displaying 1000 best results Help
Search results for: heuristic results verification
-
On the necessity of experimental verification of numerical results in biomedical applications
PublicationPorous structures made of metal or biopolymers with a structure similar in shape and mechanical properties to human bone can be easily produced by stereolitography techniques, e.g. selective laser melting (SLM). Numerical techniques, like finite element method (FEM) have great potential in testing new, even the most sophisticated designs, according to their mechanical properties, i.e. strength or stiffness. However, due to different...
-
Analysis of results of large-scale multimodal biometric identity verification experiment
PublicationAn analysis of a large set of biometric data obtained during the enrolment and the verification phase in an experimental biometric system installed in bank branches is presented. Subjective opinions of bank clients and of bank tellers were also surveyed concerning the studied biometric methods in order to discover and to explore relations emerging from the obtained multimodal dataset. First, data acquisition and identity verification...
-
Verification of the theoretical methods for the prediction of resistance of sailing yachts based on model test results of a yacht V.O.60
PublicationWeryfikacja opiera się głównie na serii systematycznych badań modelowych wykonanych w roku 2001 w Laboratorium Hydromechaniki Okrętu WOIO PG. Zademonstrowano prognozy oporu jachtu wykonane trzema metodami z oszacowaniem i dyskusją rozbieżności wyników. Przeprowadzone badania są zorientowane na opracowanie wiarygodnego programu komputerowego dla prognozowania prędkości i innych parametrów ruchu żaglowych, regatowych jachtów oceanicznych...
-
TEAM RESEARCH PROJECT I & II_2024/25
e-Learning CoursesThe aim of a team research project is to conduct a process in which Students will verify the research hypothesis set by the Client. For this purpose, the project may require the creation of a product, e.g. an application, a device and conducting appropriate research, analysis of results, etc. In the event that the University/Client shares confidential information (including data), the Students will be required to sign an undertaking...
-
System Weryfikacji Autentyczności Podpisu Odręcznego
PublicationW referacie przedstawiono system statycznej i dynamicznej weryfikacji autentyczności podpisu odręcznego, składanego piórem biometrycznym, wyposażonym w 2 akcelerometry, 2 żyroskopy i 3 czujniki ścisku, na rezystancyjnej powierzchni dotykowej, łączącym się bezprzewodowo z urządzeniami komputerowymi. We wstępie przedstawiono architekturę sieciową wielomodalnego systemu biometrii. Przedstawiono warstwę sprzętową systemu weryfikacji...
-
Heuristic scheduling algorithms for uniform load of computer system
PublicationW pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...
-
O projektowaniu ściany szczelinowej
PublicationW pracy przedstawiono proces weryfikacji i porównania obliczeń otrzymanych z programu bazującego na metodzie elementów skończonych z wynikami analitycznymi dla analizowanej ściany szczelinowej z przyporą ziemną. Dodatkowo autorzy dokonali krótkiego przeglądu literatury z zakresu ścian szczelinowych.
-
Szacowanie niepewności funkcji przetwarzania przetwornika LEM CT -5T metodą Monte Carlo
PublicationW referacie zaprezentowano metodologię szacowania niepewności funkcji przetwarzania przetwornika prądowego, na przykładzie przetwornika LEM CT-5T, przy zastosowaniu metody opartej na Przewodniku GUM z zastosowaniem prawa propagacji niepewności oraz metody numerycznej Monte Carlo. Przedstawiono szczegółową analizę doboru rozkładu wielkości wejściowej. W przypadku metody Monte Carlo dobór rozkładu wielkości wejściowych jest bardzo...
-
Szacowanie niepewności funkcji przetwarzania przetwornika LEM CT -5T metodą Monte Carlo
PublicationW referacie zaprezentowano metodologię szacowania niepewności funkcji przetwarzania przetwornika prądowego, na przykładzie przetwornika LEM CT-5T, przy zastosowaniu metody opartej na Przewodniku GUM, z zastosowaniem prawa propagacji niepewności oraz metody numerycznej Monte Carlo. Przedstawiono szczegółową analizę doboru rozkładu wielkości wejściowej. W przypadku metody Monte Carlo dobór rozkładu wielkości wejściowych jest bardzo...
-
Performance improvement of NN based RTLS by customization of NN structure - heuristic approach
PublicationThe purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...
-
Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas
PublicationThis paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...
-
Modelowanie podziału zadań przewozowych w obszarach zurbanizowanych
PublicationNiniejsza rozprawa doktorska dotyczy problematyki modelowania podziału zadań przewozowych w procesie modelowania podróży. Wykonane analizy wykazały zasadność zastosowania dodatkowych czynników w modelowaniu wyboru środka transportu z uwagi na ich istotny wpływ na jakość modelu dla wybranych motywacji podróży. W pracy zawarto przykładowe modele uwzględniające każdy z analizowanych czynników. Z wykorzystaniem badań heurystycznych...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
A handwritten signature verification method employing a tablet
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method's efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION
PublicationThe article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...
-
Badania eksperymentalne rezonansowego przetwornika piezoelektrycznego typu "unimorph"
PublicationW artykule opisano badania eksperymentalne piezoelektrycznego rezonansowego przetwornika zastosowanego do pomiaru właściwości mechanicznych tkanek miękkich. Po krótkim wstępie w kolejnych punktach przedstawiono opis stanowiska pomiarowego oraz metody pomiaru odkształceń prototypów, przesunięć częstotliwości rezonansowej, impedancji elektromechanicznej i parametrów schematów zastępczych. W dalszej...
-
Optimal Placement of Phasor Measurement Unit in Power System using Meta-Heuristic Algorithms
PublicationThe phasor measurement units (PMUs) play an important and vital role in power system monitoring and controlling, since they provide the power system phasors stamped with a common real time reference through a global positioning system (GPS). Indeed, from economical point of view it is not possible to set PMUs in all system buses due to the high cost and the requirement of more complex communication...
-
Microphone placement through meta-heuristic algorithms
Publication -
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Identity verification using complex representations of handwritten signature
PublicationThis paper is devoted to handwritten signature verification using the cross-correlation approach (adopted by the authors from telecommunications) and dynamic time warping. The following invariants of the handwritten signature: the net signature, the instantaneous complex frequency and the complex cepstrum are analyzed. The problem of setting the threshold for deciding whether the current signature is authentic or forged is discussed....
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublicationResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Verification and Benchmarking in MPA Coprocessor Design Process
PublicationThis paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....
-
Stress analysis of the bridge hangers in terms of the fatigue verification
PublicationThe paper presents the results of numerical stress analysis of the bridge rod hangers. Two types of hangers were taken into account, i.e. the bolted hanger and the welded hanger. A detailed FEM shell models of the connection area between the hanger and the bridge span have been developed. Local stress concentration effects have been investigated in terms of fatigue verification.
-
A New Heuristic Algorithm for Effective Preemption in MPLS Networks
PublicationW artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...
-
Face detection algorithms evaluation for the bank client verification
PublicationResults of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...
-
Results in Physics
Journals -
Handwritten signature verification system employing wireless biometric pen
PublicationThe handwritten signature verification system being a part of the developed multimodal biometric banking stand is presented. The hardware component of the solution is described with a focus on the signature acquisition and on verification procedures. The signature is acquired employing an accelerometer and a gyroscope built-in the biometric pen plus pressure sensors for the assessment of the proper pen grip and then the signature...
-
Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet
PublicationThe paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...
-
Modified dynamic time warping method applied to handwritten signature authenticity verification
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method’s efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Testbed for development and verification of hybrid localization systems
PublicationIn this paper a testbed for development and verification of hybrid localization systems is presented. It allows for systematic analysis of hybrid localization methods and speed up the development of new schemes. The proposed testbed platform is composed of subsystem for sequential data collection and testing infrastructure that can be used for investigating the localization mechanisms in controllable environment.
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Performance Analysis of Developed Multimodal Biometric Identity Verification System
PublicationThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic handwritten signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed...
-
Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties
Publication -
Pilot Testing of Developed Multimodal Biometric Identity Verification System
PublicationThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed at engineered...
-
Mersenne Number Finding and Collatz Hypothesis Verification in the Comcute Grid System
PublicationIn this chapter, some mathematic applications have been described to test scalability of the Comcute grid system. Especially, a verification of the Collatz hypothesis and finding Mersenne numbers were applied to prove the scalability and high performance of this grid system. Results were compared with outcomes obtained by the other grid systems.
-
Experimental verification of visual method for measuring displacements of contact line elements
PublicationThe increase of rail vehicles speed, as well as the increase of their power, puts high demands on the power delivery system for traction vehicles The most critical point in the vehicle's power supply circuit is the contact between the current collector and contact wires. Ensuring a reliable co-operation of the current collector and contact line, requires technical development...
-
Zastosowanie metody galwanostatycznej do wyznaczania błędu fazy elektrod woltamperometrycznych
PublicationW pracy przeanalizowano właściwości metrologiczne elektrod woltamperometrycznych w dziedzinie częstotliwości. Wykazano, że w przypadku, gdy reakcja elektrochemiczna kontrolowana jest procesem transportu jonów, elektroda woltamperometryczna zachowuje się tak jak przetwornik pomiarowy I rzędu. Jej właściwości metrologiczne opisane są przez czułość, częstotliwość graniczną, błąd amplitudy i błąd fazy. Przeprowadzona analiza pokazała,...
-
Ocena zasobów oraz weryfikacja granic obszaru ochronnego GZWP nr 133 Młotkowo za pomocą numerycznego modelu przepływu wód podziemnych
PublicationModel Głównego Zbiornika Wód Podziemnych powstał w celu dokonania oceny dostępnych zasobów wód oraz zweryfikowania granic strefy ochronnej. GZWP Młotkowo jest położony w południowej części Pojezierza Krajeńskiego. Ze względu na konieczność weryfikacji granic zbiornika wyznaczonych przez Kleczkowskiego i in. (1990) do badań modelowych przyjęto obszar cztery razy większy niż rozmiar GZWP. W celu osiągnięcia najbardziej wiarygodnych...
-
Verification of algorithms determining wave loads on support structure of wind turbine
PublicationThe offshore wind turbines require determination of wave loads on their support structure. This structure is fixed and, therefore, this problem is reduced to solving only the diffraction problem, which is determined by Laplace equation and conditions on the following boundaries: on the support structure, on the sea free surface and on its bottom, and at infinity on free surface. The linear problem was applied to determine the wave...
-
Integrity level verification for safety-related functions
PublicationThis article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...
-
Elgold intermediate: verified by verification team
Open Research DataThe dataset contains the texts from Elgold intermediate: annotated raw additionaly verified by the five-person verification team. arly 25% of the mentions were corrected in some aspect.
-
Results in Immunology
Journals -
Results in Chemistry
Journals -
Results in Mathematics
Journals -
Experimental Results
Journals -
Results in Materials
Journals -
Results in Optics
Journals -
Eigenfaces, Fisherfaces, Laplacianfaces, Marginfaces – How to Face the Face Verification Task
PublicationThis paper describes the exhaustive tests of four known methods of linear transformations (Eigenfaces, Fisherfaces, Laplacianfaces and Marginfaces) in the context of face verification task. Additionally, we introduce a new variant of the transformation (Laplacianface + LDA), and the specific interval-based decision rule. Both of them improve the performance of face verification, in general, however, our experiments show that the...
-
Verification of the new viscoelastic method of thermal stress calculation in asphalt layers of pavements
PublicationThe new viscoelastic method of thermal stress calculations in asphalt layers has been developed and published recently by the author. This paper presents verification of this method. The verification is based on the comparison of the results of calculations with results of testing of thermal stresses in Thermal Stress Restrained Specimen Test. The calculations of thermal stresses according to the new method were based on rheological...