Filters
total: 803
filtered: 670
-
Catalog
Chosen catalog filters
Search results for: COMPUTER CALCULATIONS
-
Hand gesture recognition supported by fuzzy rules and Kalman filters
PublicationThe paper presents a system based on camera and multimediaprojector enabling a user to control computer applications by dynamic hand gestures. Gesture recognition methodology based on representing hand movement trajectory by motion vectors analysed using fuzzy rule-based inference is first given. For effective hand position tracking Kalman filters are employed. The system engineered is developed using J2SE and C++/OpenCV technology....
-
Receiver of Doppler multistatic system for moving target detection and tracking
PublicationThe article presents a method for solving major structural problems that occur in the receiver used in the multistatic Doppler system, aimed at determination of the trajectory and velocity of a moving target. In the system two transmitters emit acoustic continuous sinusoidal waves at different frequencies. The signals, scattered from a moving target are received by four hydrophones. Beside of the echoes, much larger signals coming...
-
Business Sentiment Analysis. Concept and Method for Perceived Anticipated Effort Identification
PublicationRepresenting a valuable human-computer interaction interface, Sentiment Analysis (SA) is applied to a wide range of problems. In the present paper, the researchers introduce a novel concept of Business Sentiment (BS) as a measurement of a Perceived Anticipated Effort (PAE) in the context of business processes (BPs). BS is considered as an emotional component of BP task contextual complexity perceived by a process worker after reading...
-
CHALK & TALK OR SWIPE & SKYPE?
PublicationTechnology in classroom is a matter of heated discussions in the field of education development, especially when multidisciplinary education goes along with language skills. Engineers’ education requires theoretical and practical knowledge. Moreover, dedicated computer skills become crucial for both young graduates and experienced educators on the labor market. Teaching online with or without using different Learning Management...
-
Asynchronous WAM with Irregular Pulse Repetition
PublicationRadiolocation systems for aviation based on Multi-Lateration (MLAT) typically use a set of synchronised ground sensors to receive radio signals broadcast by onboard transmitters. In most cases, the sensor synchronisation in Wide Area Multi-Lateration Systems (WAM) is provided by Global Navigation Satellite System (GNSS) receivers. However, in the case of synchronisation failure, there is still a possibility to estimate the coordinates...
-
LabVIEW-based intelligent system of protection against electric shock for photovoltaic installations
PublicationEvaluation of shock hazard in installations with photovoltaic sources of energy is more complicated than in a conventional low voltage system. In case of earth fault in photovoltaic generators, that are connected to the AC power public grid, a composite waveform of earth fault current in the installation may occur. For composite waveforms, the safety criteria should be modified. The paper considers the effect of the composite waveforms...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublicationRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
Smart Innovation Engineering: Toward Intelligent Industries of the Future
PublicationKnowledge-based Engineering Systems are founded upon integration of knowledge into computer systems and are one of the core requirements for the future Industry 4.0. This paper presents a system called Smart Innovation Engineering (SIE) capable of facilitating product innovation process semi-automatically. It enhances decision-making processes by using the explicit knowledge of formal decision events. The SIE system carries the...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublicationIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
The usage of the openBIM idea in architectural design on the example of Blender and BlenderBIM add-on
PublicationThe aim of the article is the research about the method and advancement of the openBIM idea implementation, clearly defined by the buildingSMART organization. The conducted analysis are limited to the Blender program and the BlenderBIM add-on and has been embedded in the context of the work of an architect and other IT solutions. The article presents four aspects of the openBIM concept implementation. The first approach relates...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Virtual immersive environments
PublicationYet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...
-
Autonomous Control of the Underwater Remotely Operated Vehicle in Collision Situation with Stationary Obstacle
PublicationThe article considers the problem of autonomous control of the underwater remotely operated vehicle mini Remotely Operated Vehicle (ROV) in a collision situation with a stationary obstacle. The control of the collision avoidance process is presented as a synthesis of fuzzy proportional-differential controllers for the control of distance and orientation concerning the detected stationary obstacle. The control of the submergence...
-
Is it too late now to say we’re sorry? Examining anxiety contagion and crisis communication strategies using machine learning
PublicationIn this paper, we explore the role of perceived emotions and crisis communication strategies via organizational computer-mediated communication in predicting public anxiety, the default crisis emotion. We use a machine-learning approach to detect and predict anxiety scores in organizational crisis announcements on social media and the public’s responses to these posts. We also control for emotional and language tones in organizational...
-
Modelling of dielectric properties of BiNbO4-based microwave ceramics
PublicationIn the present paper results of the studies devoted to computer simulations of dielectric response of electroceramics in a frequency domain as well as analysis of the experimental data are given. As an object of investigations BiNbO4-based microwave ceramics was taken. Simulations of the hypothetical impedance response of the ceramic system were performed under assumption of the brick-layer model. A strategy for analysis and modelling...
-
Adjusting Game Difficulty by Recreating Behavioral Trees of Human Player Actions
PublicationThis paper presents a proposition of a method for adjusting game difficulty to the current level of player's skills in one-on-one games. The method is based on recognition of human player's actions and recording of those actions in the form of behavioral trees. Such trees are later used to drive behaviors of computer-controlled opponents so that human player has beat hit own strategy and improve on it, to win subsequent games....
-
Classification of Sea Going Vessels Properties Using SAR Satellite Images
PublicationThe aim of the project was to analyze the possibility of using machine learning and computer vision to identify (indicate the location) of all sea-going vessels located in the selected area of the open sea and to classify the main attributes of the vessel. The key elements of the project were to download data from the Sentinel-1 satellite [1], download data on the sea vessels [2], then automatically tag data and develop a detection...
-
Safety issues referred to induced sheath voltages in high-voltage power cables – case study
PublicationLoad currents and short-circuit currents in high-voltage power cable lines are sources of the induced voltages in the power cables’ concentric metallic sheaths. When power cables operate with single-point bonding, which is the simplest bonding arrangement, these induced voltages may introduce an electric shock hazard or may lead to damage of the cables’ outer non-metallic sheaths at the unearthed end of the power cable line. To...
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublicationCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Multimedia interface using head movements tracking
PublicationThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublicationModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Algorytm kontroli jakości z elementami sterowania rozmytego dla elastycznie zautomatyzowanego wytwarzania.
PublicationPublikacja dotyczy struktury procesu produkcyjnego w środowisku komputerowo zintegrowanego wytwarzania (computer integrated manufacturing - CIM). Ukazuje ona aspekty kontroli jakości wykonania części na różnych etapach procesu wytwórczego, podkreślając jego istotność. W celu dokonania szczegółowej analizy problemu zebrano dane o jakości wykonania części na poszczególnych poziomach wytwarzania. Analizy dowiodły, że jakość wykonania...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublicationAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Stress anisotropy characterisation with the help of Barkhausen effect detector with adjustable magnetic field direction
PublicationIn the paper we describe a novel apparatus for the measurement of the Barkhausen noise (BN) angular dependence, which in turn may be indicative of the stress induced anisotropy of magnetic properties. Such dependence can be further used for the stress distribution evaluation. The change of magnetization direction in the material is obtained by varying the magnetic flux density in two perpendicular yokes of the apparatus. We present...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublicationA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Food analysis using artificial senses.
PublicationNowadays, consumers are paying great attention to the characteristics of food such as smell, taste, and appearance. This motivates scientists to imitate human senses using devices known as electronic senses. These include electronic noses, electronic tongues, and computer vision. Thanks to the utilization of various sensors and methods of signal analysis, artificial senses are widely applied in food analysis for process monitoring...
-
TECHNIKI CAD W INŻYNIERII ELEKTRYCZNEJ - WYBRANE ZAGADNIENIA
PublicationW pracy przedstawiono różne techniki CAD (ang. Computer Aided Design) wykorzystywane w inżynierii elektrycznej dla potrzeb komputerowego modelowania 3D przetworników elektromechanicznych. Wirtualne modele 3D różnych urządzeń są użyteczne nie tylko przy opracowywaniu dokumentacji technicznej ale są także wykorzystywane w obliczeniach inżynierskich:...
-
Cross-domain applications of multimodal human-computer interfaces
PublicationDeveloped multimodal interfaces for education applications and for disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and audio interface for speech stretching for hearing impaired and stuttering people and intelligent pen allowing for diagnosing and ameliorating developmental dyslexia. The eye-gaze tracking system named...
-
Dynamic soil improvement by hybrid technologies
PublicationHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublicationCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublicationCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublicationNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
A note on the affective computing systems and machines: a classification and appraisal
PublicationAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublicationThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Z PERSPEKTYWY NIECO PONAD 15 LAT DZIAŁALNOŚCI ODDZIAŁU IEEE GDAŃSK COMPUTER SOCIETY (CHAPTER C16) NA WYDZIALE ELEKTRONIKI, TELEKOMUNIKACJI I INFORMATYKI, POLITECHNIKI GDAŃSKIEJ
PublicationW pracy przywołano pokrótce najważniejsze działania, które towarzyszyły powstaniu i funkcjonowaniu Oddziału IEEE Gdańsk Computer Society (Chapter C16). Zaprezentowano skład Zarządu Oddziału w kolejnych kadencjach. Zwrócono uwagę między innymi na rolę Oddziału w promowaniu osiągnięć wybitnych naukowców, prezentujących swoje prace w ramach wykładów, odbywających się pod auspicjami Oddziału, jak też na współudział Oddziału w organizacji...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublicationBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Virtual reality technology in architectural education
PublicationContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublicationGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublicationComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublicationRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Effect of Simultaneous Valve Closures in Hydraulic Piping Systems
PublicationThe paper investigates wave interference (between pressure waves) occurring in simple hydraulic systems. Water hammer was induced by simultaneous closure of three valves located at the reservoirs of a “Y” type hydraulic system. Numerical simulations were carried out with the help of the freeware computer package Allievi enabling the reader to replicate results in a direct manner. The influence of the following quantities has been...
-
Role of research and development in internationalization of high-tech firms: Empirical results from Poland
PublicationThe article focuses on the significance of research and development (R&D) in driving the internationalization of Polish high-tech firms. R&D is essential for businesses to remain competitive and adapt their products to the specific requirements of different markets. The study aims to investigate the relationship between R&D and the internationalization process of high-tech firms based in Poland, with a focus on the innovation context....
-
Local structural and chemical ordering of nanosized Pt(3±δ)Co probed by multiple-scattering x-ray absorption spectroscopy
PublicationThis work reports a detailed investigation of the local structure and chemical disorder of a Pt(3±δ)Co thin film and Pt(3±δ)Co nanoparticles. We have used a combination of techniques including x-ray absorption spectroscopy (XAS), x-ray diffraction (XRD), and high-resolution transmission electron microscopy (TEM). The important effect of chemical ordering on pair and three-atom configurations has been studied using computer simulations...
-
Depth Images Filtering In Distributed Streaming
PublicationIn this paper, we propose a distributed system for point cloud processing and transferring them via computer network regarding to effectiveness-related requirements. We discuss the comparison of point cloud filters focusing on their usage for streaming optimization. For the filtering step of the stream pipeline processing we evaluate four filters: Voxel Grid, Radial Outliner Remover, Statistical Outlier Removal and Pass Through....