Filters
total: 1641
filtered: 1371
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: thiols
-
Structures of diamond tool composites
PublicationPresented are structures and examples of applications of diamond tool composites. They are widely used as cutting tools, bonded abrasive tools and dressing tools.
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublicationMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
The Role of Molecular Structure in Monte Carlo Simulations of the Secondary Electron Yield and Backscattering Coefficient from Methacrylic Acid
PublicationIn this paper, we show the influence of the chemical structure of four different conformers on the secondary electron emission and backscattering of an electron beam from a gel of methacrylic acid. The conformers have different permanent dipole moments, which determines the cross sections for elastic collisions with electrons. The cross sections are used in Monte Carlo simulations of an electron beam, which enters the gel of methacrylic...
-
Convenient Synthesis of Functionalized Unsymmetrical Vinyl Disulfides and Their Inverse Electron-Demand Hetero-Diels-Alder Reaction
PublicationThe simple, convenient, and efficient methods for the preparation of unsymmetrical vinyl disulfides with additional functional groups under mild conditions with moderate to high yields were designed. The developed methods include the reaction of S-vinyl phosphorodithioate with thiotosylates or S-vinyl thiotosylate with thiols. The designed methods allow for the synthesis of unsymmetrical vinyl disulfides with additional functionalities...
-
Genetic programming extension to APF-based monocular human body pose estimation
PublicationNew method of the human body pose estimation based on a single camera 2D observation is presented, aimed at smart surveillance related video analysis and action recognition. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, new motion cost metric is employed, considering current...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublicationThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Detection, classification and localization of acoustic events in the presence of background noise for acoustic surveillance of hazardous situations
PublicationEvaluation of sound event detection, classification and localization of hazardous acoustic events in the presence of background noise of different types and changing intensities is presented. The methods for discerning between the events being in focus and the acoustic background are introduced. The classifier, based on a Support Vector Machine algorithm, is described. The set of features and samples used for the training of the...
-
Multiple sound sources localization in free field using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in free field using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
A method for counting people attending large public events
PublicationThe algorithm for people counting in crowded scenes, based on the idea of virtual gate which uses optical flow method is presented. The concept and practical application of the developed algorithm under real conditions is depicted. The aim of the work is to estimate the number of people passing through entrances of a large sport hall. The most challenging problem was the unpredicted behavior of people while entering the building....
-
Video analytics-based algorithm for monitoring egress from buildings
PublicationA concept and a practical implementation of the algorithm for detecting of potentially dangerous situations related to crowding in passages is presented. An example of such a situation is a crush which may be caused by an obstructed pedestrian pathway. The surveillance video camera signal analysis performed in the online mode is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of the...
-
Extraction of stable foreground image regions for unattended luggage detection
PublicationA novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...
-
Processing of acoustical data in a multimodal bank operating room surveillance system
PublicationAn automatic surveillance system capable of detecting, classifying and localizing acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of...
-
Detection and localization of selected acoustic events in acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The evens are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Real and imaginary motion classification based on rough set analysis of EEG signals for multimedia applications
PublicationRough set-based approach to the classification of EEG signals of real and imaginary motion is presented. The pre-processing and signal parametrization procedures are described, the rough set theory is briefly introduced, and several classification scenarios and parameters selection methods are proposed. Classification results are provided and discussed with their potential utilization for multimedia applications controlled by the...
-
A comparative study of English viseme recognition methods and algorithms
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector construction...
-
Variable length sliding models for banking clients face biometry
PublicationAn experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...
-
A comparative study of English viseme recognition methods and algorithm
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector...
-
Deep neural networks for human pose estimation from a very low resolution depth image
PublicationThe work presented in the paper is dedicated to determining and evaluating the most efficient neural network architecture applied as a multiple regression network localizing human body joints in 3D space based on a single low resolution depth image. The main challenge was to deal with a noisy and coarse representation of the human body, as observed by a depth sensor from a large distance, and to achieve high localization precision....
-
Complexity analysis of the Pawlak’s flowgraph extension for re-identification in multi-camera surveillance system
PublicationThe idea of Pawlak’s flowgraph turned out to be a useful and convenient container for a knowledge of objects’ behaviour and movements within the area observed with a multi-camera surveillance system. Utilization of the flowgraph for modelling behaviour admittedly requires certain extensions and enhancements, but it allows for combining many rules into a one data structure and for obtaining parameters describing how objects tend...
-
Simple gait parameterization and 3D animation for anonymous visual monitoring based on augmented reality
PublicationThe article presents a method for video anonymization and replacing real human silhouettes with virtual 3D figures rendered on a screen. Video stream is processed to detect and to track objects, whereas anonymization stage employs animating avatars accordingly to behavior of detected persons. Location, movement speed, direction, and person height are taken into account during animation and rendering phases. This approach requires...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory
PublicationSituation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublicationThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
Applying artificial neural networks for modelling ship speed and fuel consumption
PublicationThis paper deals with modelling ship speed and fuel consumption using artificial neural network (ANN) techniques. These tools allowed us to develop ANN models that can be used for predicting both the fuel consumption and the travel time to the destination for commanded outputs (the ship driveline shaft speed and the propeller pitch) selected by the ship operator. In these cases, due to variable environmental conditions, making...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublicationTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention
PublicationTogether with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...
-
Broadband/Dual-band Metal-Mountable UHF RFID Tag Antennas: A Systematic Review. Taxonomy Analysis, Standards of Seamless RFID System Operation, Supporting IoT implementations, Recommendations and Future Directions
PublicationThe employment of broadband/dual-band ultra-high frequency (UHF) radio frequency identification (RFID) tag antennas contributes to the growth of RFID technology, with many potential implications, such as the increase of international trade, and reducing costs thereof. This study presents all reported articles on RFID tags for metal objects that can work seamlessly across different countries. Moreover, it addresses all available...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublicationAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
Channel State Estimation in LTE-Based Heterogenous Networks Using Deep Learning
PublicationFollowing the continuous development of the information technology, the concept of dense urban networks has evolved as well. The powerful tools, like machine learning, break new ground in smart network and interface design. In this paper the concept of using deep learning for estimating the radio channel parameters of the LTE (Long Term Evolution) radio interface is presented. It was proved that the deep learning approach provides...
-
Deep learning in the fog
PublicationIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...
-
Badania korelacji retencji z właściwościami fizykochemicznymi wybranych grup organicznych związków siarki w podziałowej chromatografii gazowej
PublicationZastosowanie podziałowej chromatografii gazowej z niepolarną ciekłą fazą stacjonarną pozwala na elucję analitów zgodnie z ich temperaturą wrzenia. Na tej podstawie powstała metoda symulowanej destylacji, w której wykorzystuje się chromatografie gazową i wzorce temperatury wrzenia w postaci n-parafin do wyznaczania krzywych destylacji produktów naftowych. Zależności korelacyjne wynikające z możliwości przewidzenia oddziaływań, a...
-
Pedestrian safety management using the risk-based approach
PublicationThe paper presents a concept of a multi-level pedestrian safety management system. Three management levels are distinguished: strategic, tactical and operational. The basis for the proposed approach to pedestrian safety management is a risk-based method. In the approach the elements of behavioural and systemic theories were used, allowing for the development of a formalised and repeatable procedure integrating the phases of risk...
-
Automated anonymization of sensitive data on production unit
PublicationThe article presents an approach to data anonymization with the use of generally available tools. The focus is put on the practical aspects of using open-source tools in conjunction with programming libraries provided by suppliers of industrial control systems. This universal approach shows the possibilities of using various operating systems as a platform for process data anonymization. An additional advantage of the described...
-
The Analysis and Solutions to the Problems of IPv6 Configuration Migration of Small Networks
PublicationThe paper analyzes the problems of IPv4 to IPv6 migration processes and indicates the areas in which migration can be done without expensive replacement of hardware, software and organizational changes. This paper presents the migration tools developed for the SOHO network administrators. The tools provide theoretical knowledge and practical advices on migrating to IPv6 and enable automation of the migration process. The article...
-
Mechatronic design o strongly nonlinear systems on a basis of three wheeled mobile platform
PublicationRemarkable grow in demand both of mobile platform operability performance and reduction of project leading time development encourage to apply modern algorithms and reliable engineering tools for the design process. The paper discusses the mechatronic design applied for the surveillance system based on the energy performance index algorithm. The exploited mechatronic techniques i.e. virtual prototyping, Hardware-In-the-Loop Simulation...
-
Influence of Flat Lapping Kinematics on Machinability of Ceramics
PublicationNew tools for flat grinding of ceramics are presented in the paper. Electroplated CBN tools (B64 and B107) were used in a modified single-disc lapping machine configuration. The results from experiments, such as the material removal rate and surface roughness parameters are presented and analyzed. Numerical simulations, based on the model for the shape error and tool wear estimation in machining with flat lapping kinematics, are...
-
The Bridge of Data Project Objectives
PublicationOpen Research Data (ORD) is one of the emerging trends for researchers across the globe. However, it has to be stressed that the level of implementation and awareness of ORD varies between countries. Many initiatives have been created in Polish scientific institutions to support the process of opening publications. These are mainly Open Access (OA) repositories, implementing the so-called green road of OA. However, only a few universities...
-
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
PublicationThe new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...
-
The role of low-energy electrons in the charging process of LISA test masses
PublicationThe estimate of the total electron yield is fundamental for our understanding of the test-mass charging associated with cosmic rays in the Laser Interferometer Space Antenna (LISA) Pathfinder mission and in the forthcoming gravitational wave observatory LISA. To unveil the role of low energy electrons in this process owing to galactic and solar energetic particle events, in this work we study the interaction of keV and sub-keV...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Blockchain technologies to address smart city and society challenges
PublicationNew Information and Communications Technologies (ICT) are changing the way in which the world works. These technologies provide new tools to face the issues of contemporary society (poverty, migrations, sustainable development challenges, governance, etc.). Among them, blockchain emerge as a disruptive technology able to make things in a completely different and innovative way. They can provide solutions where before there were...
-
Integrating Digital Twin Technology Into Large Panel System Estates Retrofit Projects
PublicationAs sustainability is now a standard for the proposed developments, the focus ought to be shifted towards the existing buildings and, among them, the worldwide stock of large panel system (LPS) buildings. Major upgrades and retrofits were done to some of the LPS estates in Germany and France, but a leading sustainable way must still be developed for LPS buildings in Eastern European countries, where apartments in those half‐a‐century‐old...
-
THE INFLUENCE OF QUESTION SET ON STUDENT QUIZ RESULTS
PublicationThe advent of e-Learning tools allowing for automated online test grading will probably increase the frequency of using tests in technical education. The same tools may provide for measures of test question quality. By purposely crafting question sets, test grading may serve different goals. The paper contains examples and test study with score histograms.
-
Tmscl as a rate accelerating additive in acylations of amines with 5-(α-amino- α'-hydroxy)methylene meldrum's acids
PublicationAspects are presented of the acylation of amines, alcohols and thiols with 5-(α-amino- α'-hydroxy)methylene Meldrum's acids. We placed special emphasis on the acylation reaction of secondary amines with 5-(α-amino- α'-hydroxy)methylene Meldrum's acids, which, due to their basicity, caused problems concerning salt formation with a Meldrum acid derivative. We found that secondary amines, which react at the slowest rate and with a...
-
TMSCL as a rate accelerating additive in acylations of amines with 5-(α- amino-α'-hydroxy)methylene meldrum's acids
PublicationAspects are presented of the acylation of amines, alcohols and thiols with 5-(α-amino- α'-hydroxy)methylene Meldrum's acids. We placed special emphasis on the acylation reaction of secondary amines with 5-(α-amino- α'-hydroxy)methylene Meldrum's acids, which, due to their basicity, caused problems concerning salt formation with a Meldrum acid derivative. We found that secondary amines, which react at the slowest rate and with a...
-
Collaborative Editing of Ontologies Using Fluent Editor and Ontorion
PublicationIn this paper we present two tools that we are developing at Cognitum for managing large knowledge bases: Fluent Editor and the Ontorion Server. We have been able to build a collaborative knowledge management system using these two tools. We show how this system can be used for the concurrent modification of knowledge and how we can manage multiple modifications to the same knowledge.
-
Business Process Modelling and Enterprise Improvement Analysis
PublicationThe main trends in developing an approach and tools for business process modelling are discussed. Business Process Management (BPM) and BPM Notation (BPMN) are presented. Moreover, the possibilities of C2NIWA in a wide range of these tools running on a supercomputer are suggested. Firstly, the company development strategy can be planned . Secondly, quick and flexible changes of its processes can be modelled, analysed and implemented....