Search results for: Algorithm of DOA detection - Bridge of Knowledge

Search

Search results for: Algorithm of DOA detection

Filters

total: 3397
filtered: 2897

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: Algorithm of DOA detection

  • Multiscaled Hybrid Features Generation for AdaBoost Object Detection

    This work presents the multiscaled version of modified census features in graphical objects detection with AdaBoost cascade training algorithm. Several experiments with face detector training process demonstrate better performance of such features over ordinal census and Haar-like approaches. The possibilities to join multiscaled census and Haar features in single hybrid cascade of strong classifiers are also elaborated and tested....

    Full text available to download

  • Lexicon Based Algorithm for Domain Ontology Merging and Alignment

    Publication

    More and more systems contain some kind of knowledge describing their field of operation. Such knowledge in many cases is stored as an ontology. A need arises for ability to quickly match those ontologies to enable interoperability of such systems. The paper presents a lexicon based algorithm for merging and aligning of OWL ontologies. The proposed similarity levels are being presented and the proposed algorithm is being described....

    Full text to download in external service

  • Detection of damages in a rivetted plate

    Publication

    The paper presents the results of damage detection in a riveted aluminium plate. The detection method has been based on Lamb wave propagation. The plate has been analysed numerically and experimentally. Numerical calculations have been carried out by the use of the time-domain spectral finite element method, while for the experimental analysis laser scanning Doppler vibrometry (LSDV) has been utilised. The panel has been excited...

  • DEVELOPMENT OF THE ALGORITHM OF POLISH LANGUAGE FILM REVIEWS PREPROCESSING

    The algorithm and the software for conducting the procedure of Preprocessing of the reviews of films in the Polish language were developed. This algorithm contains the following steps: Text Adaptation Procedure; Procedure of Tokenization; Procedure of Transforming Words into the Byte Format; Part-of-Speech Tagging; Stemming / Lemmatization Procedure; Presentation of Documents in the Vector Form (Vector Space Model) Procedure; Forming...

    Full text available to download

  • Clonal selection algorithm for vehicle routing

    Publication

    - Year 2008

    Over the years several successful computing techniques have been inspired by biological mechanisms. Studies of the mechanisms that allow the immune systems of vertebratesto adapt and learn have resulted in a class of algorithms called artificial immune systems. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents...

    Full text to download in external service

  • Distributed Evolutionary Algorithm for Path Planning in Navigation Situation

    This article presents the use of a multi-population distributed evolutionary algorithm for path planning in navigation situation. The algorithm used is with partially exchanged population and migration between independently evolving populations. In this paper a comparison between a multi-population and a classic single-population algorithm takes place. The impact on the ultimate solution has been researched. It was shown that using...

    Full text available to download

  • Detection of the Incoming Sound Direction Employing MEMS Microphones and the DSP

    Publication

    - Year 2017

    A 3D acoustic vector sensor based on MEMS microphones and its application to road traffic monitoring is presented in the paper. The sensor is constructed from three pairs of digital MEMS microphones, mounted on the orthogonal axes. Signals obtained from the microphones are used to compute sound intensity vectors in each direction. With this data, it is possible to compute the horizontal and vertical angle of an incoming sound....

    Full text to download in external service

  • Context Search Algorithm for Lexical Knowledge Acquisition

    Publication

    - CONTROL AND CYBERNETICS - Year 2012

    A Context Search algorithm used for lexical knowledge acquisition is presented. Knowledge representation based on psycholinguistic theories of cognitive processes allows for implementation of a computational model of semantic memory in the form of semantic network. A knowledge acquisition using supervised dialog templates have been performed in a word game designed to guess the concept a human user is thinking about. The game,...

  • Graphs hard-to-process for greedy algorithm MIN

    Publication

    We compare results of selected algorithms that approximate the independence number in terms of the quality of constructed solutions. Furthermore, we establish smallest hard- to-process graphs for the greedy algorithm MIN.

    Full text to download in external service

  • Impact of Initial Population on Evolutionary Path Planning Algorithm

    Publication

    In this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal shippaths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....

  • Proximal primal–dual best approximation algorithm with memory

    Publication

    - COMPUTATIONAL OPTIMIZATION AND APPLICATIONS - Year 2018

    We propose a new modified primal–dual proximal best approximation method for solving convex not necessarily differentiable optimization problems. The novelty of the method relies on introducing memory by taking into account iterates computed in previous steps in the formulas defining current iterate. To this end we consider projections onto intersections of halfspaces generated on the basis of the current as well as the previous...

    Full text available to download

  • Impact of Initial Population on Evolutionary Path Planning Algorithm

    Publication

    In this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....

  • Novel 5.1 Downmix Algorithm with Improved Dialogue Intelligibility

    Publication

    A new algorithm for 5.1 to stereo downmix is introduced, which addresses the problem of dialogue intelligibility. The algorithm utilizes proposed signal processing algorithms to enhance the intelligibility of movie dialogues, especially in difficult listening conditions or in compromised speaker setup. To account for the latter, a playback configuration utilizing a portable device, i.e. an ultrabook, is examined. The experiments...

    Full text to download in external service

  • Point cloud unification with optimization algorithm

    Terrestrial laser scanning is a technology that enables to obtain three-dimensional data – an accurate representation of reality. During scanning not only desired objects are measured, but also a lot of additional elements. Therefore, unnecessary data is being removed, what has an impact on efficiency of point cloud processing. It can happen while single point clouds are displayed – user decides what he wants...

    Full text available to download

  • Robust algorithm for active feedback control of narrowband noise

    Publication

    The problem of active control of narrowband acoustic noise is considered. It is shown that the proposed earlier feedback control algorithm called SONIC (self-optimizing narrowband interference canceller), based on minimization of the L2-norm performance measure, can be re-derived using the L1 approach. The resulting robust SONIC algorithm is more robust to heavy-tailed measurement noise, such as the αlpha-stable noise, than the...

    Full text to download in external service

  • Detection and segmentation of moving vehicles and trains using Gaussian mixtures, shadow detection and morphological processing

    Publication

    Solution presented in this paper combines background modelling, shadow detection and morphological and temporal processing into one system responsible for detection and segmentation of moving objects recorded with a static camera. Vehicles and trains are detected based on their pixellevel difference from the continually updated background model utilizing a Gaussian mixture calculated separately for every pixel. The shadow detection...

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks

    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download

  • Arterial cannula shape optimization by means of the rotational firefly algorithm

    The article presents global optimization results of arterial cannula shapes by means of the newly modified firefly algorithm. The search for the optimal arterial cannula shape is necessary in order to minimize losses and prepare the flow that leaves the circulatory support system of a ventricle (i.e. blood pump) before it reaches the heart. A modification of the standard firefly algorithm, the so-called rotational firefly algorithm,...

    Full text to download in external service

  • Using River Formation Dynamics Algorithm in Mobile Robot Navigation

    River Formation Dynamics is a heuristic optimization algorithm based on the manner, in which drops of water form the river bed. The idea is to imitate the movement of drops on the edges between given nodes thus performing a search based on their height, which is modified through the mechanism of soil erosion and sediment deposition. In this way decreasing gradients are constructed, and these are followed by subsequent drops to...

    Full text to download in external service

  • Complex Root Finding Algorithm Based on Delaunay Triangulation

    A simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...

    Full text available to download

  • Resolving conflicts in object tracking for automatic detection of events in video

    Publication

    W referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...

  • Visual Features for Endoscopic Bleeding Detection

    Aims: To define a set of high-level visual features of endoscopic bleeding and evaluate their capabilities for potential use in automatic bleeding detection. Study Design: Experimental study. Place and Duration of Study: Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, between March 2014 and May 2014. Methodology: The features have...

    Full text available to download

  • Camera sabotage detection for surveillance systems

    Publication

    Camera dysfunction detection algorithms and their utilization in realtime video surveillance systems are described. The purpose of using the proposed analysis is explained. Regarding image tampering three algorithms for focus loss, scene obstruction and camera displacement detection are implemented and presented. Features of each module are described and certain scenarios for best performance are depicted. Implemented solutions...

    Full text to download in external service

  • A Parallel Genetic Algorithm for Creating Virtual Portraits of Historical Figures

    In this paper we present a genetic algorithm (GA) for creating hypothetical virtual portraits of historical figures and other individuals whose facial appearance is unknown. Our algorithm uses existing portraits of random people from specific historical period and social background to evolve a set of face images potentially resembling the person whose image is to be found. We then use portraits of the person's relatives to judge...

    Full text available to download

  • Autoencoder application for anomaly detection in power consumption of lighting systems

    Publication

    - IEEE Access - Year 2023

    Detecting energy consumption anomalies is a popular topic of industrial research, but there is a noticeable lack of research reported in the literature on energy consumption anomalies for road lighting systems. However, there is a need for such research because the lighting system, a key element of the Smart City concept, creates new monitoring opportunities and challenges. This paper examines algorithms based on the deep learning...

    Full text available to download

  • Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes

    Publication

    The paper presents a camera-independent framework for detecting violations of two typical people movement rules that are in force in many public transit terminals: moving in the wrong direction or across designated lanes. Low-level image processing is based on object detection with Gaussian Mixture Models and employs Kalman filters with conflict resolving extensions for the object tracking. In order to allow an effective event...

    Full text to download in external service

  • Computational algorithm for the analysis of mechatronic systems with distributed parameter elements

    Publication

    The paper presents a systematic computational package for analysis of complex systems composed of multiple lumped and distributed parameter subsystems. The algorithm is based on the transfer function method (DTFM). With this algorithm, a bond graph technique for the modelling is developed to simplify computations. Analysis of different systems requires only changing the inputs data in the form of the bond graph diagram

  • Automatic audio-visual threat detection

    Publication

    - Year 2010

    The concept, practical realization and application of a system for detection and classification of hazardous situations based on multimodal sound and vision analysis are presented. The device consists of new kind multichannel miniature sound intensity sensors, digital Pan Tilt Zoom and fixed cameras and a bundle of signal processing algorithms. The simultaneous analysis of multimodal signals can significantly improve the accuracy...

  • Video analytics-based algorithm for monitoring egress from buildings

    A concept and a practical implementation of the algorithm for detecting of potentially dangerous situations related to crowding in passages is presented. An example of such a situation is a crush which may be caused by an obstructed pedestrian pathway. The surveillance video camera signal analysis performed in the online mode is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of the...

    Full text available to download

  • Video Analytics-Based Algorithm for Monitoring Egress from Buildings

    Publication

    A concept and practical implementation of the algorithm for detecting of potentially dangerous situations of crowding in passages is presented. An example of such situation is a crush which may be caused by obstructed pedestrian pathway. Surveillance video camera signal analysis performed on line is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of implemented algorithm which uses...

    Full text to download in external service

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Neural Network-Based Sequential Global Sensitivity Analysis Algorithm

    Publication

    - Year 2022

    Performing global sensitivity analysis (GSA) can be challenging due to the combined effect of the high computational cost, but it is also essential for engineering decision making. To reduce this cost, surrogate modeling such as neural networks (NNs) are used to replace the expensive simulation model in the GSA process, which introduces the additional challenge of finding the minimum number of training data samples required to...

    Full text to download in external service

  • Efficient Complex Root Tracing Algorithm for Propagation and Radiation Problems

    An efficient complex root tracing algorithm for propagation and radiation problems is presented. The proposed approach is based on a discretization of Cauchy’s Argument Principle and its generalization to the C × R space. Moreover, an engagement of the tracing process with a global root finding algorithm recently presented in the literature is performed. In order to confirm a validity and efficiency of the proposed technique, a...

    Full text available to download

  • Generating optimal paths in dynamic environments using RiverFormation Dynamics algorithm

    The paper presents a comparison of four optimisation algorithms implemented for the purpose of finding the shortest path in static and dynamic environments with obstacles. Two classical graph algorithms –the Dijkstra complete algorithm and A* heuristic algorithm – were compared with metaheuristic River Formation Dynamics swarm algorithm and its newly introduced modified version. Moreover, another swarm algorithm has been compared...

    Full text to download in external service

  • Marking the Allophones Boundaries Based on the DTW Algorithm

    Publication

    - Year 2018

    The paper presents an approach to marking the boundaries of allophones in the speech signal based on the Dynamic Time Warping (DTW) algorithm. Setting and marking of allophones boundaries in continuous speech is a difficult issue due to the mutual influence of adjacent phonemes on each other. It is this neighborhood on the one hand that creates variants of phonemes that is allophones, and on the other hand it affects that the border...

  • Bees Detection on Images: Study of Different Color Models for Neural Networks

    Publication

    This paper presents an approach to bee detection in video streams using a neural network classifier. We describe the motivation for our research and the methodology of data acquisition. The main contribution to this work is a comparison of different color models used as an input format for a feedforward convolutional architecture applied to bee detection. The detection process has is based on a neural binary classifier that classifies...

    Full text available to download

  • Dynamic unattended measurement based routing algorithm for diffServ architecture

    Publication

    - Year 2010

    Dynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....

    Full text to download in external service

  • Direct detection of quantum entanglement

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2002

    Basing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.

  • Robust unsupervised georeferencing algorithm for aerial and satellite imagery

    Publication

    In order to eliminate a human factor and fully automate the process of embedding the spatial localization information in a remote sensed image the integrated georeferencing method was proposed. The paper presents this unsupervised and robust approach which is comprised of pattern recognition, using SIFT-based detector, and RANSAC based outlier removal with matching algorithm.

  • A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

    Publication

    - SENSORS - Year 2019

    This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...

    Full text available to download

  • Comparison of edge detection algorithms for electric wire recognition

    Publication

    Edge detection is the preliminary step in image processing for object detection and recognition procedure. It allows to remove useless information and reduce amount of data before further analysis. The paper contains the comparison of edge detection algorithms optimized for detection of horizontal edges. For comparison purposes the algorithms were implemented in the developed application dedicated to detection of electric line...

    Full text to download in external service

  • Multicriteria Evolutionary Weather Routing Algorithm in Practice

    The Multicriteria Evolutionary Weather Routing Algorithm (MEWRA) has already been introduced by the author on earlier TransNav 2009 and 2011 conferences with a focus on theoretical application to a hybrid-propulsion or motor-driven ship. This paper addresses the topic of possible practical weather routing applications of MEWRA. In the paper some practical advantages of utilizing Pareto front as a result of multicriteria optimization...

    Full text available to download

  • Computer experiments with a parallel clonal selection algorithm for the graph coloring problem

    Publication

    - Year 2008

    Artificial immune systems (AIS) are algorithms that are based on the structure and mechanisms of the vertebrate immune system. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents a parallel island model algorithm based on the clonal selection principles for solving the Graph Coloring Problem. The performance of...

    Full text to download in external service

  • Automatic Detection of Nerves in Confocal Corneal Images with Orientation-Based Edge Merging

    The paper presents an algorithm for improving results of automatic nerve detections in confocal microscopy images of human corneal. The method is designed as a postprocessing step of regular detection. After the nerves are initially detected, the algorithms attempts to improve the results by filling unde-sired gaps between single nerves detections in order to correctly mark the entire nerve instead of only parts of it. This approach...

    Full text to download in external service

  • Molecularly imprinted polymers for the detection of volatile biomarkers

    Publication

    - TRAC-TRENDS IN ANALYTICAL CHEMISTRY - Year 2024

    In the field of cancer detection, the development of affordable, quick, and user-friendly sensors capable of detecting various cancer biomarkers, including those for lung cancer (LC), holds utmost significance. Sensors are expected to play a crucial role in the early-stage diagnosis of various diseases. Among the range of options, sensors emerge as particularly appealing for the diagnosis of various diseases, owing to their cost-effectiveness,...

    Full text available to download

  • Rating by detection: an artifact detection protocol for rating EEG quality with average event duration

    Publication
    • D. Węsierski
    • M. R. Rufuie
    • O. Milczarek
    • W. Ziembla
    • P. Ogniewski
    • A. Kołodziejak
    • P. Niedbalski

    - Journal of Neural Engineering - Year 2023

    Quantitative evaluation protocols are critical for the development of algorithms that remove artifacts from real EEG optimally. However, visually inspecting the real EEG to select the top-performing artifact removal pipeline is infeasible while hand-crafted EEG data allow assessing artifact removal configurations only in a simulated environment. This study proposes a novel, principled approach for quantitatively evaluating algorithmically...

    Full text available to download

  • A telemedical and an outpatient thoracic impedance measurements - a validation algorithm of the electrodes placement

    Publication

    - Year 2015

    This paper presents the algorithm for validation of electrodes locations for the thoracic impedance measurements. In particular the presented algorithm was designed to perform the telemetric sleep apnea monitoring. One of the problems, during the clinical tests of a developed device, was to preserve the repeatability of measurements. It strongly depended on the appropriate electrodes placement on the examined person’s thorax. It...

    Full text to download in external service

  • SYNTHESIZING MEDICAL TERMS – QUALITY AND NATURALNESS OF THE DEEP TEXT-TO-SPEECH ALGORITHM

    The main purpose of this study is to develop a deep text-to-speech (TTS) algorithm designated for an embedded system device. First, a critical literature review of state-of-the-art speech synthesis deep models is provided. The algorithm implementation covers both hardware and algorithmic solutions. The algorithm is designed for use with the Raspberry Pi 4 board. 80 synthesized sentences were prepared based on medical and everyday...

    Full text available to download

  • an intelligent image processing sensor - the algorithm and the hardware implementation

    Publication

    W artykule przedstawiono algorytm przeznaczony do rozpoznawania obiektów ruchomych w obrazie do celu analizy ruchu pojazdów. Algorytm został zrealizowany w układzie FPGA.Ang.: This paper describes the idea and theimplementation of the robust algorithm dedicated toextraction of moving vehicles from real-time cameraimages for the evaluation of traffic parameters, suchas the number of vehicles, their direction of movementand their...

  • Evaluation of sound event detection, classification and localization in the presence of background noise for acoustic surveillance of hazardous situations

    Publication

    An evaluation of the sound event detection, classification and localization of hazardous acoustic events in the presence of background noise of different types and changing intensities is presented. The methods for separating foreground events from the acoustic background are introduced. The classifier, based on a Support Vector Machine algorithm, is described. The set of features and samples used for the training of the classifier...

    Full text to download in external service