Publications
Filters
total: 340
Catalog Publications
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
A new quaternion-based encryption method for DICOM images
PublicationIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
Subarachnoid Space: New Tricks by an Old Dog
PublicationPurpose: The purpose of the study was to: (1) evaluate the subarachnoid space (SAS) width and pial artery pulsation in both hemispheres, and (2) directly compare magnetic resonance imaging (MRI) to near-infrared transillumination/backscattering sounding (NIR-T/BSS) measurements of SAS width changes in healthy volunteers.Methods: The study was performed on three separate groups of volunteers, consisting in total of 62 subjects (33...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Fluctuation-enhanced scent sensing using a single gas sensor
PublicationWykrywanie zapachów podczas aromaterapii może być przeprowadzone za pomocą pojedynczego sensora gazów. W pracy rozważono efektywność detekcji zapachów olejków eterycznych za pomocą rezystancji DC oraz zjawisk fluktuacyjnych w tych sensorach, typu TGS2600,TGS2602,TGS823. Badania koncentrowały się na praktycznym zastosowaniu w aromaterapii do określania intensywności emitowanego zapachu. Opisano szczegółowo system do emisji zapachów.
-
A novel approach exploiting properties of convolutional neural networks for vessel movement anomaly detection and classification
PublicationThe article concerns the automation of vessel movement anomaly detection for maritime and coastal traffic safety services. Deep Learning techniques, specifically Convolutional Neural Networks (CNNs), were used to solve this problem. Three variants of the datasets, containing samples of vessel traffic routes in relation to the prohibited area in the form of a grayscale image, were generated. 1458 convolutional neural networks with...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Variable Fractional Delay Filter Design Using a Symmetric Window
PublicationIn this paper a numerically efficient method for designing a nearly optimal variable fractional delay (VFD) filter based on a simple and well-known window method is presented. In the proposed method a single window extracted from the optimal filter with fixed fractional delay (FD) is divided into even and odd part. Subsequently, the odd part is discarded and symmetric even part of the extracted window is used to design a family...
-
Application of least squares with conditional equations method for railway track inventory using GNSS observations
Publication -
Application of Least Squares with Conditional Equations Method for Railway Track Inventory Using GNSS Observations
PublicationSatellite geodetic networks are commonly used in surveying tasks, but they can also be used in mobile surveys. Mobile satellite surveys can be used for trackage inventory, diagnostics and design. The combination of modern technological solutions with the adaptation of research methods known in other fields of science offers an opportunity to acquire highly accurate solutions for railway track inventory. This article presents the...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Farrow structure implementation of fractional delay filter optimal in Chebyshev sense
PublicationW pracy omówiono problematykę implementacji filtrów ułamkowych opóźniających o zmiennym opóźnieniu w oparciu o strukturę Farrowa. Podejście to polega na obliczeniu próbek nowej odpowiedzi impulsowej filtru dla każdego wymaganego opóźnienia w opraciu o wielomiany o współczynnikach niezależnych od opóźnienia. Prowadzi to do znacznego zmniejszenia kosztów numerycznych implementacji w zastosowaniach wymagających częstej zmiany opóźnienia...
-
MAPSERVER – INFORMATION FLOW MANAGEMENT SOFTWARE FOR THE BORDER GUARD DISTRIBUTED DATA EXCHANGE SYSTEM
PublicationIn this paper the architecture of the software designed for management of position and identification data of floating and flying objects in Maritime areas controlled by Polish Border Guard is presented. The software was designed for managing information stored in a distributed system with two variants of the software, one for a mobile device installed on a vessel, an airplane or a car and second for a central server. The details...
-
Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model
PublicationIn this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublicationIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Gain deficit effect in the fractional delay filter design by the window method
PublicationMetoda okien jest sposobem szybkiego i skutecznego projektowania filtrów ułamkowoopóźniających. Jednakże wzmocnienie tak zaprojektowanego filtru różni się od zakładanej wartości idealnej. To zjawisko, nazywane deficytem wzmocnienia, negatywnie wpływa na jakoś projektowanego filtru. Artykuł poświęcono wynikom badań oraz metodom korekcji tego problemu. Omówiono wpływ współczynnika korekcji deficytu wzmocnienia na charakterystykę...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublicationProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Analysis of IMS/NGN Call Processing Performance Using Phase-Type Distributions Based on Experimental Histograms
PublicationThe paper describes our further research done with the proposed analytical and simulation traffic models of the Next Generation Network (NGN), which is standardized for delivering multimedia services with strict quality and includes elements of the IP Multimedia Subsystem (IMS). The aim of our models of a single IMS/NGN domain is to evaluate two standardized call processing performance parameters, which appropriate values are very...
-
Neural network training with limited precision and asymmetric exponent
PublicationAlong with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...