Filters
total: 1836
filtered: 1249
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: UNDERWATER COMMUNICATIONS
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
Systematic Literature Review for Emotion Recognition from EEG Signals
PublicationResearchers have recently become increasingly interested in recognizing emotions from electroencephalogram (EEG) signals and many studies utilizing different approaches have been conducted in this field. For the purposes of this work, we performed a systematic literature review including over 40 articles in order to identify the best set of methods for the emotion recognition problem. Our work collects information about the most...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
Electron ionization induced fragmentation of fluorinated derivatives of bisphenols
Publication -
Quantification of key red blood cell folates from subjects with defined MTHFR 677C>T genotypes using stable isotope dilution liquid chromatography/mass spectrometry
Publication -
Human Gb3/CD77 synthase reveals specificity toward two or four different acceptors depending on amino acid at position 211, creating Pk, P1 and NOR blood group antigens
Publication -
Chinifur, a Selective Inhibitor and "Subversive Substrate" for Trypanosoma congolense Trypanothione Reductase
Publication -
Genistein inhibits activities of methylenetetrahydrofolate reductase and lactate dehydrogenase, enzymes which use NADH as a substrate
Publication -
Graphene-encapsulated iron nanoparticles as a non-viral vector for gene delivery into melanoma cells
Publication -
Distance between the Basic Group of the Amino Acid Residue's Side Chain in Position P1of Trypsin Inhibitor CMTI-III and Asp189in the Substrate Pocket of Trypsin Has an Essential Influence on the Inhibitory Activity
Publication -
A simple method for selection of trypsin chromogenic substrates using combinatorial chemistry approach
Publication -
Design, Chemical Synthesis and Kinetic Studies of Trypsin Chromogenic Substrates Based on the Proteinase Binding Loop of Cucurbita maxima Trypsin Inhibitor (CMTI-III)
Publication -
Chromogenic Substrates of Bovine β-Trypsin: The Influence of an Amino Acid Residue in P1 Position on Their Interaction with the Enzyme
Publication -
Identification of X-DING-CD4, a new member of human DING protein family that is secreted by HIV-1 resistant CD4+ T cells and has anti-viral activity
Publication -
Rapid PD-L1 detection in tumors with PET using a highly specific peptide
Publication -
Pivotal participation of nitrogen dioxide in l-arginine induced acute necrotizing pancreatitis: protective role of superoxide scavenger 4-OH-TEMPO
Publication -
Ionization of tocopherols and tocotrienols in atmospheric pressure chemical ionization
Publication -
Mining relations between wikipedia categories
PublicationOpisano metody indukcji powiązań pomiędzy kategoriami organizującymi zbiór dokumentów. Przedstawiono wyniki zastosowania proponowanego podejścia dla poprawy systemu kategorii Wikipedii.
-
The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro
Publication -
Corrigendum to “The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro” [Biochem. Biophys. Res. Commun. 646 (26 February 2023) 44–49]
Publication -
Correction: Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublicationCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
Regional observatory as a part of road safety information system
PublicationEU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublicationThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Multi-Option Model of Railway Traffic Organization Including the Energy Recuperation
PublicationThe article presents the issue of organization of railway traffic within the station, taking into account energy recuperation. We identified a number of factors which affect the energy efficiency of recuperation, including the issue of transfer of energy technology between a few vehicles. We presented some aspects of the decision problem of graphic train timetable construction with regard to recuperation. As an indicator of quality...
-
Contextualizing a Knowledge Base by Approximation – A Case Study
PublicationModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Reasoning with Projection in Multimodular Description Logics Knowledge Bases
PublicationWe present an approach to reasoning with projection, i.e. reasoning in which it is possible to focus on a selected part of knowledge (by neglecting some non-interesting fragments). Projection is most useful for modular knowledge bases in which only parts of knowledge have to be exchanged or imported to other modules. In this paper we present an optimized method of reasoning over results of projection. The tests indicate that the...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
A Framework for Enhancing Supplier Selection Process by Using SOEKS and Decisional DNA
PublicationAbstract. Supplier selection process is one of the significant stages in supply chain management for industrial manufactured products. It plays an integral role in the success of any manufacturing organization and is an important part starting right from selecting raw material to dispatch of finished products. This paper contributes to enhance the supplier selection process by proposing a multi-criteria decision making framework...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Design and Evaluation of the Platform for Weight-Shifting Exercises with Compensatory Forces Monitoring
PublicationDetails of a platform for the rehabilitation of people with severe balance impairment are discussed in the paper. Based upon a commercially available static parapodium, modified to fit force sensors, this device is designed to give a new, safe tool to physiotherapists. It is designed for the patients who cannot maintain equilibrium during a bipedal stance and need to hold to or lean on something during the rehabilitation. Visual,...
-
Automated Classifier Development Process for Recognizing Book Pages from Video Frames
PublicationOne of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...
-
How ethics combine with big data: a bibliometric analysis
PublicationThe term Big Data is becoming increasingly widespread throughout the world, and its use is no longer limited to the IT industry, quantitative scientific research, and entrepreneurship, but entered as well everyday media and conversations. The prevalence of Big Data is simply a result of its usefulness in searching, downloading, collecting and processing massive datasets. It is therefore not surprising that the number of scientific...