Filters
total: 144
Best results in : Research Potential Pokaż wszystkie wyniki (108)
Search results for: PINE, LOG SORTING METHOD, LOG QUALITY, SHAPE SCANNER, SAWMILL
-
Zespół Obrabiarek, Narzędzi i Obróbki Skrawaniem
Research PotentialMechaniczna technologia drewna
-
Zespół Systemów i Urządzeń Energetyki Cieplnej
Research Potentialintensyfikacja wymiany ciepła, nowoczesne wymienniki ciepła, wysokotemperaturowe pompy ciepła, mikrosiłownie ORC i inne
-
HAL 2010
Research Potentialbadania eksperymentalne, symulacje numeryczne oparte na MES, w dziedzienie mechanika konstrukcji i biomechanika
Best results in : Business Offer Pokaż wszystkie wyniki (36)
Search results for: PINE, LOG SORTING METHOD, LOG QUALITY, SHAPE SCANNER, SAWMILL
-
Laboratorium Technologii Maszyn i Inżynierii Odwrotnej
Business Offer -
Centrum Civitroniki – Centrum Zaawansowanych Technologii
Business OfferCentrum Civitroniki działa na Wydziale Inżynierii Lądowej i Środowiska Politechniki Gdańskiej. W skład Centrum Cicitroniki wchodzą następujące pracownie:Pracownia DIM-Tefal, Pracownia defektorskopii, badań materiału i konstrukcji metalowych, Pracownia geodezyjnego monitorowania budowli inżynierskich, Pracownia badań drogowych, Pracownia fizyki budowli oraz Nazwa Civitronika jest wynikiem połączenia wyrażeń: „civil engineering”...
-
Laboratorium Badań Środowiskowych w Transporcie
Business OfferBadania sygnałów akustycznych i drganiowych. Analizy sygnałów wibroakustycznych.
Other results Pokaż wszystkie wyniki (21008)
Search results for: PINE, LOG SORTING METHOD, LOG QUALITY, SHAPE SCANNER, SAWMILL
-
THE EFFECT OF LOG SORTING STRATEGY ON THE FORECASTED LUMBER VALUE AFTER SAWING PINE WOOD
PublicationThe optimal transformation path for the resource is determined by the quality of a log combined with its dimension. The commercial value of derived products is also closely connected with the size and extent of containing wood deficiencies. The results of studies with three diverse strategies for log sorting are presented in the paper. Resource assessment by a worker without extensive experience in sorting logs, the certified grading...
-
Discovering interactions between applications with log analysis
PublicationApplication logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development...
-
Frequent Sequence Mining in Web Log Data
PublicationThe amount of information available even on a single web server can be huge. On the other hand, the amount of visitors (users) can often reach a number of at least six digits. Users vary in gender, age and education, and in consequence their information needs are different. Moreover, they subconsciously expect to get more adequate content after visiting the first few pages. The scope of this kind of problem relates to the domain...
-
Stochastic equivalence scales in log-normal distributions of expenditures
PublicationIn the paper, the properties of the stochastic equivalence scales (SES) are analysed when expenditure distributions are log-normal. The SES provides the equivalent distribution of expenditures when the population of households is heterogeneous with respect to such attributes as household size, demographic cpmposition, etc. For log-normal expenditure distributions, the non-parametric SES deflators are proportional to the ration...
-
Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping Study
PublicationLogging is a common practice in software engineering to provide insights into working systems. The main uses of log files have always been failure identification and root cause analysis. In recent years, novel applications of logging have emerged that benefit from automated analysis of log files, for example, real-time monitoring of system health, understanding users’ behavior, and extracting domain knowledge. Although nearly every...