Search results for: dynamic positioning, thrust allocation, optimization algorithms
-
Seismic response and performance prediction of steel buckling-restrained braced frames using machine-learning methods
PublicationNowadays, Buckling-Restrained Brace Frames (BRBFs) have been used as lateral force-resisting systems for low-, to mid-rise buildings. Residual Interstory Drift (RID) of BRBFs plays a key role in deciding to retrofit buildings after seismic excitation; however, existing formulas have limitations and cannot effectively help civil engineers, e.g., FEMA P-58, which is a conservative estimation method. Therefore, there is a need to...
-
Intelligent microbearing project with memory of stress-strain history
PublicationTaking into account the increasing need of intelligent micro-bearing with memory, this paper presents the optimization, simulation and practical application of operating parameters(load carrying capacity, friction forces, friction coefficient, wear), simulation for hydrodynamic HDD micro-bearing with curvilinear nano-grooved journal profile. One of the reason of such journal profile is that this journal profile contributes to the...
-
Akustyczna analiza parametrów ruchu drogowego z wykorzystaniem informacji o hałasie oraz uczenia maszynowego
PublicationCelem rozprawy było opracowanie akustycznej metody analizy parametrów ruchu drogowego. Zasada działania akustycznej analizy ruchu drogowego zapewnia pasywną metodę monitorowania natężenia ruchu. W pracy przedstawiono wybrane metody uczenia maszynowego w kontekście analizy dźwięku (ang.Machine Hearing). Przedstawiono metodologię klasyfikacji zdarzeń w ruchu drogowym z wykorzystaniem uczenia maszynowego. Przybliżono podstawowe...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Multiplicative Long Short-Term Memory with Improved Mayfly Optimization for LULC Classification
PublicationLand Use and Land Cover (LULC) monitoring is crucial for global transformation, sustainable land control, urban planning, urban growth prediction, and the establishment of climate regulations for long-term development. Remote sensing images have become increasingly important in many environmental planning and land use surveys in recent times. LULC is evaluated in this research using the Sat 4, Sat 6, and Eurosat datasets. Various...
-
Developing Methods for Building Intelligent Systems of Information Resources Processing Using an Ontological Approach
PublicationThe problem of developing methods of information resource processing is investigated. A formal procedure description of processing text content is developed. A new ontological approach to the implementation of business processes is proposed. Consider that the aim of our work is to develop methods and tools for building intelligent systems of information resource processing, the core of knowledge bases of which are ontology’s, and...
-
Anomaly Detection in Railway Sensor Data Environments: State-of-the-Art Methods and Empirical Performance Evaluation
PublicationTo date, significant progress has been made in the field of railway anomaly detection using technologies such as real-time data analytics, the Internet of Things, and machine learning. As technology continues to evolve, the ability to detect and respond to anomalies in railway systems is once again in the spotlight. However, railway anomaly detection faces challenges related to the vast infrastructure, dynamic conditions, aging...
-
Computer controlled systems - 2022/2023
e-Learning Coursesmateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
CCS-lecture-2023-2024
e-Learning Coursesmateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...
-
Using LSTM networks to predict engine condition on large scale data processing framework
PublicationAs the Internet of Things technology is developing rapidly, companies have an ability to observe the health of engine components and constructed systems through collecting signals from sensors. According to output of IoT sensors, companies can build systems to predict the conditions of components. Practically the components are required to be maintained or replaced before the end of life in performing their assigned task. Predicting...