Search results

Filters

  • Journals
  • Authors
  • Contributor
  • Keywords
  • Date
  • Type

Search results

Number of results: 30
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

During 2017, the authors conducted an evaluation of so-called “veteran trees” in Warsaw — selected specimens with outstanding historical, landscape and natural values, but not taken under legal protection, situated within public space (streets, squares, public facilities) — as part of a pilot program for the Green Board of Warsaw. The following were examined: the condition of trees, the surrounding ground’s condition, spatial conditions. The presented results include an example of two locations — prestigious streets, on which legible systems of street tree plantings from the beginning of the 20th century have been preserved (Piękna Street, J. Ch. Szucha Avenue). The protection of old trees — living witnesses of history and the maintenance of the original spatial form — classic avenue arrangement in both cases are essential for preservation of the historical pre-war scenery of this part of Warsaw.

Go to article

Authors and Affiliations

Beata Fortuna-Antoszkiewicz
Jan Łukaszkiewicz
Edyta Rosłon-Szeryńska
Jacek Borowski
Keywords symbiosis fungi trees
Download PDF Download RIS Download Bibtex

Abstract

Trees and fungi interact in complex ways. Sometimes, the two groups of organisms would even find it hard to survive without each other.
Go to article

Authors and Affiliations

Joanna Mucha
1

  1. Institute of Dendrology PAS in Kórnik
Download PDF Download RIS Download Bibtex

Abstract

Typically, a plant’s genotype can be replicated through vegetative propagation. Oak trees, however, cannot be reproduced by this method. So how can we preserve the ancient genotypes of monumental oaks, many of which are dying?
Go to article

Authors and Affiliations

Paweł Chmielarz
1

  1. PAS Institute of Dendrology, Kórnik
Download PDF Download RIS Download Bibtex

Abstract

Professor Krzysztof Spalik, Chairman of the PAS Committee for Environmental and Evolutionary Biology, tells us why the Białowieża Forest should be allowed to renew itself on its own.

Go to article

Authors and Affiliations

Krzysztof Spalik
Download PDF Download RIS Download Bibtex

Abstract

The structure of Austempered Ductile Iron (ADI) is depend of many factors at individual stages of casting production. There is a rich literature documenting research on the relationship between heat treatment and the resulting microstructure of cast alloy. A significant amount of research is conducted towards the use of IT tools for indications production parameters for thin-walled castings, allowing for the selection of selected process parameters in order to obtain the expected properties. At the same time, the selection of these parameters should make it possible to obtain as few defects as possible. The input parameters of the solver is chemical composition Determined by the previous system module. Target wall thickness and HB of the product determined by the user. The method used to implement the solver is the method of Particle Swarm Optimization (PSO). The developed IT tool was used to determine the parameters of heat treatment, which will ensure obtaining the expected value for hardness. In the first stage, the ADI cast iron heat treatment parameters proposed by the expert were used, in the next part of the experiment, the settings proposed by the system were used. Used of the proposed IT tool, it was possible to reduce the number of deficiencies by 3%. The use of the solver in the case of castings with a wall thickness of 25 mm and 41 mm allowed to indication of process parameters allowing to obtain minimum mechanical properties in accordance with the PN-EN 1564:2012 standard. The results obtained by the solver for the selected parameters were verified. The indicated parameters were used to conduct experimental research. The tests obtained as a result of the physical experiment are convergent with the data from the solver.
Go to article

Authors and Affiliations

K. Jaśkowiec
1 2
ORCID: ORCID
A. Opaliński
2
ORCID: ORCID
P. Kustra
2
D. Jach
3
D. Wilk-Kołodziejczyk
1 2
ORCID: ORCID

  1. Lukasiewicz Research Network-Krakow Institute of Technology, Poland
  2. AGH University of Science and Technology, Department of Applied Computer Science and Modelling, Poland
  3. Kutno Foundry, Poland
Download PDF Download RIS Download Bibtex

Abstract

Five models and methodology are discussed in this paper for constructing classifiers capable of recognizing in real time the type of fuel injected into a diesel engine cylinder to accuracy acceptable in practical technical applications. Experimental research was carried out on the dynamic engine test facility. The signal of in-cylinder and in-injection line pressure in an internal combustion engine powered by mineral fuel, biodiesel or blends of these two fuel types was evaluated using the vibro-acoustic method. Computational intelligence methods such as classification trees, particle swarm optimization and random forest were applied.

Go to article

Authors and Affiliations

Andrzej Bąkowski
Michał Kekez
Leszek Radziszewski
Alžbeta Sapietova
Download PDF Download RIS Download Bibtex

Abstract

The article discusses the development of an approximation model of selected plastic and mechanical properties obtained from compression tests of model materials used in physical modeling. The use of physical modeling with the use of soft model materials such as a synthetic wax branch with various modifiers is a popular tool used as an alternative or verification of numerical modeling of bulk metal forming processes. In order to develop an algorithm to facilitate the choice of material model to simulate the behavior of real-metallic materials used in industrial production processes the induction of decision trees was used. First of all, the Statistica program was used for data mining, which made it possible to determine / find the relationship between the percentage of particular constituents of the model material (base material and modifiers) and yield strength, critical and maximum strain, and provide the opportunity to indicate the most important variables determining the shape of the stress – strain curve. Next, using the induction of decision trees, an approximation model was developed, which allowed to create an algorithm facilitating the selection of individual modifying components. The last stage of the research was verification of the correctness of the developed algorithm. The obtained research results indicate the possibility of using decision tree induction to approximate selected properties of modeling materials simulating the behavior of real materials, thus eliminating the need for costly and time-consuming experiments carried out on metallic material.

Go to article

Authors and Affiliations

M. Hawryluk
D. Wilk-Kołodziejczyk
K. Regulski
M. Głowacki
Download PDF Download RIS Download Bibtex

Abstract

Fault Tree is one of the traditional and conventional approaches used in fault diagnosis. By

identifying combinations of faults in a logical framework it’s possible to define the structure

of the fault tree. The same go with Bayesian networks, but the difference of these probabilistic

tools is in their ability to reasoning under uncertainty. Some typical constraints to the

fault diagnosis have been eliminated by the conversion to a Bayesian network. This paper

shows that information processing has become simple and easy through the use of Bayesian

networks. The study presented showed that updating knowledge and exploiting new knowledge

does not complicate calculations. The contribution is the structural approach of faults

diagnosis of turbo compressor qualitatively and quantitatively, the most likely faults are

defined in descending order. The approach presented in this paper has been successfully

applied to turbo compressor, which represent vital equipment in petrochemical plant.

Go to article

Authors and Affiliations

Abdelaziz Lakehal
Mourad Nahal
Riad Harouz

Authors and Affiliations

Marc Philippe
1
ORCID: ORCID

  1. Univ Lyon, UniversitéClaude Bernard Lyon 1, CNRS, ENTPE, UMR 5023 LEHNA, F-69622, Villeurbanne, France
Download PDF Download RIS Download Bibtex

Abstract

This review deals with a comprehensive publication on the role of trees in the folk tradition of Slavs. The author of the review appreciates the interdisciplinary focus of the book, which is based on deep knowledge in the field of folklore, Slavonic dialectology and etymology. She also highly values the extremely rich material (folklore, ethnographic and linguistic).
Go to article

Bibliography

Agapkina T.A., 2000, Etnograficheskiye svyazi kalendarnykh pesen. Vstrecha vesny v obryadakh i fol'klore vostochnykh slavyan, Moskva.
Agapkina T.A., 2002, Mifopoeticheskiye osnovy slavyanskogo narodnogo kalendarya. Vesenne‑letniy tsikl, Moskva.
Agapkina T.A., 2010, Vostochnoslavyanskiye lechebnyye zagovory v sravnitel'nom osveshchenii: Syuzhetika i obraz mira, Moskva.
Agapkina T.A., 2019, Derev'ya v slavianskoy narodnoy traditsii: Ocherki, Moskva.
Akhtarov B., 1939, Materiali za balgarski botanichen rechnik, Sofia. Kott F.Š., 1878, Česko‑německý slovník zvláště grammaticko‑fraseologický, t. 1, Praha.
Machek V., 1954, Česká a slovenská jména rostlin, Praha.
Marzell H., 1977, Wörterbuch der deutschen Pflanzennamen, sv. 3, Stuttgart ;Wiesbaden.
Polívka F., 1902, Názorná květena zemí koruny české, sv. 4, Olomouc.
SlDrev, 1995–2012 = Slavyanskiye drevnosti. Etnolingvisticheskiy slovar', ed. N.I. Tolstoy, vol. 1–5, Moskva.
SlMif, 2002 = Slavyanskaya mifologiya. Entsiklopedicheskiy slovar', ed. S.M. Tolstaya, Moskva.
SRNG, 1965– = Slovar' russkikh narodnykh govorov, sostavil (z II t. gl. red.) F.P. Filin (F.P. Sorokoletov, S.A. Myznikov), Moskva ; Leningrad/Sankt‑Peterburg.
Go to article

Authors and Affiliations

Ilona Janyšková
1
ORCID: ORCID

  1. Etymologické oddělení Ústavu pro jazyk český, Akademie věd České republiky, Brno
Download PDF Download RIS Download Bibtex

Abstract

This paper describes the use of new methods of detecting faults in medium-voltage overhead lines built of covered conductors. The methods mainly address such faults as falling of a conductor, contacting a conductor with a tree branch, or falling a tree branch across three phases of a medium-voltage conductor. These faults cannot be detected by current digital relay protection systems. Therefore, a new system that can detect the above mentioned faults was developed. After having tested its operation, the system has already been implemented to protect mediumvoltage overhead lines built of covered conductors.

Go to article

Authors and Affiliations

Stanislav Mišák
Štefan Hamacek
Mikołaj Bartłomiejczyk
Download PDF Download RIS Download Bibtex

Abstract

The application of churn prevention represents an important step for mobile communication

companies aiming at increasing customer loyalty. In a machine learning perspective,

Customer Value Management departments require automated methods and processes to

create marketing campaigns able to identify the most appropriate churn prevention approach.

Moving towards a big data-driven environment, a deeper understanding of data

provided by churn processes and client operations is needed. In this context, a procedure

aiming at reducing the number of churners by planning a customized marketing campaign

is deployed through a data-driven approach. Decision Tree methodology is applied to drow

up a list of clients with churn propensity: in this way, customer analysis is detailed, as well

as the development of a marketing campaign, integrating the individual churn model with

viral churn perspective. The first step of the proposed procedure requires the evaluation of

churn probability for each customer, based on the influence of his social links. Then, the

customer profiling is performed considering (a) individual variables, (b) variables describing

customer-company interactions, (c) external variables. The main contribution of this work

is the development of a versatile procedure for viral churn prevention, applying Decision

Tree techniques in the telecommunication sector, and integrating a direct campaign from

the Customer Value Management marketing department to each customer with significant

churn risk. A case study of a mobile communication company is also presented to explain

the proposed procedure, as well as to analyze its real performance and results.

Go to article

Authors and Affiliations

Laura Lucantoni
Sara Antomarioni
Maurizio Bevilacqua
Filippo Emanuele Ciarapica
Download PDF Download RIS Download Bibtex

Abstract

Genetic-environmental controls of the tolerance of forest trees to industrial pollution arc discussed on the example of the Scots pine. Within the pine population under study, various responses to man-made stress were observed in individual specimens, which gave rise to the hypothesis about a genetic origin of the phenomenon. The research procedure was preceded by an assessment of the environmental conditions which focused especially on the pollution of the atmosphere and pedosphere as a background for estimating the level of variation and examining the genetic structure of specimens sensitive to, or tolerant of, the pollution. The analysis covered a pine population coming from natural forest regeneration growing in the zone of direct impact of pollution from the Miasteczko Śląskie Zinc Works. Two groups of trees were distinguished: S (sensitive) and T (tolerant), characterized by different genetic parameters. The observed tendencies (slower cell division rates, lower values of the mitotic index than in the control group, a high level of chromosomal aberrations) indicate a direct effect of the pollution on the genetic material of the trees.
Go to article

Authors and Affiliations

Katarzyna Fagiewicz
Leon Kozacki
Wiesław Prus-Głowacki
Ewa Chudzińska
Aleksandra Wojnicka-Półtorak
Download PDF Download RIS Download Bibtex

Abstract

A machine learning model was developed to support irrigation decisions. The field research was conducted on ‘Gala’ apple trees. For each week during the growing seasons (2009–2013), the following parameters were determined: precipitation, evapotranspiration (Penman–Monteith formula), crop (apple) evapotranspiration, climatic water balance, crop (apple) water balance (AWB), cumulative climatic water balance (determined weekly, ΣCWB), cumulative apple water balance (ΣAWB), week number from full bloom, and nominal classification variable: irrigation, no irrigation. Statistical analyses were performed with the use of the WEKA 3.9 application software. The attribute evaluator was performed using Correlation Attribute Eval with the Ranker Search Method. Due to its highest accuracy, the final analyses were performed using the WEKA classifier package with the J48graft algorithm. For each of the analysed growing seasons, different correlations were found between the water balance determined for apple trees and the actual water balance of the soil layer (10–30 cm). The model made correct decisions in 76.7% of the instances when watering was needed and in 87.7% of the instances when watering was not needed. The root of the classification tree was the AWB determined for individual weeks of the growing season. The high places in the tree hierarchy were occupied by the nodes defining the elapsed time of the growing season, the values of ΣCWB and ΣAWB.
Go to article

Authors and Affiliations

Waldemar Treder
1
ORCID: ORCID
Krzysztof Klamkowski
1
ORCID: ORCID
Katarzyna Wójcik
1
ORCID: ORCID
Anna Tryngiel-Gać
1
ORCID: ORCID

  1. National Institute of Horticultural Research, Konstytucji 3 Maja St, 1/3, 96-100 Skierniewice, Poland
Download PDF Download RIS Download Bibtex

Abstract

Active thermography is an efficient tool for defect detection and characterization as it does not change the properties of tested materials. The detection and characterization process involves heating a sample and then analysing the thermal response. In this paper, a long heating pulse was used on samples with a low thermal diffusivity and artificially created holes of various depths. As a result of the experiments, heating and cooling curves were obtained. These curves, which describe local characteristics of the material, are recognized using a classification tree and divided into categories depending on the material thickness (hole depths). Two advantages of the proposed use of classification trees are: an in-built mechanism for feature selection and a strong reduction in the dimensions of the pattern. Based on the experimental study, it can be concluded that classification trees are a useful tool for the thinning detection of homogeneous material.
Go to article

Authors and Affiliations

Sebastian Dudzik
1
Grzegorz Dudek
1

  1. Czestochowa University of Technology, Faculty of Electrical Engineering, Al. Armii Krajowej 17, 42-200 Częstochowa, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article presents research on the use of Monte-Carlo Tree Search (MCTS) methods to create an artificial player for the popular card game “The Lord of the Rings”. The game is characterized by complicated rules, multi-stage round construction, and a high level of randomness. The described study found that the best probability of a win is received for a strategy combining expert knowledge-based agents with MCTS agents at different decision stages. It is also beneficial to replace random playouts with playouts using expert knowledge. The results of the final experiments indicate that the relative effectiveness of the developed solution grows as the difficulty of the game increases.
Go to article

Bibliography

  1.  C. Browne, “A survey of monte carlo tree search methods”, IEEE Trans. Comput. Intell. AI Games 4., 1–43 (2012).
  2.  R. Bjarnason, A. Fern, and P. Tadepalli, “Lower bounding Klondike solitaire with Monte-Carlo planning”, Nineteenth International Conference on Automated Planning and Scheduling, 2009.
  3.  M. Świechowski, T. Tajmajer, and A. Janusz, “Improving hearthstone ai by combining mcts and supervised learning algo rithms”, 2018 IEEE Conference on Computational Intelligence and Games (CIG), 2018.
  4.  J. Mańdziuk, “MCTS/UCT in Solving Real-Life Problems”, Advances in Data Analysis with Computational Intelligence Methods, 277‒292, Springer, Cham, 2018.
  5.  S. Kajita, T. Kinjo, and T. Nishi, “Autonomous molecular design by Monte-Carlo tree search and rapid evaluations using molecular dynamics simulations”, Commun. Phys. 3(1), 1‒11 (2020).
  6.  S. Haeri and L. Trajković, “Virtual network embedding via Monte Carlo tree search”, IEEE Trans. Cybern. 48(2), 510‒521 (2017).
  7.  G. Best, O.M. Cliff, T. Patten, R.R. Mettu, and R. Fitch, “Decentralised Monte Carlo tree search for active perception”, Algorithmic Foundations of Robotics XII, 864‒879, Springer, Cham, 2020.
  8.  D.A. Dhar, P. Morawiecki, and S. Wójtowicz. “Finding differential paths in arx ciphers through nested monte-carlo search”, AEU Int. J. Electron. Commun 64(2), 147‒150 (2018).
  9.  K. Guzek and P. Napieralski, “Measurement of noise in the Monte Carlo point sampling method”, Bull. Pol. Acad. Sci. Tech. Sci. 59(1), 15‒19 (2011).
  10.  D. Tefelski, T. Piotrowski, A. Polański, J. Skubalski and V. Blideanu, “Monte-Carlo aided design of neutron shielding concretes”, Bull. Pol. Acad. Sci. Tech. Sci. 61(1), 161‒171 (2013).
  11.  C.D. Ward and P.I. Cowling, “Monte Carlo search applied to card selection in Magic: The Gathering”, IEEE Symposium on Computational Intelligence and Games, 2009.
  12.  P.I. Cowling, C.D. Ward, and E.J. Powley, “Ensemble determinization in monte carlo tree search for the imperfect information card game magic: The gathering”, IEEE Trans. Comput. Intell. AI Games 4(4), 241‒257 (2012).
  13.  S. Turkay, S. Adinolf, and D. Tirthali, “Collectible Card Games as Learning Tools”, Procedia – Soc. Behav. Sci. 46, 3701‒3705 (2012), doi: 10.1016/j.sbspro.2012.06.130.
  14.  K. Bochennek, B. Wittekindt, S.-Y. Zimmermann, and T. Klingebiel, “More than mere games: a review of card and board games for medical education”, Med. Teach. 29(9), 941‒948 (2007), doi: 10.1080/01421590701749813.
  15.  J.S.B. Choe and J. Kim, “Enhancing Monte Carlo Tree Search for Playing Hearthstone”, 2019 IEEE Conference on Games (CoG), London, United Kingdom, 2019, pp. 1‒7.
  16.  K. Godlewski and B. Sawicki, “MCTS Based Agents for Multistage Single-Player Card Game”, 21st International Conference on Computational Problems of Electrical Engineering (CPEE), 2020
  17.  “Magic: The Gathering”, [online] https://magic.wizards.com/en
  18.  E.J. Powley, P.I. Cowling, and D. Whitehouse. “Information capture and reuse strategies in Monte Carlo Tree Search, with applications to games of hidden information”, Artif. Intell. 217, 92‒116 (2014).
  19.  Fantasy Flight Publishing, “Hall of Beorn”, technical documentation, 2020 [Online] Available: http://hallofbeorn.com/LotR/Scenarios/ Passage-Through-Mirkwood
  20.  S. Zhang and M. Buro, “Improving hearthstone AI by learning high-level rollout policies and bucketing chance node events”, 2017 IEEE Conference on Computational Intelligence and Games (CIG), New York, USA, 2017, pp. 309‒316.
  21.  G.M.J-B. Chaslot, M.H.M. Winands, and H.J. van Den Herik, “Parallel monte-carlo tree search”, International Conference on Computers and Games, Springer, Berlin, Heidelberg, 2008.
  22.  A. Fern and P. Lewis, “Ensemble monte-carlo planning: An empirical study”, Twenty-First International Conference on Automated Planning and Scheduling, ICAPS 2011, Germany, 2011.
  23.  A. Santos, P. A. Santos, and F.S. Melo, “Monte Carlo tree search experiments in hearthstone,” 2017 IEEE Conference on Computational Intelligence and Games (CIG), New York, USA, 2017, pp. 272‒279.
Go to article

Authors and Affiliations

Konrad Godlewski
1
Bartosz Sawicki
1

  1. Warsaw University of Technology, ul. Koszykowa 75, 00-662 Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Construction planning always requires labour productivity estimation. Often, in the case of monolithic construction works, the available catalogues of productivity rates do not provide a reliable assessment. The paper deals with the problem of labour estimation for reinforcement works. An appropriate model of labour prediction problem is being introduced. It includes, between others, staff experience and reinforcement buildability. In the paper it is proposed, that labour requirements can be estimated with aggregated classifiers. The work is a continuation of earlier studies, in which the possibility of using classifier ensembles to predict productivity in monolithic works was investigated.

Go to article

Authors and Affiliations

A. Krawczyńska-Piechna
Download PDF Download RIS Download Bibtex

Abstract

Work safety control and analysis of accidents during the construction performance are some of the most important issues of the construction management. The paper focuses on the post-accident absence as an element of the occupational safety management. The occurrence of the post-accident absence of workers can be then treated as an indicator of building performance safety. The ability to estimate its length can also facilitate works planning and scheduling in case of the accident. The paper attempts to answer the question whether it is possible and how to use decision trees and their ensembles to predict the severity of the post-accident absence and which classification algorithm is the most promising to solve the prediction problem. The paper clarifies the model of the prediction problem, introduces 5 different decision tress and different aggregation algorithms in order to build the model. Thanks to the use of aggregation methods it is possible to build classifiers that predict precisely and do not require any initial data treatment, which simplifies the prediction process significantly. To identify the most promising classifier or classifier ensemble the prediction accuracy measures of selected classification algorithms were analyzed. The data to build the model was gathered on national (Polish) construction sites and was taken from literature. Models obtained within simulations can be used to build advisory or safety management systems allowing to detect threats while construction works are being planned or carried out.

Go to article

Authors and Affiliations

Anna Krawczyńska-Piechna
Download PDF Download RIS Download Bibtex

Abstract

In the heart of Moroccan oases, date palm trees stand as the lifeblood of local communities, serving as both a livelihood cornerstone and a dietary treasure trove. Morocco has long been a leading date fruit producer. Yet, amidst the palm groves, several environmental, technical, and socio-economic challenges have threatened the sustainability of this ancient crop. This study assesses the constraints and limitations of the date palm production system in Tafilalet oases that have kept this crop from reaching its full potential. A total of 56 producers were interviewed using an open- closed survey, illuminating interviews with key informants, dynamic focus group discussions, and direct observations in palm groves. The findings reveal that primary restrictions and barriers impeding the progress of this sector are: producers’ moderate education level and the limited adoption of technological innovation, few opportunities given to young producers, palm groves’ fragmentation, poor management of date fruits, low imports of the necessary inputs (fertilisers, irrigation, etc.), and the poor organisation of the marketing circuit (storage and packaging). Advocate renewed commitment to preserve and modernise palm groves, blending heritage with modern practices for thriving, sustainable date palm production. It is entirely conceivable to produce organic dates in the region since producers use a few quantities of chemical products, notably fertilisers and phytosanitary products.
Go to article

Authors and Affiliations

Kaoutar Hamriri
1 2
ORCID: ORCID
Majid Atmani
1
ORCID: ORCID
Ali Abidar
2
ORCID: ORCID
Larbi Aziz
2
ORCID: ORCID
Mustapha Fagroud
3
ORCID: ORCID
Rachid Bouamri
4
ORCID: ORCID

  1. Sidi Mohamed Ben Abdellah University, Faculty of Science and Technology, Laboratory of Functional Ecology and Environmental Engineering, B.P. 2202 Imouzzer Rd, 30000, Fes, Morocco
  2. National School of Agriculture, Department of Rural Development Engineering, B.P. S/40, km 10, Haj Kaddour, 50001, Meknes, Morocco
  3. National School of Agriculture, Department of Agronomy, B.P. S/40, km 10, Haj Kaddour, 50001, Meknes, Morocco
  4. National School of Agriculture, Department of Plant and Environment Protection, B.P. S/40, km 10, Haj Kaddour, 50001, Meknes, Morocco
Download PDF Download RIS Download Bibtex

Abstract

Sacred spaces in hospitals – chapels or sacred gardens, as places of peace and tranquility, address spiritual needs of the patients and their families. The paper examines the elements creating the phenomenon of sacrum in the composition of the historical Stummer`s hospital in Topoľčany. Today the historical hospital complex is not used for its former functions and the question is how to preserve the sacred phenomena in the context of its future new uses.
Go to article

Authors and Affiliations

Katarína Kristiánová
Download PDF Download RIS Download Bibtex

Abstract

Fruit tree orchards were present in some public parks from the very beginning of their existence in the 19th century. Apart from the utilitarian role, in the 20th and 21st centuries, they also gained different ones: ornamental — on account of high aesthetic qualities of fruit trees in the flowering and fruit-bearing seasons, environmental and ecological — related to supporting biodiversity, cultural — in the context of memory of old forms of using rural and allotment gardens, social — as a space for leisure, and even therapeutic — as an element of hortitherapy. The growing popularity of orchards indicates a change in the trends in contemporary public parks development.

Go to article

Authors and Affiliations

Kinga Kimic
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

Despite the considerable progress that has recently been made in medicine, the treatment of viral infections is still a problem remaining to be solved. This especially concerns infections caused by newly emerging patogenes such as: human immunodeficiency virus, hepatitis C virus or SARS-coronavirus. There are several lines of evidence that the unusual genetic polymorphism of these viruses is responsible for the observed therapeutic difficulties. In order to determine whether some parameters describing a very complex and variable viral population can be used as prognostic factors during antiviral treatment computational methods were applied. To this end, the structure of the viral population and virus evolution in the organisms of two patients suffering from chronic hepatitis C were analyzed. Here we demonstrated that phylogenetic trees and Hamming distances best reflect the differences between virus populations present in the organisms of patients who responded positively and negatively to the applied therapy. Interestingly, the obtained results suggest that based on the elaborated method of virus population analysis one can predict the final outcome of the treatment even before it has started.

Go to article

Authors and Affiliations

P. Kędziora
M. Figlerowicz
P. Formanowicz
M. Alejska
P. Jackowiak
N. Malinowska
A. Frątczak
J. Błażewicz
Download PDF Download RIS Download Bibtex

Abstract

Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the whole network infrastructure in the local or global level, the attacks could be hardware or software. Central objective of this paper is to design an intrusion detection system using ensemble learning specifically Decision Trees with distinctive feature selection univariate ANOVA-F test. Decision Trees has been the most popular among ensemble learning methods and it also outperforms among the other classification algorithm in various aspects. With the essence of different feature selection techniques, the performance found to be increased more, and the detection outcome will be less prone to false classification. Analysis of Variance (ANOVA) with F-statistics computations could be a reasonable criterion to choose distinctives features in the given network traffic data. The mentioned technique is applied and tested on NSL KDD network dataset. Various performance measures like accuracy, precision, F-score and Cross Validation curve have drawn to justify the ability of the method.
Go to article

Bibliography

[1] Ektefa, M. Mohammadreza, S. Sara and A. Fatimah, “Intrusion detection using data mining techniques,” 200 - 203. DOI: 10.1109/INFRKM.2010.5466919.
[2] Y. Wang, W. Cai and P. Wei, “A Deep Learning Approach For Detecting Malicious Javascript Code,” Wiley Online Library . February 2016.
[3] C. Yin , Y. Zhu, J. Fei and H. Xinzheng, “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks,” IEEE Access. November 7, 2017.
[4] Q. Niyaz, W. Sun, Y Javaid and A. Mansoor, “A Deep Learning Approach For Network Intrusion Detection system,” In Eai Endorsed Transactions on Security and Safety, Vol. 16, Issue 9, 2016.
[5] M. Preeti, V. Vijay, T. Uday and S. P. Emmanuel, “A Detailed Investigation And Analysis Of Using Machine Learning Techniques For Intrusion Detection,” IEEE Communications Surveys & Tutorials, Volume: 21, Issue:1, First quarter 2019.
[6] Y. Li, M. Rong And R. Jiao, “A Hybrid Malicious Code Detection Method Based On Deep Learning,” International Journal of Software Engineering and Its Applications 9(5):205-216, May 2015.
[7] Gulshan and Krishan, “A Multi-Objective Genetic Algorithm Based Approach For Effective Intrusion Detection Using Neural Networks,” Springer. 2015.
[8] K. Levent and D. C. Alan, “Network Intrusion Detection Using A Hidden Naïve Bayes Binary Classifier,” 2015 17th Uksim-Amss International Conference on Modelling and Simulation (Uksim).
[9] A. Nadjaran, K. Mohsen, “A New Approach To Intrusion Detection Based On An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers,” July 2007, Computer Communications 30(10):2201-2212.
[10] D. Amin and R Mahmood, “Feature Selection Based On Genetic Algorithm And Support Vector Machine For Intrusion Detection System,” The Second International Conference On Informatics Engineering & Information Science (Icieis2013).
[11] A. Preeti and S. Sudhir, “Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection,” Procedia Computer Science, Volume 57, 2015, 842-851,
[12] D. M. Doan, D. H. Jeong and S. Ji, “Designing a Feature Selection Technique for Analyzing Mixed Data,” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0046-0052, doi: 10.1109/CCWC47524.2020.9031193.
[13] Campbell and Zachary, “Differentially Private ANOVA Testing,” 2018 1st International Conference on Data Intelligence and Security (ICDIS) (2018): 281-285.
[14] S. K. Murthy, “Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery 2, 345–389 (1998).
[15] S. Dhaliwal, A. Nahid and R. Abbas, “Effective Intrusion Detection System Using XGBoost. Information 2018, 9, 149.
[16] Pedregosa et al., “Scikit-learn: Machine Learning in Python,” JMLR 12, pp. 2825-2830, 2011.

Go to article

Authors and Affiliations

Shaikh Shakeela
1
N. Sai Shankar
1
P Mohan Reddy
1
T. Kavya Tulasi
1
M. Mahesh Koneru
1

  1. ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India

This page uses 'cookies'. Learn more