm. The quartz sand prepared in these three intervals were ground with 10×10, 20×20 and 30×30 mm cylpebs for different durations. Specific rate of breakage values were obtained from the particle size distributions acquired after various grinding periods. As a result of grinding tests, an increase in rate of breakage is observed due to the increase in cylpebs diameter.
Go to article

Bibliography

[1] DPT, Madencilik özel ihtisas komisyonu raporu, endüstriyel hammaddeler alt komisyonu toprak sanayii hammaddeleri III . Devlet Planlama Teşkilatı, 2613 624, Ankara (2001).
[2] SERH AM, Seramik, cam ve çimento hammaddeleri üreticileri derneği 2015-2017 dönemi faaliyet raporu, (2017).
[3] N . Yıldız, Cevher Hazırlama ve Zenginleştirme, Ertem Basım Yayın Dağıtım, Ankara (2014).
[4] S . Haner, The Effects of Ball Size on the Determination of Breakage Parameters of Nepheline Syenite. J. Min. Sci. 56 (5), 848-856 (2020). DOI : https://doi.org/10.1134/S1062739120057191
[5] K.S. Lidell, Machines for Fine Milling to Improve the Recovery of Gold from Calcines and Pyrite. Proceeding of the International Conference on Gold, Johannesburg 405-417 (1986).
[6] J. Bouchard, G. LeBlanc, M. Levesque, P. Radziszewski, D. Georges-Filteau, Breaking down Energy Consumption in Industrial Grinding Mills. In Proceedings 49th Annual Canadian Mineral Processors Operators Conference, 25-35, Canadian Institute of Mining, Metallurgy and Petroleum (2017).
[7] D.W. Fuerstenau, A.-Z.M. Abouzeid, The Energy Efficiency of Ball Milling in Comminution. Int. J. Miner. Process. 67 (1-4), 161-185 (2002). DOI : https://doi.org/10.1016/S0301-7516(02)00039-X
[8] A.K. Schellinger, A Calorimetric Method for Studying Grinding in a Tumbling Medium, Trans. AIME 190, 518- 522 (1951).
[9] M . Vardar, E. Bozkurtoğlu, Yerkabuğunu Oluşturan Maddeler Mineraller ve Kayaçlar. İnşaat Jeolojisi, 2009-2010 Course Year Grades, 20 (2009).
[10] L .G. Austin, K. Shoji, P.T. Luckie, The Effect of Ball Size on Mill Performance. Powder Technol. 14 (1), 71-79 (1976). DOI : https://doi.org/10.1016/0032-5910(76)80009-5
[11] F .C. Bond, Grinding Ball Size Selection. Trans. AIME , 592-595 (1958).
[12] T.S. Yusupov, E.A. Kirillova, G.A. Denisov, Dressing of Quartz-Feldspar Ores on the Basis of Selective Grinding and Mechanical Activation. J. Min. Sci. 39, 174-177 (2003). DOI : https://doi.org/10.1023/B:JOMI.0000008464.34124.1d
[13] W.H. Coghill, F.D. Devaney, Ball Mill Grinding. (1937). https://play.google.com/books/reader?id = k4MbYBy8674C&hl = tr&pg = GBS.PP1,access:15.12.2019
[14] M . Wolosiewicz-Glab, D. Foszcz, T. Gawenda, S. Ogonowski, Design of an Electromagnetic Mill. Its Technological and Control System Structures for Dry Milling. E3S Web of Conferences: Mineral Engineering Conference (MEC 2016), Poland 8 01066 (2016).
[15] K. Barani, H. Balochi, First-order and Second-order Breakage Rate of Coarse Particles in Ball mill Grinding. Physicochem. Probl. Miner. Process. 52 (1), 268-278 (2016). DOI : https://doi.org/10.5277/ppmp160123
[16] K. Barani, H. Balochi, A Comparative Study on the Effect of Using Conventional and High Pressure Grinding Rolls Crushing on the Ball Mill Grinding Kinetics of an Iron Ore. Physicochem. Probl. Miner. Process. 52 (2), 920-931 (2016). DOI : https://doi.org/10.5277/ppmp160231
[17] T.P. Olejnik, Grinding Kinetics of Granite Considering Morphology and Physical Properties of Grains. Physicochem. Probl. Miner. Process. 48 (1), 149-158 (2012).
[18] L .G. Austin, R.R. Klimpel, P.T. Luckie, Process Engineering of Size Reduction: Ball Milling, American Institute of Mining Metallurgical and Petroleum Engineers Inc., New York, United States of America (1984).
[19] L .G. Austin, R. Bagga, M. Çelik, Breakage Properties of Some Materials in a Laboratory Ball Mill. Powder Technol. 28 (2), 235-241 (1981). DOI : https://doi.org/10.1016/0032-5910(81)87049-0.
[20] K. Shoji, L.G. Austin, F. Smaila, K. Brame, P.T. Luckie, Further Studies of Ball and Powder Filling Effects in Ball Milling. Powder Technol. 31 (1), 121-126 (1982). DOI : https://doi.org/10.1016/0032-5910(82)80013-2
Go to article

Authors and Affiliations

Serhan Haner
1
ORCID: ORCID

  1. Afyon Kocatepe University, Department of Industrial Product Design, Dinar Yerleşkesi, Cumhuriyet Mh. Kooperat if Cd . No: 1, Dinar, Afyonkarahisar, Turkey
Download PDF Download RIS Download Bibtex

Abstract

Most satellites stationed in space use catalytic propulsion systems for attitude control and orbit adjustment. Hydrazine is consumed extensively as liquid monopropellant, in the thrusters. Catalytic reactor is the most important section in the catalytic thruster. Ammonia and nitrogen gases are produced as a result of complete catalytic decomposition of hydrazine in the reactor, causing an increase in temperature and a rise in specific impulse. Ammonia is subsequently decomposed, leading to nitrogen and hydrogen gases. Decomposition of ammonia leads to a decrease in temperature, molecular weight and specific impulse. The latter phenomenon is unavoidable. The effect of ammonia decomposition on the reactor temperature, molecular weight of gaseous products and conclusively on specific impulse was studied in this article. At adiabatic state, thermodynamic analysis revealed that the maximum and minimum temperatures were 1655 K and 773 K, respectively. The highest molecular weight was obtained at ammonia conversion of zero and the lowest when ammonia conversion was 100%. The maximum specific impulse (305.4 S) was obtained at ammonia conversion of zero and completely conversion of ammonia, the minimum specific impulse (about 213.7 s) was obtained. For specific impulse, the result of thermodynamic calculation in this work was validated by the empirical results.

Go to article

Authors and Affiliations

Shahram Pakdehi
Fatemeh Shirvani
Reihaneh Zolfaghari
Download PDF Download RIS Download Bibtex

Abstract

Groundwater is a vital resource for domestic, agricultural, and industrial activities, as well as for ecosystem services. Despite this, the resource is under significant threat, due to increasing contamination from anthropogenic activities. Therefore, to ensure its reliability for present and future use, effective management of groundwater is important not only in terms of quantity (i.e. abstraction) but also quality. This can be achieved by identifying areas that are more vulnerable to contamination and by implementing protective measures. To identify the risk and delineate areas that are more exposed to pollution, various groundwater vulnerability assessment techniques have been developed across the globe. This paper presents an overview of some of the commonly used groundwater vulnerability assessment models in terms of their unique features and their application. Special emphasis is placed on statistical methods and overlay-index techniques. The assessment of the literature shows that statistical methods are limited in application to the assessment of groundwater vulnerability to pollution because they rely heavily on the availability of sufficient and quality data. However, in areas where extensive monitoring data are available, these methods estimate groundwater vulnerability more realistically in quantitative terms. Many works of research indicate that index-overlay methods are used extensively and frequently in groundwater vulnerability assessments. Due to the qualitative nature of these models, however, they are still subject to modification. This study offers an overview of a selection of relevant groundwater vulnerability assessment techniques under a specificset of hydro-climatic and hydrogeological conditions.
Go to article

Authors and Affiliations

Simeneh Shiferaw Moges
1
ORCID: ORCID
Megersa Olumana Dinka
1
ORCID: ORCID

  1. University of Johannesburg, Faculty of Engineering and the Built Environment, Department of Civil Engineering Sciences, PO Box 524, Auckland Park, 2006 Johannesburg, South Africa
Download PDF Download RIS Download Bibtex

Abstract

Groundwater is a very important natural resource to support the activities of the residents of Pakis District, Malang Regency. On the other hand, increased activity puts pressure on groundwater quality. Agricultural intensification, urbanisation, and industrialisation can be sources of pollutants. Hydrological factors, topography, lithology, and surrounding rainfall are triggers for contamination of groundwater. The main objective of this research is to determine the characteristics, quality of groundwater, and its susceptibility to pollution. To complete this research, geoelectric measurements were carried out at 43 points spread throughout the study area and sampling of 18 shallow wells in agricultural, residential, and industrial areas for chemical analysis. All data obtained were analysed to create a map of the spatial distribution of groundwater vulnerability. The results show that the groundwater in the study location is in the transition zone and flows through the volcanic rock layers. The level of groundwater pollution is in the uncontaminated status to heavily polluted with pollutants in the form of heavy metal manganese and Escherichia coli bacteria. The spatial distribution of groundwater intrinsic vulnerability shows low, moderate, and high levels of vulnerability, respectively 32.99%, 60.87%, and 6.14% of the research area. Groundwater specific vulnerability associated with land use factors shows that 26.25% are negligible, 42.46% are low, and 31.29% are moderate. From this it can be concluded that the study area has been polluted both geogenically and anthropogenically, therefore, special actions must be taken to restore the quality of groundwater.
Go to article

Bibliography

ALLER L., BENNET T., LEHER J.H., PETTY R.J., HACKETT G. 1987. DRASTIC: A standardized system for evaluating ground water pollution potential using hydrogeological settings. (EPA600/2-87-035). Ada, OK. US EPA pp. 622.
ALLEY W.M., REILLY T.E., FRANKE O.L. 1999. Sustainability of ground- water resources. Denver, CO. U.S. Geological Survey. ISBN 0-607 -93040-3 pp. 79.
ARAUZO M. 2017. Vulnerability of groundwater resources to nitrate pollution: A simple and effective procedure for delimiting nitrate vulnerable zones. Science of The Total Environment. Vol. 575 p. 799–812. DOI 10.1016/j.scitotenv.2016.09.139.
BISRI M. 2012. Air Tanah: Studi Tentang Pendugaan Air Tanah, Sumur Air Tanah dan Upaya Dalam Konservasi Air Tanah [Study on estimating groundwater, groundwater wells and efforts in groundwater conservation]. Malang. UB Press. ISBN 978-602- 203-201-4 pp. 124.
BISWAS A.K., TORTAJADA C., IZQUIERDO R. (eds.) 2009. Water manage-ment in 2020 and beyond. Ser. Water Resources Development and Management. Berlin. Springer. ISBN 978-3-642-10041-3 pp. 16+268.
DEVNITA R. 2012. Melanic and fulvic andisols in volcanic soils derived from some volcanoes in West Java. Indonesian Journal of Geology. Vol. 7(4) p. 227–240. DOI 10.17014/ijog.v7i4.149.
FOSTER S., HIRATA R., GOMES D., D’ELIA M., PARIS M. 2007. Groundwater quality protection. 2nd ed. Washington, D.C. The World Bank. ISBN 0-8213-4951-1 pp. 103.
GOGU R., DASSARGUES A. 2000. Current trends and future challenges in groundwater vulnerability assessment using overlay and index methods. Environmental Geology. Vol. 39 p. 549–559. DOI 10.1007/s002540050466.
IMAN M.I., RIAWAN E., SETIAWAN B., ABDURAHMAN O. 2017. Air tanah untuk adaptasi perubahan iklim di Malang, Jawa Timur: Penilaian risiko penurunan ketersediaan air [Groundwater for climate change adaptation in Malang, East Java: Risk assessment of decreased water availability]. Indonesian Journal of Geology and Mining. Vol. 27(1) p. 47–46. DOI 10.14203/risetgeotam2017.v27.438.
Keputusan Menteri Negara Lingkungan Hidup nomor: 115 tahun 2003 tentang pedoman penentuan status mutu air [Decree of the State Minister of the Environment number: 115 of 2003 regarding guidelines for determining the status of water quality] [online]. [Access at 10.12.2020]. Available at: https://indok3ll.com/kepu-tusan-menteri-negara-lingkungan-hidup-nomor-115-tahun-2003/
MACHIWAL D., JHA M.K., SINGH V.P., MOHAN C. 2018. Assessment and mapping of groundwater vulnerability to pollution: Current status and challenges. Earth Science Reviews. Vol. 185 p. 901– 927. DOI 10.1016/j.earscirev.2018.08.009.
Peraturan Menteri Kesehatan Republik Indonesia No. 492/menkes/per/ iv/2010 tentang persyaratan kualitas air minum [Regulation of the Minister of Health of the Republic of Indonesia No. 492/ menkes/per/iv/2010 regarding drinking water quality require-ments] [online]. [Access 29.11.2020]. Available at: https://indok3ll.com/peraturan-menteri-kesehatan-republik-indonesia- nomor-492-menkes-per-iv-2010-tentang-persyaratan-kualitas-air-minum/
POST J.E. 1999. Manganese oxide minerals: Crystal structures and economic and environmental significance. Proceedings of the National Academy of Sciences. Vol. 96(7) p. 3447–3454. DOI 10.1073/pnas.96.7.3447.
PURWANTO S., RACHMAT A.G., SUKARMAN 2018. Karakteristik mineral tanah berbahan vulkanik dan potensi kesuburannya di Pulau Jawa [Characteristic of volcanic soil minerals and their fertility potential in Java Island. Jurnal Sumberdaya Lahan. Vol. 12(2) p. 83–98.
PUTRI D., PERDINAN 2018. Analysis of regional water availability for domestic water demand (Case study: Malang Regency). Agromet. Vol. 32(2) p. 93–102. DOI 10.29244/j.agromet.32.2.93-102.
RIBEIRO L., PINDO J.C., DOMINGUEZ-GRANDA L. 2017. Assessment of groundwater vulnerability in the Daule aquifer, Ecuador, using the susceptibility index method. Science of The Total Environment. Vol. 574 p. 1674–1683. DOI 10.1016/j.scitotenv.2016.09.004.
RIYADI A. 2018. Pendekatan daya dukung dan daya tampung air dalam perencanaan tata ruang (Study kasus Wilayah Malang) [Carrying capacity and water capacity approach in spatial planning (Case study of Malang region)]. MSc Thesis. Malang. Pascasarjana Universitas Brawijaya pp. 153.
SALMAN S.A., ARAUZO M., ELNAZER A.A. 2019. Groundwater quality and vulnerability assessment in west Luxor Governorate, Egypt. Groundwater for Sustainable Development. Vol. 8 p. 271–280. DOI 10.1016/j.gsd.2018.11.009.
SISWOYO H. 2018. Identifikasi tingkat kerentanan akuifer terhadap pencemaran di Kecamatan Sumobito Kabupaten Jombang dengan menggunakan metode GOD [Identification of aquifer vulnerability levels to pollution in Sumobito District, Jombang Regency using the GOD method. Jurnal Sains Dan Edukasi Sains. Vol. 1(2) p. 1–6. DOI 10.24246/juses.v1i2p1-6.
SRI HARTO BR. 1993. Analisis hidrologi [Hydrological analysis]. Jakarta. Gramedia Pustaka Utama. ISBN 979-511-235-X pp. 17+287.
SUHENDRA V. 2016. Eksplorasi metode geolistrik: Resistivitas, polarisasi terinduksi, dan potensial diri [Geoelectric method exploration: Resistivity, induced polarization, and self potential. Malang. UB Press. ISBN 978-602-203-937-2 pp. 17+140.
THIRUMALAIVASAN D., KARMEGAM M., VENUGOPAL K. 2003. AHP- DRASTIC: Software for specific aquifer vulnerability assessment using DRASTIC model and GIS. Environmental Modelling & Software. Vol. 18. Iss. 7 p. 645–656. DOI 10.1016/S1364-8152(03)00051-3. TODD D.K. 1980. Groundwater hydrology. New York. John Wiley and Sons Inc. ISBN 0-471-87616-X pp. 13+535.
UNESCO 2018. Nature-based solutions for water. The United Nations World Water Development Report. United Nations Educational, Scientific and Cultural Organization, WWAP France. ISBN 978- 92-3-100264-9 pp. 154.
VRBA J., ZAPOROŽEC A. 1994. Guidebook on mapping groundwater vulnerability. Ser. International contributions to hydrogeology. Vol. 16. International Association of Hydrogeologists. Hannover. H. Heise. ISBN 9783922705970 pp. 23+131.
WELLS E.H. 1918. Manganese in New Mexico. Bulletin of The New Mexico State School of Mines. No. 2 pp. 13+84.
WIDYASTUTI M., SUDARTO, ANGGAYANA K 2006. Pengembangan metode ‘DRASTIC’ untuk prediksi kerentanan air tanah bebas terhadap pencemaran di Sleman [Development of the ‘DRASTIC’ method for predicting the vulnerability of unconfined groundwater to pollution in Sleman. Majalah Geografi Indonesia. Vol. 20(1) p. 32–51.
ZEKTSER I.S. 2000. Groundwater and the environment: Applications for the global community. Boca Raton, Florida. Lewis Publishers. ISBN 978-1566703833 pp. 192.
Go to article

Authors and Affiliations

Prasetyo Rubiantoro
1
Mohammad Bisri
1
Aminudin Afandhi
1

  1. Universitas Brawijaya, Postgraduate Program, Jalan Veteran, Malang 65142, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies, based on social, political, and technological instruments. We postulate that multi-agent systems can provide a common platform to study (and balance) their essential properties. We also show how to obtain a comprehensive list of the properties by “distilling” them from media snippets. Finally, we present a preliminary take on their formal specification, using ideas from multi-agent logics.
Go to article

Bibliography

  1.  A. Soltani, R. Calo, and C. Bergstrom, “Contacttracing apps are not a solution to the COVID-19 crisis,” Brookings Tech Stream, 27 April 2020. [Online]. Available: https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/.
  2.  J. Morley, J. Cowls, M. Taddeo, and L. Floridi, “Ethical guidelines for COVID-19 tracing apps,” Nat. Comment, pp. 29–31, 4 June 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01578-0.
  3.  A. Stollmeyer, M. Schaake, and F. Dignum, “The Dutch tracing app ’soap opera’ – lessons for Europe,” euobserver, 7 May 2020. [Online]. Available: https://euobserver.com/opinion/148265.
  4.  G. Weiss, Ed., Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence. MIT Press: Cambridge, Mass, 1999.
  5.  Y. Shoham and K. Leyton-Brown, Multiagent Systems – Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, 2009.
  6.  A. Rao and M. Georgeff, “Modeling rational agents within a BDI-architecture,” in Proceedings of KR, 1991, pp. 473–484.
  7.  M.Wooldridge, Reasoning about Rational Agents. MIT Press : Cambridge, Mass, 2000.
  8.  M. Dastani, K. Hindriks, and J. Meyer, Eds., Specification and Verification of Multi-Agent Systems. Springer, 2010.
  9.  W. Jamroga, Logical Methods for Specification and Verification of Multi-Agent Systems. ICS PAS, 2015.
  10.  W. Jamroga, D. Mestel, P.B. Rønne, P.Y.A. Ryan, and M. Skrobot, “A survey of requirements for COVID-19 mitigation strategies. Part I: newspaper clips,” CoRR, vol. abs/2011.07887, 2020.
  11.  A. Lomuscio, H. Qu, and F. Raimondi, “MCMAS: An open-source model checker for the verification of multiagent systems,” Int. J. Software Tools Technol. Trans., vol. 19, no. 1, pp. 9–30, 2017.
  12.  G. Behrmann, A. David, and K. Larsen, “A tutorial on UPPAAL,” in Formal Methods for the Design of Real-Time Systems: SFM-RT, ser. LNCS, no. 3185. Springer, 2004, pp. 200–236.
  13.  G. Kant, A. Laarman, J. Meijer, J. van de Pol, S. Blom, and T. van Dijk, “LTSmin: High-performance languageindependent model checking,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 9035. Springer, 2015, pp. 692–707.
  14.  D. Kurpiewski, W. Jamroga, and M. Knapik, “STV: Model checking for strategies under imperfect information,” in Proceedings of AAMAS. IFAAMAS, 2019, pp. 2372–2374.
  15.  S. Woodhams, “COVID-19 digital rights tracker,” Top10VPN, 10 June 2020. [Online]. Available: https://www.top10vpn.com/research/ covid-19-digital-rights-tracker/.
  16.  AFP, “Major finding: Lockdowns averted 3 million deaths in 11 European nations: study,” RTL Today, 9 June 2020. [Online]. Available: https://today.rtl.lu/news/science-and-environment/a/ 1530963.html.
  17.  I. Ilves, “Why are Google and Apple dictating how European democracies fight coronavirus?” The Guardian, 16 June 2020. [Online]. Available: https://www.theguardian.com/commentisfree/2020/jun/16/google-apple-dictating-european-democracies-coronavirus.
  18.  “NHS COVID-19: the new contact-tracing app from the NHS,” NCSC, 14 May 2020. [Online]. Available: https://www.ncsc.gov.uk/ information/nhs-covid-19-app-explainer.
  19.  J. Steinhauer and A. Goodnough, “Contact tracing is failing in many states. Here’s why.” New York Times, 5 October 2020. [Online]. Available: https://www.nytimes.com/2020/07/31/health/covid-contact-tracing-tests.html.
  20.  S. Bicheno, “Unlike France, Germany decides to do smartphone contact tracing the Apple/Google way,” telecoms.com, 27 April 2020. [Online]. Available: https://telecoms.com/503931/unlike-france-germany-de cides-to-do-smartphone-contact-tracing-the-apple-goo gle- way/.
  21.  “Together we can fight coronavirus — Smittestopp,” helsenorge, 28 April 2020. [Online]. Available: https://helsenorge.no/coronavirus/ smittestopp?redirect=false.
  22.  P.H. O’Neill, T. Ryan-Mosley, and B. Johnson, “A flood of coronavirus apps are tracking us. now it’s time to keep track of them,” MIT Technol. Rev., 7 May 2020. [Online]. Available: https://www.technologyreview.com/2020/05/07/1000961/launching-mittr-covid-tracing- tracker/.
  23.  M. Zastrow, “Coronavirus contact-tracing apps: can they slow the spread of COVID-19?” Nature (Technol. Feature), 19 May 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01514-2.
  24.  J. Taylor, “How did the Covidsafe app go from being vital to almost irrelevant?” The Guardian, 23 May 2020. [Online]. Available: https://www.theguardian.com/world/2020/may/24/how-did-the-covidsafe-app-go-from-being-vital-to-almost-irrelevant.
  25.  D. Robertson, “Transparency key to uptake of coronavirus tracing app,” RMIT news, 27-April 2020. [Online]. Available: https://www. rmit.edu.au/news/all-news/2020/april/transparency-key-to-uptake-of-coronavirus-traci ng-app.
  26.  D. Tahir and C. Lima, “Google and Apple’s rules for virus tracking apps sow division among states,” Politico, 10 June 2020. [Online]. Available: https://www.politico.com/news/2020/06/10/google-and-apples-rules-for-virus-tracking-apps-sow-division-among-states-312199.
  27.  A. Clarance, “Aarogya Setu: Why India’s Covid-19 contact tracing app is controversial,” BBC News, 15 May 2020. [Online]. Available: https://www.bbc.com/news/world-asia-india-52659520.
  28.  J. Davies, “UK snubs Google and Apple privacy warning for contact tracing app,” telecoms.com, 28 April 2020. [Online]. Available: https://telecoms.com/503967/uk-s nubs-google-and-apple-privacy-warning-for-contact-tr acing-app/.
  29.  A. Eisenberg, “Privacy fears threaten New York City’s coronavirus tracing efforts,” Politico, 4 June 2020. [Online]. Available: https:// www.politico.com/states/new-york/albany/story/2020/06/04/privacy-fears-threaten-new-york-citys-coronavirus-tracing-efforts-1290657.
  30.  C. Timberg, “Most Americans are not willing or able to use an app tracking coronavirus infections. that’s a problem for Big Tech’s plan to slow the pandemic,” Washington Post, 29 April 2020. [Online]. Available: https://www.washingtonpost.com/technology/2020/04/ 29/ most-americans-are-not-willing-or-able-use-an-app-tracking-coronavirus-infections-thats-problem-big-tec hs-plan-slow-pandemic/.
  31.  M. Burgess, “Just how anonymous is the NHS Covid-19 contact tracing app?” Wired, 12 May 2020. [Online]. Available: https://www. wired.co.uk/article/nhs-covid-app-data-anonymous.
  32.  “Getting it right: States struggle with contact tracing push,” Politico, 17 May 2020. [Online]. Available: https://www.politico.com/ news/2020/05/17/privacy-coronavirus-tracing-261369.
  33.  S.L. Frasier, “Coronavirus antibody tests have a mathematical pitfall,” Sci. Am., 1 July 2020. [Online]. Available: https://www. scientificamerican.com/article/coronavirus-antibody-tests- have-a-mathematical-pitfall/.
  34.  M. Scott and Z. Wanat, “Poland’s coronavirus app offers playbook for other governments,” Politico, 2 April 2020. [Online]. Available: https://www.politico.eu/article/poland-coronavirus-app-offers-playbook-for-other-governments/.
  35.  K. McCarthy, “UK finds itself almost alone with centralized virus contact-tracing app that probably won’t work well, asks for your location, may be illegal,” The Register, 5 May 2020. [Online]. Available: https://www.theregister.com/2020/05/05/uk_coronavirus_app/.
  36.  “Legal advice on smartphone contact tracing published,” matrix chambers, 3 May 2020. [Online]. Available: https://www.matrixlaw.co.uk/ news/legal-advice-on-smartphone-contact-tracing-published/.
  37.  A. Hern, “UK abandons contact-tracing app for Apple and Google model,” The Guardian, 18 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/18/uk-poised-to-abandon-coronavirus-app-in-favour-of-apple-and-google-models.
  38.  “Coronavirus: Member States agree on an interoperability solution for mobile tracing and warning apps,” European Commission – Press release, 16 June 2020. [Online]. Available: https://digital-strategy.ec.europa.eu/en/news/coronavirus-member-states-agree-interoperability- solution-mobile-tracing-and-warning-apps.
  39.  A. Oslo, “Norway suspends virus-tracing app due to privacy concerns,” The Guardian, 15 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/15/norway-suspends-virus-tracing-app-due-to-privacy-concerns.
  40.  S. Wodinsky, “The UK’s contact-tracing app breaks the UK’s own privacy laws (and is just plain broken),” Gizmodo, 13 May 2020. [Online]. Available: https://gizmodo.com/the-uk-s-contact-tracing-app-breaks-the-uk-s-own-privac-1843439962.
  41.  R. Garthwaite and I. Anderson, “Coronavirus: Alarm over ’invasive’ Kuwait and Bahrain contact-tracing apps,” BBC News, 16 June 2020. [Online]. Available: https://www.bbc.com/news/world-middle-east-53052395.
  42.  “Coronavirus privacy: Are South Korea’s alerts too revealing?” BBC News, 5 March 2020. [Online]. Available: https://www.bbc.com/ news/amp/world-asia-51733145.
  43.  K. Szymielewicz, A. Obem, and T. Zieliński, “Jak Polska walczy z koronawirusem i dlaczego aplikacja nas przed nim nie ochroni [How Poland fights the corona, and why the app won’t protect us]?” Panoptykon, 5 May 2020. [Online]. Available: https://panoptykon.org/ protego-safe-ryzyka.
  44.  J.-M. Bezat, “L’application StopCovid, activée seulement par 2% de la population, connaît des débuts décevants,” Le Monde, 10 June 2020. [Online]. Available: https://www.lemonde.fr/pixels/article/2020/06/10/l-application-stopcovid-connait-des-debuts- decevants_6042404_4408996.html.
  45.  P.H. O’Neill, “No, coronavirus apps don’t need 60% adoption to be effective,” MIT Technol. Rev., 5 June 2020. [Online]. Available: https:// www.technologyreview.com/2020/06/05/1002775/covid-apps-effective-at-less-than-60-percent-download/.
  46.  R. Hinch et al., “Effective configurations of a digital contact tracing app: A report to NHSX,” Oxford University, Tech. Rep., 2020. [Online]. Available: https://github.com/BDI-pathogens/covid-19_instant_tracing/blob/master/Report-EffectiveConfigurationsofaDigitalC ontactTracingApp.pdf.
  47.  “Corona-app soll open source werden,” Süddeutsche Zeitung, 6 May 2020. [Online]. Available: https://www.sueddeutsche.de/digital/ corona-app-tracing-open-source-1.4899711.
  48.  “Cybernetica proposes privacy-preserving decentralised architecture for COVID-19 mobile application for Estonia,” Cybernetica, 6 May 2020. [Online]. Available: https://cyber.ee/news/2020/05-06/.
  49.  E. Emerson, “Temporal and modal logic,” in Handbook of Theoretical Computer Science, J. van Leeuwen, Ed. Elsevier, 1990, vol. B, pp. 995–1072.
  50.  R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi, Reasoning about Knowledge. MIT Press, 1995.
  51.  J. Broersen, M. Dastani, Z. Huang, and L. van der Torre, “The BOID architecture: conflicts between beliefs, obligations, intentions and desires,” in Proceedings of the Fifth International Conference on Autonomous Agents. ACM Press, 2001, pp. 9–16.
  52.  R. Alur, T.A. Henzinger, and O. Kupferman, “Alternating-time Temporal Logic,” J. ACM, vol. 49, pp. 672–713, 2002.
  53.  N. Bulling, V. Goranko, andW. Jamroga, “Logics for reasoning about strategic abilities in multi-player games,” in Models of Strategic Reasoning. Logics, Games, and Communities, ser. Lecture Notes in Computer Science. Springer, 2015, vol. 8972, pp. 93–136.
  54.  F. Laroussinie and P. Schnoebelen, “A hierarchy of temporal logics with past,” Theoretical Computer Science, vol. 148, no. 2, pp. 303–324, 1995.
  55.  W. Penczek and A. Polrola, Advances in Verification of Time Petri Nets and Timed Automata: A Temporal Logic Approach, ser. Studies in Computational Intelligence. Springer, 2006, vol. 20.
  56.  M. Knapik, É. André, L. Petrucci, W. Jamroga, and W. Penczek, “Timed ATL: forget memory, just count,” J. Artif. Intell., vol. 66, pp. 197–223, 2019.
  57.  W. Jamroga, V. Malvone, and A. Murano, “Natural strategic ability,” Artif. Intell., vol. 277, 2019.
  58.  N. Alechina, B. Logan, H. Nguyen, and A. Rakib, “Resource-bounded alternating-time temporal logic,” in Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010, pp. 481–488.
  59.  N. Bulling and B. Farwer, “Expressing properties of resource-bounded systems: The logics RTL* and RTL,” in Proceedings of CLIMA, ser. Lecture Notes in Computer Science, vol. 6214, 2010, pp. 22–45.
  60.  C. Baier and M. Z. Kwiatkowska, “Model checking for a probabilistic branching time logic with fairness,” Distributed Comput., vol. 11, no. 3, pp. 125–155, 1998.
  61.  T. Chen, V. Forejt, M. Kwiatkowska, D. Parker, and A. Simaitis, “PRISM-games: A model checker for stochastic multi-player games,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 7795. Springer, 2013, pp. 185–191.
  62.  M. Kwiatkowska, G. Norman, and D. Parker, “PRISM: probabilistic symbolic model checker,” in Proceedings of TOOLS, ser. Lecture Notes in Computer Science, vol. 2324. Springer, 2002, pp. 200–204.
  63.  N.M. Ferguson et al., “Impact of non-pharmaceutical interventions (NPIs) to reduce COVID-19 mortality and healthcare demand,” Imperial College London, Tech. Rep. 9 (16‒03‒2020), 2020.
  64.  B. Adamik et al., “Estimation of the severeness rate, death rate, household attack rate and the total number of COVID-19 cases based on 16 115 Polish surveillance records,” Prepr. Lancet, 2020.
  65.  W. Bock et al., “Mitigation and herd immunity strategy for COVID-19 is likely to fail,” medRxiv, 2020.
  66.  R. McCabe et al., “Modelling ICU capacity under different epidemiological scenarios of the COVID-19 pandemic in three western European countries,” Imperial College London, Tech. Rep. 36 (16‒11‒2020), 2020.
  67.  S. Zionts, “A multiple criteria method for choosing among discrete alternatives,” Eur. J. Oper. Res., vol. 7, no. 2, pp. 143–147, 1981, fourth EURO III Special Issue.
  68.  Y. Collette and P. Siarry, Multiobjective Optimization: Principles and Case Studies. Springer, 2004.
  69.  R. Radulescu, P. Mannion, D. M. Roijers, and A. Nowé, “Multi-objective multi-agent decision making: a utilitybased analysis and survey,” Auton. Agents Multi-Agent Syst., vol. 34, no. 1, p. 10, 2020.
Go to article

Authors and Affiliations

Wojciech Jamroga
1 2
David Mestel
1
Peter B. Roenne
1
Peter Y.A. Ryan
1
Marjan Skrobot
1

  1. Interdisciplinary Centre on Security, Reliability and Trust, SnT, University of Luxembourg
  2. Institute of Computer Science, Polish Academy of Sciences, ul. Jana Kazimierza 5, 01-248 Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Specific emitter identification (SEI) is the process of identifying individual emitters by analyzing the radio frequency emissions, based on the fact that each device contains unique hardware imperfections. While the majority of previous research focuses on obtaining features that are discriminative, the reliability of the features is rarely considered. For example, since device characteristics of the same emitter vary when it is operating at different carrier frequencies, the performance of SEI approaches may degrade when the training data and the test data are collected from the same emitters with different frequencies. To improve performance of SEI under varying frequency, we propose an approach based on continuous wavelet transform (CWT) and domain adversarial neural network (DANN). The proposed approach exploits unlabeled test data in addition to labeled training data, in order to learn representations that are discriminative for individual emitters and invariant for varying frequencies. Experiments are conducted on received signals of five emitters under three carrier frequencies. The results demonstrate the superior performance of the proposed approach when the carrier frequencies of the training data and the test data differ.
Go to article

Bibliography

  1. K.I. Talbot, P.R. Duley, and M.H. Hyatt, “Specific emitter identification and verification”, Technol. Rev. 2003, 113–133, (2003).
  2. G. Baldini, G. Steri, and R. Giuliani, “Identification of wireless devices from their physical layer radio-frequency fingerprints”, in: Encyclopedia of Information Science and Technology, pp. 6136–6146, 4th Edition, IGI Global, 2018.
  3. A.E. Spezio, “Electronic warfare systems”, IEEE Trans. Microw. Theory Tech. 50(3), 633–644 (2002).
  4. O. Ureten and N. Serinken, “Wireless security through rf fingerprinting”, Can. J. Electr. Comp. Eng. 32(1), 27–33 (2007).
  5. S.U. Rehman, K.W. Sowerby, and C. Coghill, “Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios”, IET Commun. 8(8), 1274–1284 (2014).
  6. V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless device identification with radiometric signatures”, in: Proceedings of the 14th ACM international Conference on Mobile Computing and Networking, San Francisco, USA: ACM, 2008, pp. 116– 127.
  7. Y. Huang, et al., “Radio frequency fingerprint extraction of radio emitter based on i/q imbalance”, Procedia Computer Science 107, 472–477 (2017).
  8. L.J. Wong, W.C. Headley, and A.J. Michaels, “Specific emitter identification using convolutional neural network-based iq imbalance estimators”, IEEE Access 7, 33544–33555 (2019).
  9. G. López-Risueño, J. Grajal, and A. Sanz-Osorio, “Digital channelized receiver based on time-frequency analysis for signal interception”, IEEE Trans. Aerosp. Electron. Syst. 41(3), 879–898 (2005).
  10. C. Bertoncini, K. Rudd, B. Nousain, and M. Hinders, “Wavelet fingerprinting of radio-frequency identification (rfid) tags”, EEE Trans. Ind. Electron. 59(12), 4843–4850 (2011).
  11. J. Lundén and V. Koivunen, “Automatic radar waveform recognition”, IEEE J. Sel. Top. Signal Process. 1(1), 124–136 (2007).
  12. L. Li, H.B. Ji, and L. Jiang, “Quadratic time–frequency analysis and sequential recognition for specific emitter identification”, IET Signal Process. 5(6), 568–574 (2011).
  13. Y. Yuan, Z. Huang, H. Wu, and X. Wang, “Specific emitter identification based on Hilbert–Huang transform-based time– frequency–energy distribution features”, IET Commun. 8(13), 2404–2412 (2014).
  14. J. Zhang, F. Wang, Z. Zhong, and O. Dobre, “Novel hilbert spectrum-based specific emitter identification for single-hop and relaying scenarios”, in: 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, USA, IEEE, 2015, pp. 1–6.
  15. J. Zhang, F. Wang, O. Dobre, and Z. Zhong, “Specific emitter identification via Hilbert–Huang transform in single-hop and relaying scenarios”, IEEE Trans. Inf. Forensic Secur. 11(6), 1192–1205 (2016).
  16. Z. Tang and S. Li, “Steady signal-based fractal method of specific communications emitter sources identification”, in: Wireless Communications, Networking and Applications, pp. 809– 819, Springer, 2016.
  17. G. Huang, Y. Yuan, X. Wang, and Z. Huang, “Specific emitter identification based on nonlinear dynamical characteristics”, Can. J. Electr. Comp. Eng. 39(1), 34–41 (2016).
  18. Y. Jia, S. Zhu, and L. Gan, “Specific emitter identification based on the natural measure”, Entropy 19(3), 117 (2017).
  19. J. Dudczyk and A. Kawalec, “Specific emitter identification based on graphical representation of the distribution of radar signal parameters”, Bull. Pol. Acad. Sci. Tech. Sci. 63(2), 391–396 (2015).
  20. Y. Zhao, Y. Li, L. Wui, and J. Zhang, “Specific emitter identification using geometric features of frequency drift curve”, Bull. Pol. Acad. Sci. Tech. Sci. 66(1), 99–108 (2018).
  21. L. Rybak and J. Dudczyk, “A geometrical divide of data particle in gravitational classification of moons and circles data sets”, Entropy 22(10), 1088 (2020).
  22. Q. Wu, et al., “Deep learning based rf fingerprinting for device identification and wireless security”, Electron. Lett. 54(24), 1405–1407 (2018).
  23. L. Ding, S. Wang, F. Wang, and W. Zhang, “Specific emitter identification via convolutional neural networks”, IEEE Commun. Lett. 22(12), 2591–2594 (2018).
  24. K. Merchant, S. Revay, G. Stantchev, and B. Nousain, “Deep learning for rf device fingerprinting in cognitive communication networks”, IEEE J. Sel. Top. Signal Process. 12(1), 160–167 (2018).
  25. Y. Pan, S. Yang, H. Peng, T. Li, and W. Wang, “Specific emitter identification based on deep residual networks”, IEEE Access 7, 54425– 54434 (2019).
  26. J. Matuszewski and D. Pietrow, “Recognition of electromagnetic sources with the use of deep neural networks”, in XII Conference on Reconnaissance and Electronic Warfare Systems, 2019, vol. 11055, pp. 100–114, doi: 10.1117/12.2524536.
  27. L.J. Wong, W.C. Headley, S. Andrews, R.M. Gerdes, and A.J. Michaels, “Clustering learned cnn features from raw i/q data for emitteridentification”, in: MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), Los Angeles, USA, 2018, pp. 26–33.
  28. G. Baldini, C. Gentile, R. Giuliani, and G. Steri, “Comparison of techniques for radiometric identification based on deep convolutional neural networks”, Electron. Lett. 55(2), 90–92 (2018).
  29. W. Wang, Z. Sun, S. Piao, B. Zhu, and K. Ren, “Wireless physical-layer identification: Modeling and validation”, IEEE Trans. Inf. Forensic Secur. 11(9), 2091–2106 (2016).
  30. S. Andrews, R.M. Gerdes, and M. Li, “Towards physical layer identification of cognitive radio devices”, IEEE Conference on Communications and Network Security (CNS), Las Vegas, USA, IEEE, 2017, pp. 1–9.
  31. I.F. Akyildiz, W.Y. Lee, M.C. Vuran, and S. Mohanty, “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey”, Comput. Netw. 50(13), 2127–2159 (2006).
  32. S.J. Pan and Q. Yang, “A survey on transfer learning”, IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2009), doi: 10.1109/ TKDE.2009.191.
  33. Y. Sharaf-Dabbagh and W. Saad, “Transfer learning for device fingerprinting with application to cognitive radio networks”, in: 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 2015, pp. 2138–2142.
  34. M. Wang and W. Deng, “Deep visual domain adaptation: A survey”, Neurocomputing 312, 135–153 (2018). doi: 10.1016/j. neucom.2018.05.083.
  35. Y. Ganin and V. Lempitsky, “Unsupervised domain adaptation by backpropagation”, in: Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Lille, France, 2015, pp. 1180–1189.
  36. Y. Ganin, et al., “Domain-adversarial training of neural networks”, J. Mach. Learn. Res. 17(1), 2096–2030 (2016).
  37. G. Wilson and D.J. Cook, “A survey of unsupervised deep domain adaptation”, CoRR, 2018, abs/1812.02849. Available from: http://arxiv. org/abs/1812.02849.
  38. I. Goodfellow, et al., “Generative adversarial nets”, in: Advances in Neural Information Processing Systems, Montreal, Canada, 2014, pp. 2672–2680.
  39. U. Satija, N. Trivedi, G. Biswal, and B. Ramkumar, “Specific emitter identification based on variational mode decomposition and spectral features in single hop and relaying scenarios”, IEEE Trans. Inf. Forensic Secur. 14(3), 581–591 (2018).
  40. E. Tzeng, J. Hoffman, K. Saenko, and T. Darrell, “Adversarial discriminative domain adaptation”, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, Hawaii, 2017, pp. 7167–7176.
  41. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition”, in: Proceedings of the IEEE conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, USA, 2016, pp. 770–778.
  42. L. Maaten and G. Hinton, “Visualizing data using t-sne”, J. Mach. Learn. Res. 9, 2579–2605 (2008).
  43. C. Chen, et al., “Progressive feature alignment for unsupervised domain adaptation”, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 627–636.
  44. P. Panareda-Busto and J. Gall, “Open set domain adaptation”, in: Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 2017, pp. 754–763.
  45. Z. Cao, M. Long, J. Wang, and M.I. Jordan, “Partial transfer learning with selective adversarial networks”, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, USA, 2018, pp. 2724–2732.
  46. K. You, M. Long, Z. Cao, J. Wang, and M.I. Jordan, “Universal domain adaptation”, in: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, USA,2019.
Go to article

Authors and Affiliations

Keju Huang
1
Junan Yang
1
Hui Liu
1
Pengjiang Hu
1

  1. College of Electronic Engineering, National University of Defense Technology, Hefei, Anhui 230037, China
Download PDF Download RIS Download Bibtex

Abstract

The method described in this work allows to determine the optimal distribution of pulses of digital signal as well as the non-linear mathematical model based on a multiple regression statistical analysis, which are specialized to an effective and low-cost testing of functional parameters in analog electronic circuits. The aim of this concept is to simplify the process of analog circuit specification validation and minimize hardware implementation, time and memory requirements during the testing stage. This strategy requires simulations of the analyzed analog electronic circuit; however, this effort is done only once – before the testing stage. Then, validation of circuit specification can be obtained after a quick, very low-cost procedure without time consuming computations and without expensive external measuring equipment usage. The analyzed test signature is a time response of the analog circuit to the stream of digital pulses for which distributions were determined during evolutionary optimization cycles. Besides, evolutionary computations assure determination of the optimal form and size of the non-linear mathematical formula used to estimate specific functional parameters. Generally, the obtained mathematical model has a structure similar to the polynomial one with terms calculated by means of multiple regression procedure. However, a higher ordered polynomial usage makes it possible to reach non-linear estimation model that improves accuracy of circuit parametric identification. It should be noted that all the evolutionary calculations are made only at the before test stage and the main computational effort, for the analog circuit specification test design, is necessary only once. Such diagnosing system is fully synchronized by a global digital signal clock that precisely determines time points of the slopes of input excitation pulses as well as acquired output signature samples. Efficiency of the proposed technique is confirmed by results obtained for examples based on analog circuits used in previous (and other) publications as test benchmarks.

Go to article

Authors and Affiliations

T. Golonek
Ł. Chruszczyk
Download PDF Download RIS Download Bibtex

Abstract

Fresh water is essential for life. More and more countries around the world are facing scarcity of drinking water, which affects over 50% of the global population. Due to human activity such as industrial development and the increasing greenhouse effect, the amount of drinking water is drastically decreasing. To address this issue, various methods of sea and brackish water desalination are used. In this study, an energy analysis (specific energy consumption, SEC) of two laboratory membrane processes, reverse osmosis (RO) and pervaporation (PV), was conducted. A model feed system saline water at 0.8, and 3.5% wt. NaCl was used. The efficiency and selectivity of membranes used in PV and RO were examined, and power of the devices was measured. The desalination processes were found to have a high retention factor (over 99%) for both PV and RO. For PV, the permeate fluxes were small but they increased with increasing feed flow rate, process temperature and salt content in the feed. The calculated SEC values for both laboratory processes ranged from 2 to 70 MWh/m 3. Lowering the process temperature, which consumes 30 to 60% of the total energy used in the PV process, can be an important factor in reducing energy consumption.
Go to article

Authors and Affiliations

Izabela Gortat
1
ORCID: ORCID
Joanna Marszałek
1
ORCID: ORCID
Paweł Wawrzyniak
1

  1. Lodz University of Technology, Faculty of Process and Environmental Engineering, Wólczańska 213, 93-005 Łódź, Poland
Download PDF Download RIS Download Bibtex

Abstract

The organization of graduate and postgraduate studies at the Faculty of Theology of the Cardinal Stefan Wyszyński University in Warsaw reveals the specificity of the theology in Warsaw. In the future, the Faculty of Theology should pay a special attention to the high level of the specialisations within the scope of the classical theology, but on the other hand should care about new specialisations, which should be more attractive.

Biblical studies, fundamental theology, dogmatic theology, moral theology are at the very heart of theology. It is necessary to foster doctoral and habilitation thesis in the field of these specialisations and to care for their high, world-class level. Considering the needs of the Church, the development of the liturgical studies and catechetical studies needs to be supported.

As far as future career opportunities for graduates of the Faculty of Theology are concerned, new specializations should be promoted, such as media education and journalism, theology of culture, tourism in biblical countries. A scientific reflection on the role of mass media and on the relations between theology and culture is also very important. Th ere should be place for vetera et nova at university, for the theology conceived in the traditional way and for attempts at practising theology in a new way.

Go to article

Authors and Affiliations

Ks. Roman Bartnicki
Download PDF Download RIS Download Bibtex

Abstract

We demonstrate a modularity bug in the interface system of Java 8 on the practical example of a textbook design of a modular interface for vector spaces. Our example originates in our teaching of modular object-oriented design in Java 8 to undergraduate students, simply following standard programming practices and mathematical denitions. The bug shows up as a compilation error and should be xed with a language extension due to the importance of best practices (design delity).

Go to article

Authors and Affiliations

Simon Kramer
Download PDF Download RIS Download Bibtex

Abstract

Although interlinear glosses theoretically involve providing the most exact native equivalent for each foreign item in the text (cf., e.g. Nida 2004: 161), they often prove to be much more than a mechanical process of creating lexical correspondences. One of the best examples of glossing which is a “conscious, occasionally very careful “interpretative translation”” (Nagucka 1997: 180), is the collection of 10th century glosses added by Aldred to the Latin text of the Lindisfarne Gospels. This oldest existing translation of the Gospels into English consists not only of a word‑for‑word renderings, since Aldred also used multiple glosses, marginal notes, and occasionally left the words unglossed. Thus, particular Latin words are often translated in several different ways.
The present study focuses on words denoting objects and phenomena which were presumably unfamiliar or obscure to the Anglo‑Saxon audience. Those include items specific to the society, culture, as well as fauna and flora. The study shows various methods employed by the glossator to familiarise the concepts to the readers.
Go to article

Authors and Affiliations

Anna Wojtyś
Download PDF Download RIS Download Bibtex

Abstract

Spectroscopy has become one of the most used non-invasive methods to detect plant diseases before symptoms are visible. In this study it was possible to characterize the spectral variation in leaves of Solanum lycopersicum L. infected with Fusarium oxysporum during the incubation period. It was also possible to identify the relevant specific wavelengths in the range of 380–1000 nm that can be used as spectral signatures for the detection and discrimination of vascular wilt in S. lycopersicum. It was observed that inoculated tomato plants increased their reflectance in the visible range (Vis) and decreased slowly in the near infrared range (NIR) measured during incubation, showing marked differences with plants subjected to water stress in the Vis/NIR. Additionally, three ranges were found in the spectrum related to infection by F. oxysporum (510–520 nm, 650–670 nm, 700–750 nm). Linear discriminant models on spectral reflectance data were able to differentiate between tomato varieties inoculated with F. oxysporum from healthy ones with accuracies higher than 70% 9 days after inoculation. The results showed the potential of reflectance spectroscopy to discriminate plants inoculated with F. oxysporum from healthy ones as well as those subjected to water stress in the incubation period of the disease.

Go to article

Authors and Affiliations

Juan Carlos Marín Ortiz
Lilliana María Hoyos Carvajal
Veronica Botero Fernandez

This page uses 'cookies'. Learn more