Search results for: DETECTION ALGORITHM
-
Implementation of matrix-type FDTD algorithm on a graphics accelerator
PublicationArtykuł prezetuje implementację algorytmu FDTD w postaci macierzowej przeznaczonej dla kart graficznych. Wykazany został wzrost efektywności obliczeń numerycznych w odniesieniu do implementacji przeznaczonej dla procesora komputerowego.
-
A New Heuristic Algorithm for Effective Preemption in MPLS Networks
PublicationW artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...
-
An approximation algorithm for maximum P3-packing in subcubic graphs
PublicationW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
An efficient algorithm for mobile guarded guards in simple grids
PublicationW pracy rozważono problem strzeżenia ortogonalnych krat dwuwymiarowych przez mobilne straże strzeżone. Podano algorytmy wielomianowe m.in. dla przypadku krat prostych i dla przypadku krat bez przeszkód w kierunku poziomym (pionowym).
-
Complex Root Finding Algorithm Based on Delaunay Triangulation
PublicationA simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...
-
COMPARISON OF SOFTWARE AND HARDWARE REALIZATION OF AES CRYPTOGRAPHIC ALGORITHM
PublicationIn this paper hardware and software realization of direct and inverse AES cryptographic algorithm is presented. Both implementations were made using the Virtex-II FPGA and were practically tested. As the criteria of comparison, the resource utilization, achieved performance and power dissipation were chosen. Hardware realization increases throughput of conversion about 190 times over software implementation and decreases the energy...
-
Robust algorithm for active feedback control of narrowband noise
PublicationThe problem of active control of narrowband acoustic noise is considered. It is shown that the proposed earlier feedback control algorithm called SONIC (self-optimizing narrowband interference canceller), based on minimization of the L2-norm performance measure, can be re-derived using the L1 approach. The resulting robust SONIC algorithm is more robust to heavy-tailed measurement noise, such as the αlpha-stable noise, than the...
-
A Backtracking Search Algorithm for Distribution Network Reconfiguration Problem
Publication -
A comparative study of English viseme recognition methods and algorithm
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector...
-
Evolutionary Algorithm for Selecting Dynamic Signatures Partitioning Approach
PublicationIn the verification of identity, the aim is to increase effectiveness and reduce involvement of verified users. A good compromise between these issues is ensured by dynamic signature verification. The dynamic signature is represented by signals describing the position of the stylus in time. They can be used to determine the velocity or acceleration signal. Values of these signals can be analyzed, interpreted, selected, and compared....
-
An Agent-Based Simulated Annealing Algorithm for Data Reduction
Publication -
Data Reduction Algorithm for Machine Learning and Data Mining
Publication -
Novel 5.1 Downmix Algorithm with Improved Dialogue Intelligibility
PublicationA new algorithm for 5.1 to stereo downmix is introduced, which addresses the problem of dialogue intelligibility. The algorithm utilizes proposed signal processing algorithms to enhance the intelligibility of movie dialogues, especially in difficult listening conditions or in compromised speaker setup. To account for the latter, a playback configuration utilizing a portable device, i.e. an ultrabook, is examined. The experiments...
-
The algorithm of building the hierarchical contextual framework of textual corpora
PublicationThis paper presents an approach for Modeling the Latent Semantic Relations. The approach is based on advantages of two computational approaches: Latent Semantic Analysis and Latent Dirichlet Allocation. The scientific question about the possibility of reducing the influence of these Methods limitation on the Quality of the Latent Semantic Relations Analysis Results is raised. The case study for building the Two-level Hierarchical Contextual...
-
DEVELOPMENT OF THE ALGORITHM OF POLISH LANGUAGE FILM REVIEWS PREPROCESSING
PublicationThe algorithm and the software for conducting the procedure of Preprocessing of the reviews of films in the Polish language were developed. This algorithm contains the following steps: Text Adaptation Procedure; Procedure of Tokenization; Procedure of Transforming Words into the Byte Format; Part-of-Speech Tagging; Stemming / Lemmatization Procedure; Presentation of Documents in the Vector Form (Vector Space Model) Procedure; Forming...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
An efficient algorithm for the longest tandem scattered subsequence problem.
PublicationReferat dotyczy zagadnienia wyznaczania najdłuższego podciągu podwójnego (typu x1,x2,...,xk,x1,x2,...,xk) dla zadanego ciągu znaków (y1,y2,...,yn). Podano algorytm o złożoności obliczeniowej O(n^2) i pamięciowej O(n) znajdujący optymalne rozwiązanie postawionego problemu.
-
The cartographer algorithm for processing and querying description logics ontologies
PublicationLogika opisowa jest jednym z najbardziej popularnych formalizmów opisu wiedzy. Jej popularność jeszcze wzrosła kiedy pojawił się standard języka OWL. W artykule zaprezentowano nowy algorytm wnioskowania - algorytm kartograficzny - umożliwiający wnioskowanie niejawnie podanej wiedzy z terminologii (TBox) i opisu świata (ABox). Opisano sposób przetwarzania ontologii w terminach sygnatur binarnych i efektywny sposób odpytywania ontologii...
-
Proximal primal–dual best approximation algorithm with memory
PublicationWe propose a new modified primal–dual proximal best approximation method for solving convex not necessarily differentiable optimization problems. The novelty of the method relies on introducing memory by taking into account iterates computed in previous steps in the formulas defining current iterate. To this end we consider projections onto intersections of halfspaces generated on the basis of the current as well as the previous...
-
Rozpoznawanie oraz lokalizacja w obrazie przewodów linii wysokiego napięcia
PublicationW pracy przedstawiono opracowany algorytm rozpoznawania oraz lokalizacji przewodów linii wysokiego napięcia na podstawie obrazu horyzontalnego. Procedura detekcji przewodu została podzielona na trzy etapy. Pierwszy etap zawiera algorytm wykrywania krawędzi wykazujący największą czułość na krawędzie poziome, a jednocześnie brak czułości na krawędzie pionowe. Efektem jest znaczna redukcja liczby wykrytych krawędzi w porównaniu do...
-
Visual Traffic Noise Monitoring in Urban Areas
PublicationThe paper presents an advanced system for railway and road traffic noise monitoring in metropolitan areas. This system is a functional part of a more complex solution designed for environmental monitoring in cities utilizing analyses of sound, vision and air pollution, based on a ubiquitous computing approach. The system consists of many autonomous, universal measuring units and a multimedia server, which gathers, processes and...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublicationUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Video Analytics-Based Algorithm for Monitoring Egress from Buildings
PublicationA concept and practical implementation of the algorithm for detecting of potentially dangerous situations of crowding in passages is presented. An example of such situation is a crush which may be caused by obstructed pedestrian pathway. Surveillance video camera signal analysis performed on line is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of implemented algorithm which uses...
-
OPTIMISING RIG DESIGN FOR SAILING YACHTS WITH EVOLUTIONARY MULTIOBJECTIVE ALGORITHM
PublicationThe paper presents a framework for optimising a sailing yacht rig using Multi-objective Evolutionary Algorithms and for filtering obtained solutions by means of a Multi-criteria Decision Making method. A Bermuda sloop with discontinuous rig is taken under consideration as a model rig configuration. It has been decomposed into its elements and described by a set of control parameters to form a responsive model which can be used...
-
Implementation of localization and identification of ferromagnetic objects algorithm in labview enviroment
PublicationThe problem with detecting dangerous objects is still a matter of concern today. One of the methods of detecting dangerous objects is the magnetic method. While measuring a magnetic field in the surrounding of objects with ferromagnetic properties, it is possible to detect, localize and identify such object.
-
Underfrequency Load Shedding: An Innovative Algorithm Based on Fuzzy Logic
PublicationIn contemporary power systems, the load shedding schemes are typically based on disconnecting a pre-specified amount of load after the frequency drops below a predetermined value. The actual conditions at the time of disturbance may largely dier from the assumptions, which can lead to non-optimal or ineective operation of the load shedding scheme. For many years, increasing the eectiveness of the underfrequency load shedding (UFLS)...
-
FPGA and ASIC implementation of the algorithm for traffic monitoring in urban areas
PublicationW artykule przedstawiono algorytm detekcji obrazu oraz jego realizację sprzętową w technikach FPGA i ASIC. Algorytm ten dedykowany jest do detekcji ruchu pojazdów i jest realizowany w czasie rzeczywistym. Użyto pojedynczą, umieszczoną na stałe kamerę monochromatyczną o niskiej rozdzielczości. Wykonywane są również operacje eliminacji cieni i rozjaśnień obrazu. Nachodzenie obiektów na siebie nie jest brane pod uwagę. Realizacja...
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publicationgenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublicationDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Computational algorithm for the analysis of mechatronic systems with distributed parameter elements
PublicationThe paper presents a systematic computational package for analysis of complex systems composed of multiple lumped and distributed parameter subsystems. The algorithm is based on the transfer function method (DTFM). With this algorithm, a bond graph technique for the modelling is developed to simplify computations. Analysis of different systems requires only changing the inputs data in the form of the bond graph diagram
-
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems
PublicationParadygmat obliczeń rozproszonych ostatnio zyskuje coraz większą uwagę, ponieważ zarówno instytucje przemysłowe, jak i uczelnie wymagają coraz większej mocy obliczeniowej do przetwarzania i analizy danych. Z uwagi na dużą podatność systemów obliczeń na awarie różnych typów (podobnie do systemów sieciowych), gwarancje przeżywalności niniejszych systemów są nieodzowne w celu zapewnienia nieprzerwanego działania usług. Z tego powodu,...
-
A Parallel Genetic Algorithm for Creating Virtual Portraits of Historical Figures
PublicationIn this paper we present a genetic algorithm (GA) for creating hypothetical virtual portraits of historical figures and other individuals whose facial appearance is unknown. Our algorithm uses existing portraits of random people from specific historical period and social background to evolve a set of face images potentially resembling the person whose image is to be found. We then use portraits of the person's relatives to judge...
-
Using River Formation Dynamics Algorithm in Mobile Robot Navigation
PublicationRiver Formation Dynamics is a heuristic optimization algorithm based on the manner, in which drops of water form the river bed. The idea is to imitate the movement of drops on the edges between given nodes thus performing a search based on their height, which is modified through the mechanism of soil erosion and sediment deposition. In this way decreasing gradients are constructed, and these are followed by subsequent drops to...
-
A COMPUTATIONAL ALGORITHM FOR THE NUMERICAL SOLUTION OF NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Publication -
Head movement compensation algorithm in multi-display communication by gaze
PublicationAn influence of head movements on the gaze estimation accuracy when using a head mounted eye tracking system is discussed in the paper. This issue has been examined for a multi-display environment. It was found that head movement (rotation) to some extent does not influence on the gaze estimation accuracy seriously. Acceptable results were obtained when using eye-tracker to communicate with a computer via in two displays simultaneously.
-
An algorithm for listing all minimal double dominating sets of a tree
PublicationWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Video analytics-based algorithm for monitoring egress from buildings
PublicationA concept and a practical implementation of the algorithm for detecting of potentially dangerous situations related to crowding in passages is presented. An example of such a situation is a crush which may be caused by an obstructed pedestrian pathway. The surveillance video camera signal analysis performed in the online mode is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of the...
-
Evolutionary algorithm and decisional DNA for multiple travelling salesman problem
PublicationIn the real world, it is common to face optimization problems that have two or more objectives that must be optimized at the same time, that are typically explained in different units, and are in conflict with one another. This paper presents a hybrid structure that combines set of experience knowledge structures (SOEKS) and evolutionary algorithms, NSGA-II (Non-dominated Sorting Genetic Algorithm II), to solve multiple optimization...
-
Central heating temperature control algorithm for systems with condensing boilers
PublicationThe problem of control of a central heating system in a small residence is considered. It is assumed that the system is based on a condensing boiler. Since the boiler efficiency depends on a returning water temperature, the proposed control goal is to provide proper air temperature in the residence as well as the lowest possible water temperature. The proposed algorithm is applied to two buildings. Both of them have the same heating...
-
Efficient Complex Root Tracing Algorithm for Propagation and Radiation Problems
PublicationAn efficient complex root tracing algorithm for propagation and radiation problems is presented. The proposed approach is based on a discretization of Cauchy’s Argument Principle and its generalization to the C × R space. Moreover, an engagement of the tracing process with a global root finding algorithm recently presented in the literature is performed. In order to confirm a validity and efficiency of the proposed technique, a...
-
Genetic operators of evolutionary algorithm in problem of collision avoidance at sea
Publication...
-
A polynomial algorithm for some preemptive multiprocessor task scheduling problems.
Publication.
-
Statistically efficient smoothing algorithm for time-varying frequency estimation
PublicationThe problem of extraction/elimination of a nonstationary sinusoidal signal from noisy measurements is considered. This problem is usually solved using adaptive notch filtering (ANF) algorithms. It is shown that the accuracy of frequency estimates can be significantly increased if the results obtained from ANF are backward-time filtered by an appropriately designed lowpass filter. The resulting adaptive notch smoothing (ANS) algorithm...
-
Interference aware Bluetooth scatternet (Re)configuration algorithm IBLUEREA
PublicationThe paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth (BT) scatternet to reduce mutual interferences between BT and Wi-Fi (IEEE 802.11b) networks operating on the same area. IBLUEREA makes use of proposed procedure for modelling ISM environment around a given BT scatternet. The mechanism is based on estimation of the probabilities of successful (unsuccessful) frame transmissions. This determination...
-
A technique of stabilizing FDTD-subgridding algorithm using reciprocity principle
PublicationW artykule przedstawiono wykorzystanie zasady wzajemności w procesie stabilizacji zagęszczania siatki dla fdtd. Metoda ta oryginalnie służyła tylko do sprawdzenia stabilności algorytmów zagęszczających siatki fdtd, jednak pozwala ona na zmianę współczynnika sprzężenia pomiędzy polami występującymi na brzegach w ten sposób, że algorytm siatkowania jest stabilny. Zaprezentowana metoda została zweryfikowana testami numerycznymi pod...
-
Interference aware bluetooth scatternet (re)configuration algorithm IBLUERA
PublicationThis paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth scatternet to reduce interference. IBLUEREA makes use of the complex model comparing ISM environment efficiency. The mechanism envisages the use of the assessment of the probability of successful (unsuccessful) frame transmission in order to take a decision concerning co-existence of technologies which make use of the same ISM band (here Bluetooth...
-
Arterial cannula shape optimization by means of the rotational firefly algorithm
PublicationThe article presents global optimization results of arterial cannula shapes by means of the newly modified firefly algorithm. The search for the optimal arterial cannula shape is necessary in order to minimize losses and prepare the flow that leaves the circulatory support system of a ventricle (i.e. blood pump) before it reaches the heart. A modification of the standard firefly algorithm, the so-called rotational firefly algorithm,...
-
Hybrid Algorithm to Protect Java’s Code from Reverse Engineering
Publication -
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublicationWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...