Search results for: Algorithm of DOA detection - Bridge of Knowledge

Search

Search results for: Algorithm of DOA detection

Search results for: Algorithm of DOA detection

  • Face detection in image sequences using a portable thermal camera

    Publication

    Face detection is often a first step in quantitative analysis of face images. It is an important research area for visible images and recently also for thermography. Due to technological developments thermal cameras may be embedded into wearable devices to provide remote healthcare. In this paper, we compared three algorithms for face detection in thermal images by testing execution time, accuracy, symmetry ratio and false-positives....

    Full text to download in external service

  • Label‐free optical detection of cyclosporine in biological fluids

    Publication

    - Journal of Biophotonics - Year 2019

    In this paper, a spectroscopic method for determination of cyclosporine concentrations in biological fluids is presented. Blood plasma and hemoglobin solutions are chosen for the experiment. For various cyclosporine concentrations in blood plasma and hemoglobin, absorbance measurements in spectra range from 600 to 1100 nm are performed. The measurement results are analyzed by the use of a dedicated algorithm. The obtained data...

    Full text to download in external service

  • Cascade Object Detection and Remote Sensing Object Detection Method Based on Trainable Activation Function

    Publication
    • S. N. Shivappriya
    • M. J. P. Priyadarsini
    • A. Stateczny
    • C. Puttamadappa
    • B. D. Parameshachari

    - Remote Sensing - Year 2021

    Object detection is an important process in surveillance system to locate objects and it is considered as major application in computer vision. The Convolution Neural Network (CNN) based models have been developed by many researchers for object detection to achieve higher performance. However, existing models have some limitations such as overfitting problem and lower efficiency in small object detection. Object detection in remote...

    Full text available to download

  • Ontology clustering by directions algorithm to expand ontology queries

    Publication

    - Year 2009

    This paper concerns formulating ontology queries. It describes existing languages in which ontologies can be queried. It focuses on languages which are intended to be easily understood by users who are willing to retrieve information from ontologies. Such a language can be, for example, a type of controlled natural language (CNL). In this paper a novel algorithm called Ontology Clustering by Directions is presented. The algorithm...

  • Lexicon Based Algorithm for Domain Ontology Merging and Alignment

    Publication

    More and more systems contain some kind of knowledge describing their field of operation. Such knowledge in many cases is stored as an ontology. A need arises for ability to quickly match those ontologies to enable interoperability of such systems. The paper presents a lexicon based algorithm for merging and aligning of OWL ontologies. The proposed similarity levels are being presented and the proposed algorithm is being described....

    Full text to download in external service

  • Applications of Raman spectroscopy for detection of selected substances in tissues

    Publication

    - Year 2019

    This dissertation explores the applications of Raman spectroscopy for biological tissue analysis. Basics of Raman and surface-enhanced Raman spectroscopy (SERS) are described, along with an analysis of the literature on biodetection and non-invasive blood analysis with emphasis on glucose detection. Instrumentation for Raman measurements is described. The sources of noise and interferences occurring in biological tissue measurements...

  • Multiscaled Hybrid Features Generation for AdaBoost Object Detection

    This work presents the multiscaled version of modified census features in graphical objects detection with AdaBoost cascade training algorithm. Several experiments with face detector training process demonstrate better performance of such features over ordinal census and Haar-like approaches. The possibilities to join multiscaled census and Haar features in single hybrid cascade of strong classifiers are also elaborated and tested....

    Full text available to download

  • DEVELOPMENT OF THE ALGORITHM OF POLISH LANGUAGE FILM REVIEWS PREPROCESSING

    The algorithm and the software for conducting the procedure of Preprocessing of the reviews of films in the Polish language were developed. This algorithm contains the following steps: Text Adaptation Procedure; Procedure of Tokenization; Procedure of Transforming Words into the Byte Format; Part-of-Speech Tagging; Stemming / Lemmatization Procedure; Presentation of Documents in the Vector Form (Vector Space Model) Procedure; Forming...

    Full text available to download

  • Clonal selection algorithm for vehicle routing

    Publication

    - Year 2008

    Over the years several successful computing techniques have been inspired by biological mechanisms. Studies of the mechanisms that allow the immune systems of vertebratesto adapt and learn have resulted in a class of algorithms called artificial immune systems. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents...

    Full text to download in external service

  • Distributed Evolutionary Algorithm for Path Planning in Navigation Situation

    This article presents the use of a multi-population distributed evolutionary algorithm for path planning in navigation situation. The algorithm used is with partially exchanged population and migration between independently evolving populations. In this paper a comparison between a multi-population and a classic single-population algorithm takes place. The impact on the ultimate solution has been researched. It was shown that using...

    Full text available to download

  • Detection of damages in a rivetted plate

    Publication

    The paper presents the results of damage detection in a riveted aluminium plate. The detection method has been based on Lamb wave propagation. The plate has been analysed numerically and experimentally. Numerical calculations have been carried out by the use of the time-domain spectral finite element method, while for the experimental analysis laser scanning Doppler vibrometry (LSDV) has been utilised. The panel has been excited...

  • Context Search Algorithm for Lexical Knowledge Acquisition

    Publication

    - CONTROL AND CYBERNETICS - Year 2012

    A Context Search algorithm used for lexical knowledge acquisition is presented. Knowledge representation based on psycholinguistic theories of cognitive processes allows for implementation of a computational model of semantic memory in the form of semantic network. A knowledge acquisition using supervised dialog templates have been performed in a word game designed to guess the concept a human user is thinking about. The game,...

  • Graphs hard-to-process for greedy algorithm MIN

    Publication

    We compare results of selected algorithms that approximate the independence number in terms of the quality of constructed solutions. Furthermore, we establish smallest hard- to-process graphs for the greedy algorithm MIN.

    Full text to download in external service

  • A study of nighttime vehicle detection algorithms

    Open Research Data
    version 1.0 open access

    This dataset is from my master's thesis "A study of nighttime vehicle detection algorithms". It contains both raw data and preprocessed dataset ready to use. In the pictures below you can see how images were annotated.

  • Detection of the Incoming Sound Direction Employing MEMS Microphones and the DSP

    Publication

    - Year 2017

    A 3D acoustic vector sensor based on MEMS microphones and its application to road traffic monitoring is presented in the paper. The sensor is constructed from three pairs of digital MEMS microphones, mounted on the orthogonal axes. Signals obtained from the microphones are used to compute sound intensity vectors in each direction. With this data, it is possible to compute the horizontal and vertical angle of an incoming sound....

    Full text to download in external service

  • Impact of Initial Population on Evolutionary Path Planning Algorithm

    Publication

    In this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal shippaths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....

  • Proximal primal–dual best approximation algorithm with memory

    Publication

    - COMPUTATIONAL OPTIMIZATION AND APPLICATIONS - Year 2018

    We propose a new modified primal–dual proximal best approximation method for solving convex not necessarily differentiable optimization problems. The novelty of the method relies on introducing memory by taking into account iterates computed in previous steps in the formulas defining current iterate. To this end we consider projections onto intersections of halfspaces generated on the basis of the current as well as the previous...

    Full text available to download

  • Impact of Initial Population on Evolutionary Path Planning Algorithm

    Publication

    In this paper an impact of initial population on evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Four tests are performed....

  • Novel 5.1 Downmix Algorithm with Improved Dialogue Intelligibility

    Publication

    A new algorithm for 5.1 to stereo downmix is introduced, which addresses the problem of dialogue intelligibility. The algorithm utilizes proposed signal processing algorithms to enhance the intelligibility of movie dialogues, especially in difficult listening conditions or in compromised speaker setup. To account for the latter, a playback configuration utilizing a portable device, i.e. an ultrabook, is examined. The experiments...

    Full text to download in external service

  • Point cloud unification with optimization algorithm

    Terrestrial laser scanning is a technology that enables to obtain three-dimensional data – an accurate representation of reality. During scanning not only desired objects are measured, but also a lot of additional elements. Therefore, unnecessary data is being removed, what has an impact on efficiency of point cloud processing. It can happen while single point clouds are displayed – user decides what he wants...

    Full text available to download

  • Robust algorithm for active feedback control of narrowband noise

    Publication

    The problem of active control of narrowband acoustic noise is considered. It is shown that the proposed earlier feedback control algorithm called SONIC (self-optimizing narrowband interference canceller), based on minimization of the L2-norm performance measure, can be re-derived using the L1 approach. The resulting robust SONIC algorithm is more robust to heavy-tailed measurement noise, such as the αlpha-stable noise, than the...

    Full text to download in external service

  • Detection and segmentation of moving vehicles and trains using Gaussian mixtures, shadow detection and morphological processing

    Publication

    Solution presented in this paper combines background modelling, shadow detection and morphological and temporal processing into one system responsible for detection and segmentation of moving objects recorded with a static camera. Vehicles and trains are detected based on their pixellevel difference from the continually updated background model utilizing a Gaussian mixture calculated separately for every pixel. The shadow detection...

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks

    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download

  • Arterial cannula shape optimization by means of the rotational firefly algorithm

    The article presents global optimization results of arterial cannula shapes by means of the newly modified firefly algorithm. The search for the optimal arterial cannula shape is necessary in order to minimize losses and prepare the flow that leaves the circulatory support system of a ventricle (i.e. blood pump) before it reaches the heart. A modification of the standard firefly algorithm, the so-called rotational firefly algorithm,...

    Full text to download in external service

  • Using River Formation Dynamics Algorithm in Mobile Robot Navigation

    River Formation Dynamics is a heuristic optimization algorithm based on the manner, in which drops of water form the river bed. The idea is to imitate the movement of drops on the edges between given nodes thus performing a search based on their height, which is modified through the mechanism of soil erosion and sediment deposition. In this way decreasing gradients are constructed, and these are followed by subsequent drops to...

    Full text to download in external service

  • Complex Root Finding Algorithm Based on Delaunay Triangulation

    A simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...

    Full text available to download

  • A Parallel Genetic Algorithm for Creating Virtual Portraits of Historical Figures

    In this paper we present a genetic algorithm (GA) for creating hypothetical virtual portraits of historical figures and other individuals whose facial appearance is unknown. Our algorithm uses existing portraits of random people from specific historical period and social background to evolve a set of face images potentially resembling the person whose image is to be found. We then use portraits of the person's relatives to judge...

    Full text available to download

  • Resolving conflicts in object tracking for automatic detection of events in video

    Publication

    W referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...

  • Computational algorithm for the analysis of mechatronic systems with distributed parameter elements

    Publication

    The paper presents a systematic computational package for analysis of complex systems composed of multiple lumped and distributed parameter subsystems. The algorithm is based on the transfer function method (DTFM). With this algorithm, a bond graph technique for the modelling is developed to simplify computations. Analysis of different systems requires only changing the inputs data in the form of the bond graph diagram

  • Visual Features for Endoscopic Bleeding Detection

    Aims: To define a set of high-level visual features of endoscopic bleeding and evaluate their capabilities for potential use in automatic bleeding detection. Study Design: Experimental study. Place and Duration of Study: Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, between March 2014 and May 2014. Methodology: The features have...

    Full text available to download

  • Video analytics-based algorithm for monitoring egress from buildings

    A concept and a practical implementation of the algorithm for detecting of potentially dangerous situations related to crowding in passages is presented. An example of such a situation is a crush which may be caused by an obstructed pedestrian pathway. The surveillance video camera signal analysis performed in the online mode is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of the...

    Full text available to download

  • Camera sabotage detection for surveillance systems

    Publication

    Camera dysfunction detection algorithms and their utilization in realtime video surveillance systems are described. The purpose of using the proposed analysis is explained. Regarding image tampering three algorithms for focus loss, scene obstruction and camera displacement detection are implemented and presented. Features of each module are described and certain scenarios for best performance are depicted. Implemented solutions...

    Full text to download in external service

  • Video Analytics-Based Algorithm for Monitoring Egress from Buildings

    Publication

    A concept and practical implementation of the algorithm for detecting of potentially dangerous situations of crowding in passages is presented. An example of such situation is a crush which may be caused by obstructed pedestrian pathway. Surveillance video camera signal analysis performed on line is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of implemented algorithm which uses...

    Full text to download in external service

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Autoencoder application for anomaly detection in power consumption of lighting systems

    Publication

    - IEEE Access - Year 2023

    Detecting energy consumption anomalies is a popular topic of industrial research, but there is a noticeable lack of research reported in the literature on energy consumption anomalies for road lighting systems. However, there is a need for such research because the lighting system, a key element of the Smart City concept, creates new monitoring opportunities and challenges. This paper examines algorithms based on the deep learning...

    Full text available to download

  • Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes

    Publication

    The paper presents a camera-independent framework for detecting violations of two typical people movement rules that are in force in many public transit terminals: moving in the wrong direction or across designated lanes. Low-level image processing is based on object detection with Gaussian Mixture Models and employs Kalman filters with conflict resolving extensions for the object tracking. In order to allow an effective event...

    Full text to download in external service

  • Neural Network-Based Sequential Global Sensitivity Analysis Algorithm

    Publication

    - Year 2022

    Performing global sensitivity analysis (GSA) can be challenging due to the combined effect of the high computational cost, but it is also essential for engineering decision making. To reduce this cost, surrogate modeling such as neural networks (NNs) are used to replace the expensive simulation model in the GSA process, which introduces the additional challenge of finding the minimum number of training data samples required to...

    Full text to download in external service

  • Automatic audio-visual threat detection

    Publication

    - Year 2010

    The concept, practical realization and application of a system for detection and classification of hazardous situations based on multimodal sound and vision analysis are presented. The device consists of new kind multichannel miniature sound intensity sensors, digital Pan Tilt Zoom and fixed cameras and a bundle of signal processing algorithms. The simultaneous analysis of multimodal signals can significantly improve the accuracy...

  • Efficient Complex Root Tracing Algorithm for Propagation and Radiation Problems

    An efficient complex root tracing algorithm for propagation and radiation problems is presented. The proposed approach is based on a discretization of Cauchy’s Argument Principle and its generalization to the C × R space. Moreover, an engagement of the tracing process with a global root finding algorithm recently presented in the literature is performed. In order to confirm a validity and efficiency of the proposed technique, a...

    Full text available to download

  • Generating optimal paths in dynamic environments using RiverFormation Dynamics algorithm

    The paper presents a comparison of four optimisation algorithms implemented for the purpose of finding the shortest path in static and dynamic environments with obstacles. Two classical graph algorithms –the Dijkstra complete algorithm and A* heuristic algorithm – were compared with metaheuristic River Formation Dynamics swarm algorithm and its newly introduced modified version. Moreover, another swarm algorithm has been compared...

    Full text to download in external service

  • Marking the Allophones Boundaries Based on the DTW Algorithm

    Publication

    - Year 2018

    The paper presents an approach to marking the boundaries of allophones in the speech signal based on the Dynamic Time Warping (DTW) algorithm. Setting and marking of allophones boundaries in continuous speech is a difficult issue due to the mutual influence of adjacent phonemes on each other. It is this neighborhood on the one hand that creates variants of phonemes that is allophones, and on the other hand it affects that the border...

  • Dynamic unattended measurement based routing algorithm for diffServ architecture

    Publication

    - Year 2010

    Dynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....

    Full text to download in external service

  • Robust unsupervised georeferencing algorithm for aerial and satellite imagery

    Publication

    In order to eliminate a human factor and fully automate the process of embedding the spatial localization information in a remote sensed image the integrated georeferencing method was proposed. The paper presents this unsupervised and robust approach which is comprised of pattern recognition, using SIFT-based detector, and RANSAC based outlier removal with matching algorithm.

  • Bees Detection on Images: Study of Different Color Models for Neural Networks

    Publication

    This paper presents an approach to bee detection in video streams using a neural network classifier. We describe the motivation for our research and the methodology of data acquisition. The main contribution to this work is a comparison of different color models used as an input format for a feedforward convolutional architecture applied to bee detection. The detection process has is based on a neural binary classifier that classifies...

    Full text available to download

  • Multicriteria Evolutionary Weather Routing Algorithm in Practice

    The Multicriteria Evolutionary Weather Routing Algorithm (MEWRA) has already been introduced by the author on earlier TransNav 2009 and 2011 conferences with a focus on theoretical application to a hybrid-propulsion or motor-driven ship. This paper addresses the topic of possible practical weather routing applications of MEWRA. In the paper some practical advantages of utilizing Pareto front as a result of multicriteria optimization...

    Full text available to download

  • Direct detection of quantum entanglement

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2002

    Basing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.

  • Computer experiments with a parallel clonal selection algorithm for the graph coloring problem

    Publication

    - Year 2008

    Artificial immune systems (AIS) are algorithms that are based on the structure and mechanisms of the vertebrate immune system. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents a parallel island model algorithm based on the clonal selection principles for solving the Graph Coloring Problem. The performance of...

    Full text to download in external service

  • A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

    Publication

    - SENSORS - Year 2019

    This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...

    Full text available to download

  • Comparison of edge detection algorithms for electric wire recognition

    Publication

    Edge detection is the preliminary step in image processing for object detection and recognition procedure. It allows to remove useless information and reduce amount of data before further analysis. The paper contains the comparison of edge detection algorithms optimized for detection of horizontal edges. For comparison purposes the algorithms were implemented in the developed application dedicated to detection of electric line...

    Full text to download in external service

  • A telemedical and an outpatient thoracic impedance measurements - a validation algorithm of the electrodes placement

    Publication

    - Year 2015

    This paper presents the algorithm for validation of electrodes locations for the thoracic impedance measurements. In particular the presented algorithm was designed to perform the telemetric sleep apnea monitoring. One of the problems, during the clinical tests of a developed device, was to preserve the repeatability of measurements. It strongly depended on the appropriate electrodes placement on the examined person’s thorax. It...

    Full text to download in external service