Hubert Zarzycki
Kazimierz Wielki University in Bydgoszcz
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hubert Zarzycki.
international conference: beyond databases, architectures and structures | 2014
Łukasz Apiecionek; Jacek M. Czerniak; Hubert Zarzycki
This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible solution to deal with it. The proposed methods have already been tested in the range of their impact on network resources. The results presented in this article suggest that the method may be implemented as an efficient solution for some DDoS attacks.
international conference: beyond databases, architectures and structures | 2014
Jacek M. Czerniak; Łukasz Apiecionek; Hubert Zarzycki
This paper describes the results of experiments concerning the optimization method called OFNAnt. As the benchmarks, the author used the set of files from TSPlib repository which includes well known samples of the travelling salesman problem. The innovation of the proposed method consists in implementation of Ordered Fuzzy Numbers to the decision-making process of individual ant agents. This also made it possible to correlate the colony development optimization with the trend. Previous implementations of the fuzzy logic to such meta heuristics like ant systems came down to fuzzy control over the decision-making process of an ant or fuzzy control of the pheromone release mechanism. Thanks to the proposed method, it was possible to expand the family of solutions with the solutions represented by ants moving outside the main circulation. The improvement was possible thanks to better stress that, according to the OFN arithmetic, was put on their participation in the process as compared to the conventional approach, as the direction of their movement has been opposed to the trend followed by majority of colonies. Final conclusions of the experiment indicate to superiority of methods based on Ant Colony Optimization, and in particular the superiority of OFNAnt method over heuristic methods.
IEEE Conf. on Intelligent Systems (1) | 2015
Dawid Ewald; Jacek M. Czerniak; Hubert Zarzycki
This article describes the use of the bees algorithm for optimization of the multi-object structure of a welded beam. This problem has been used as a benchmark of the bees algorithm. This article presents an approach to improve the ABC algorithm criteria used for the WBDP multicriteria optimization. The contents of the article show the analysis of the problem, conducted based on the mathematical calculations of the beam dimensions. The further part constitutes a comparison of the received results with the results of the ABC operation. Based on the standards, an additional criterion was established, which verifies the correctness of the results.
IEEE Conf. on Intelligent Systems (2) | 2015
Jacek M. Czerniak; Wojciech T. Dobrosielski; Hubert Zarzycki; Lukasz Apiecionek
The article presents the owlANT method, which allows us to associate a collection of short text messages with ontology. The trails were conducted on the collection of communications by Reuters (the so-called second collection). As the methodological base of the method, a swarm intelligence was used, namely the ant colony optimisation. The ants, moving between the ontological nodes [1][2], left their pheromone trace. As a result, some branches of relations - after some time in evolution - were marked more strongly than the others. On the basis of the intensity of the pheromone trace, one can formulate the strength of relations between the various associations, and - indirectly - also between the associated documents. As far as the authors know, no one has so far published research on the application of ACO to the development of similarity measure of text documents with the consideration of their meaning-related embedding in ontology. The authors refer to the work [3][4], in which the ACO was used for aggregation of concepts in ontology; however, both the purpose and the method were different in that case. The research described in the report will be continued to specify the similarity measures taking into consideration the distance in ontology obtained thanks to the evolutionary processing of the meaning of terms with the use of ACO.
IWIFSGN@FQAS | 2016
Jacek M. Czerniak; Łukasz Apiecionek; Hubert Zarzycki; Dawid Ewald
This paper presents practical applications of the cellular automata theory for building fire simulation using the CAEva method. Thanks to the tests carried out using appropriately configured program, realistic results of simulated evacuation of people from the building have been achieved. The paper includes the references to actual fire disasters and provides numbers of their resulting casualties. Using such a kind of predication in civil engineering should increase the fire safety of buildings. Simulations described in this paper seem to be very useful, particularly in case of building renovation or temporary unavailability of escape routes. Using them, it is possible to visualize potential hazards and to avoid increased risk in case of fire. Inappropriate operation of buildings, including insouciant planning of renovations are among frequent reasons of tragic accidents cited by fire brigade information services. Similar problems are encountered by inspectors who assess spontaneous fire accidents or arsons during mas events, where wrong safety procedures or inappropriate attempts to cut costs resulted in tragedy. Thanks to the proposed solutions it shall be easier to envisage consequences of problematic decisions causing temporary or permanent unavailability of escape routes. This is exactly the problem analyzed by this paper. It does not take into account, by the rule, the influence of \(\mathrm{CO}_{2}\) and other gases on evacuation difficulty. The described method has been analyzed using descriptions of real life fires, the participants of which were neither asleep nor asphyxiated with carbon monoxide, while the escape was hindered by fire, room layout as well as stress and number of the event participants. The results achieved for such conditions are approximate to the actual (reallife) outcomes, which proved the method to be correct.
IWIFSGN@FQAS | 2016
Wojciech T. Dobrosielski; Janusz Szczepanski; Hubert Zarzycki
This article presents a proposal for a new method of defuzzification a fuzzy controller, which is based on the concept of the golden ratio, derived from the Fibonacci series [1]. The origin of the method was the observation of numerous instances of the golden ratio in such diverse fields as biology, architecture, medicine, and painting. A particular area of its occurrence is genetics, where we find the golden ratio in the very structure of the DNA molecule [2] (deoxyribonucleic acid molecules are 21 angstroms wide and 34 angstroms long for each full length of one double helix cycle). This fact makes the ratio in the Fibonacci series in some sense a universal design principle used by man and nature alike. In keeping with the requirements, the authors of the present study first explain the essential concepts of fuzzy logic, including in particular the notions of a fuzzy controller and a method of defuzzification. Then, they postulate the use of the golden ratio in the process of defuzzification and call the idea the Golden Ratio (GR) Method. In the subsequent part of the article, the proposed GR-based instrument is compared with the classical methods of defuzzification, including COG, FOM, and LOM. In the final part, the authors carry out numerous calculations and formulate conclusions which serve to classify the proposed method. At the end they present directions of further research.
Simulation Modelling Practice and Theory | 2017
Jacek M. Czerniak; Hubert Zarzycki; Dawid Ewald
Abstract The article presents a new multi-criteria optimization method called Artificial Acari Optimization (AAO). AAO method was tested with five well-known benchmark structural problems i.e.: welded beam, pressure vessel, speed reducer, spring design and gear train problem. The results were compared on other representatives of Swarm Intelligence mainstream which are bee algorithms MBO, BCO and ABC. Numerous references show dominance of ABC over MBO and BCO. To check this, a detailed comparisons of AAO results were made and introduced together with the results of the ABC algorithm.
Journal of Computational Science | 2017
Jacek M. Czerniak; Hubert Zarzycki
Abstract In the article, the authors present the application of new optimization methods called Artificial Acari Optimization (AAO) and analyze it with other known algorithms for specific groups of benchmarks. The authors were inspired by the social behavior of Acari (mites) creating a strategy for herd searching for solutions. In the article results obtained for AAO were compared with other algorithms belonging to swarm intelligence: particle swarm optimization (PSO), glowworm swarm based optimization algorithm (GSO) and artificial bee colony (ABC). In a benchmark test four functions often used in testing methods of optimization were applied. These functions include: Ackley – with a relatively uniform surface, having tens of local minimums and one global maximum with a much lower value than most of the local minimums; Sphere with a single plane, having just one minimum; Easom characterized by a constant plane over overwhelming majority of domain with only one steep minimum, and Eggholder function with uneven surface having dozens of local minimums, where local minimums are close to the value of the only one global minimum.
KKIO Software Engineering Conference | 2017
Hubert Zarzycki; Jacek M. Czerniak; Dawid Lakomski; Piotr Kardasz
This paper contains study to confirm advantage of database systems in the client-side architecture for certain applications. Research investigates whether the client-side architecture systems can be more efficient at the significant load as compared to server-side architectures systems. The experiments were carried out for two types of servers and clients for a variety of tasks and servers load. For the purpose of experiments a two-part database system for reporting failures to IT department has been developed in Visual C# language according to former design assumptions. Then it was compared with the same system developed using PHP in the server-side architecture. The study has proven the advantage of client-side architecture systems in case of servers under high load and confirmed importance of using such architecture for small and medium-sized systems. Additionally, it indicated the necessity to optimize queries in order to accelerate operation of both kinds of applications as well as the need to use optimum network setup of the server.
IWIFSGN@FQAS | 2016
Swietłana Lebiediewa; Hubert Zarzycki; Wojciech T. Dobrosielski
In the paper the condition for equivalence of problem-oriented databases (DB) models has been formulated. A data segment and problem-focused data manipulation language of database for multi-stage recognition of objects has been characterized. The relational and a corresponding object-oriented models of DB has been described. A few assertions regarding the equivalence of the relational and object DB models for recognition have been proved.