Filters
total: 2329
filtered: 1311
-
Catalog
- Publications 1311 available results
- Journals 283 available results
- Conferences 142 available results
- People 244 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 85 available results
- Events 5 available results
- Open Research Data 256 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: computer
-
Selected Aspect of IT Tools Application in Process Improvement in Industrial Laundry Services
PublicationThe laundry services sector in Poland is growing dynamically and currently has around 13,000 enterprises, mainly micro, small and medium size. The increasing competitiveness of this industry, causes more emphasis on solutions that can in-crease the efficiency of laundry processes and thereby strengthen the market position. One of the methods that can be used for this purpose is Lean Six Sigma, aided by specialized computer software....
-
Receiver of Doppler multistatic system for moving target detection and tracking
PublicationThe article presents a method for solving major structural problems that occur in the receiver used in the multistatic Doppler system, aimed at determination of the trajectory and velocity of a moving target. In the system two transmitters emit acoustic continuous sinusoidal waves at different frequencies. The signals, scattered from a moving target are received by four hydrophones. Beside of the echoes, much larger signals coming...
-
VARIANT DESIGNING IN the PRELIMINARY SMALL SHIP DESIGN PROCESS
PublicationShip designing is a complex process, as the ship itself is a complex, technical multi-level object which operates in the air/water boundary environment and is exposed to the action of many different external and internal factors resulting from the adopted technical solutions, type of operation, and environmental conditions. A traditional ship design process consists of a series of subsequent multistage iterations, which gradually...
-
Mathematical modelling of the overhead contact line for the purpose of diagnostics of pantographs
PublicationThe overhead contact line (OCL) is the most effective way for supplying railway electric vehicles. The increase of the speed of the vehicles increases power consumption and requires ensuring proper cooperation of pantographs with OCL. The paper describes the novel mathematical model of the OCL system and the simulation results. The primary objective is a more accurate analysis to increase the reliability of the evaluation of monitoring...
-
CHALK & TALK OR SWIPE & SKYPE?
PublicationTechnology in classroom is a matter of heated discussions in the field of education development, especially when multidisciplinary education goes along with language skills. Engineers’ education requires theoretical and practical knowledge. Moreover, dedicated computer skills become crucial for both young graduates and experienced educators on the labor market. Teaching online with or without using different Learning Management...
-
Modelling of dielectric properties of BiNbO4-based microwave ceramics
PublicationIn the present paper results of the studies devoted to computer simulations of dielectric response of electroceramics in a frequency domain as well as analysis of the experimental data are given. As an object of investigations BiNbO4-based microwave ceramics was taken. Simulations of the hypothetical impedance response of the ceramic system were performed under assumption of the brick-layer model. A strategy for analysis and modelling...
-
LabVIEW-based intelligent system of protection against electric shock for photovoltaic installations
PublicationEvaluation of shock hazard in installations with photovoltaic sources of energy is more complicated than in a conventional low voltage system. In case of earth fault in photovoltaic generators, that are connected to the AC power public grid, a composite waveform of earth fault current in the installation may occur. For composite waveforms, the safety criteria should be modified. The paper considers the effect of the composite waveforms...
-
Smart Innovation Engineering: Toward Intelligent Industries of the Future
PublicationKnowledge-based Engineering Systems are founded upon integration of knowledge into computer systems and are one of the core requirements for the future Industry 4.0. This paper presents a system called Smart Innovation Engineering (SIE) capable of facilitating product innovation process semi-automatically. It enhances decision-making processes by using the explicit knowledge of formal decision events. The SIE system carries the...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublicationIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Virtual immersive environments
PublicationYet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...
-
Is it too late now to say we’re sorry? Examining anxiety contagion and crisis communication strategies using machine learning
PublicationIn this paper, we explore the role of perceived emotions and crisis communication strategies via organizational computer-mediated communication in predicting public anxiety, the default crisis emotion. We use a machine-learning approach to detect and predict anxiety scores in organizational crisis announcements on social media and the public’s responses to these posts. We also control for emotional and language tones in organizational...
-
The usage of the openBIM idea in architectural design on the example of Blender and BlenderBIM add-on
PublicationThe aim of the article is the research about the method and advancement of the openBIM idea implementation, clearly defined by the buildingSMART organization. The conducted analysis are limited to the Blender program and the BlenderBIM add-on and has been embedded in the context of the work of an architect and other IT solutions. The article presents four aspects of the openBIM concept implementation. The first approach relates...
-
Asynchronous WAM with Irregular Pulse Repetition
PublicationRadiolocation systems for aviation based on Multi-Lateration (MLAT) typically use a set of synchronised ground sensors to receive radio signals broadcast by onboard transmitters. In most cases, the sensor synchronisation in Wide Area Multi-Lateration Systems (WAM) is provided by Global Navigation Satellite System (GNSS) receivers. However, in the case of synchronisation failure, there is still a possibility to estimate the coordinates...
-
Business Sentiment Analysis. Concept and Method for Perceived Anticipated Effort Identification
PublicationRepresenting a valuable human-computer interaction interface, Sentiment Analysis (SA) is applied to a wide range of problems. In the present paper, the researchers introduce a novel concept of Business Sentiment (BS) as a measurement of a Perceived Anticipated Effort (PAE) in the context of business processes (BPs). BS is considered as an emotional component of BP task contextual complexity perceived by a process worker after reading...
-
JAKOŚĆ USŁUG W ARCHITEKTURZE SIECI ASON/GMPLS A MECHANIZMY REZERWACJI ZASOBÓW
PublicationW artykule przedstawiono mechanizmy rezerwacji zasobów w architekturze sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie siecią z gwarancją jakości usług. W artykule porównano dwa mechanizmy rezerwacji zasobów z gwarancją jakości i podejściem typu POOL. Efektywność prezentowanych mechanizmów zweryfikowano metodą symulacji komputerowej w środowisku OMNeT++.
-
Metody sztucznej inteligencji do wspomagania bankowych systemów informatycznych
PublicationW pracy opisano zastosowania nowoczesnych metod sztucznej inteligencji do wspomagania bankowych systemów informatycznych. Wykorzystanie w systemach informatycznych algorytmów ewolucyjnych, harmonicznych, czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwiają zasadniczy wzrost konkurencyjności banku. Dlatego w pracy omówiono wybrane zastosowania bankowe ze szczególnym uwzględnieniem zbliżeniowych...
-
Mobilny system do detekcji obiektów ferromagnetycznych z magnetometrami pompowanymi optycznie
PublicationW pracy przedstawiono mobilny system do detekcji obiektów ferromagnetycznych. Każdy obiekt ferromagnetyczny zaburza w swoim otoczeniu równomierność pola magnetycznego Ziemi. Zaburzenie to może być zmierzone za pomocą precyzyjnych magnetometrów. W prezentowanym mobilnym systemie zastosowano magnetometry pompowane optycznie pracujące w układzie różnicowym. W pracy opisano magnetometryczny system do detekcji obiektów ferromagnetycznych,...
-
Parametry uziemień przy przebiegach udarowych i wysokoczęstotliwościowych
PublicationW artykule skupiono się na porównaniu dwóch metod badania impedancji uziemienia odgromowego: udarowej z wysoką częstotliwościową. Zestawiono wyniki pomiarów istniejących uziemień z wynikami komputerowych obliczeń symulacyjnych przeprowadzonych w środowisku programu PSIM. Uzyskane wyniki wskazują na poprawność przyjętego toku modelowania, a uzyskane w ten sposób dane mogą być przydatne w fazie projektowania do szacowania...
-
Safety issues referred to induced sheath voltages in high-voltage power cables – case study
PublicationLoad currents and short-circuit currents in high-voltage power cable lines are sources of the induced voltages in the power cables’ concentric metallic sheaths. When power cables operate with single-point bonding, which is the simplest bonding arrangement, these induced voltages may introduce an electric shock hazard or may lead to damage of the cables’ outer non-metallic sheaths at the unearthed end of the power cable line. To...
-
Przegląd badań na temat Wikipedii oraz z wykorzystaniem Wikipedii jako instrument badawczego
PublicationW badaniach dotychczas prowadzonych w Polsce Wikipedia była zarówno przedmiotem badań, jak i instrumentem badawczym. Badania na jej temat oraz na temat skutków społecznych jej używania prowadzili przedstawiciele nauk humanistycznych, społecznych, ekonomicznych i prawnych. Dla wielu badaczy (zwłaszcza z dziedziny informatyki) Wikipedia była instrumentem pomocnym w prowadzeniu różnorodnych analiz i dociekań naukowych. Niniejszy artykuł...
-
Modelowanie matematyczne górnej sieci trakcyjnej dla potrzeb diagnostyki odbieraków prądu
PublicationGórna sieć trakcyjna jest obecnie najbardziej skutecznym sposobem zasilania kolejowych pojazdów elektrycznych. Wzrost prędkości pojazdów zwiększa pobór mocy i wymaga zapewnienia właściwej współpracy odbieraków prądu pojazdów z siecią jezdną. Metody modelowania i projektowania wspomaganego komputerowo dla górnej sieci trakcyjnej są obecnie na całym świecie szeroko rozwijane. W artykule przedstawiono nowy model matematyczny elementów...
-
Algorytm kontroli jakości z elementami sterowania rozmytego dla elastycznie zautomatyzowanego wytwarzania.
PublicationPublikacja dotyczy struktury procesu produkcyjnego w środowisku komputerowo zintegrowanego wytwarzania (computer integrated manufacturing - CIM). Ukazuje ona aspekty kontroli jakości wykonania części na różnych etapach procesu wytwórczego, podkreślając jego istotność. W celu dokonania szczegółowej analizy problemu zebrano dane o jakości wykonania części na poszczególnych poziomach wytwarzania. Analizy dowiodły, że jakość wykonania...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublicationAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Effect of Simultaneous Valve Closures in Hydraulic Piping Systems
PublicationThe paper investigates wave interference (between pressure waves) occurring in simple hydraulic systems. Water hammer was induced by simultaneous closure of three valves located at the reservoirs of a “Y” type hydraulic system. Numerical simulations were carried out with the help of the freeware computer package Allievi enabling the reader to replicate results in a direct manner. The influence of the following quantities has been...
-
Lab-in-syringe as a practical technique for automatic microextraction: Evaluation by Blue Applicability Grade Index
PublicationLab-in-syringe (LIS) is a powerful automatic technique that is derived from sequential injection analysis. In LIS, a computer-controlled syringe pump is employed, and its syringe barrel serves as a mixing, reaction, and/or extraction chamber. Until now, the LIS concept has been efficiently employed for the automation of solid-phase microextraction and liquid-phase microextraction protocols as a front-end to a plethora of chromatographic...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublicationComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublicationRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Running performance of an aerodynamic journal bearing with squeeze film effect
PublicationResults of theoretical and experimental studies concerning the performance of an aerodynamic journal bearing of which running is assisted by squeeze film ultrasonic levitation (SFUL) are presented in this paper. The SFUL mechanism not only can separate journal from the bearing at the start and stop phases of operation but also can significantly contribute to the dynamic stability of the bearing when it runs at speed. Computer calculations...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Stress anisotropy characterisation with the help of Barkhausen effect detector with adjustable magnetic field direction
PublicationIn the paper we describe a novel apparatus for the measurement of the Barkhausen noise (BN) angular dependence, which in turn may be indicative of the stress induced anisotropy of magnetic properties. Such dependence can be further used for the stress distribution evaluation. The change of magnetization direction in the material is obtained by varying the magnetic flux density in two perpendicular yokes of the apparatus. We present...
-
Food analysis using artificial senses.
PublicationNowadays, consumers are paying great attention to the characteristics of food such as smell, taste, and appearance. This motivates scientists to imitate human senses using devices known as electronic senses. These include electronic noses, electronic tongues, and computer vision. Thanks to the utilization of various sensors and methods of signal analysis, artificial senses are widely applied in food analysis for process monitoring...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Dynamic soil improvement by hybrid technologies
PublicationHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Multimedia interface using head movements tracking
PublicationThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublicationModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
Computational methods for calculation of binding free energy for ligand-receptor complexes
PublicationAccurate description of the molecular complexes energetic influence is required for understanding of many biological functions carried out by proteins. Therefore, estimation of binding free energy for ligand-receptor complexes is of highest importance for structure-based ligand design and drug discovery approaches.Experimental methods of determination of difference in Gibbs'es free energy have many limitations. Thus, computational...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublicationNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublicationA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublicationCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublicationCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublicationCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublicationGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
Virtual reality technology in architectural education
PublicationContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Visualization of a lifeboat motion during lowering along ship’s side
PublicationThis paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublicationBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...