Department of Intelligent Interactive Systems - Administrative Units - Bridge of Knowledge

Search

Department of Intelligent Interactive Systems

Filters

total: 170

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

Year 2016
Year 2017
  • Virtual designs and reconstructions of amber works: Amber craftsman simulator
    Publication

    This paper presents the concept of visualization of amber works in a virtual reality cave. It describes problems encountered during the acquisition, modeling and rendering of geometrical objects distinguished by heterogeneous transparency.

    Full text to download in external service

  • Stereo vision with Equal Baseline Multiple Camera Set (EBMCS) for obtaining depth maps of plants

    This paper presents a method of improving the estimation of distances between an autonomous harvesting robot and plants with ripe fruits by using the vision system based on five cameras. The system is called Equal Baseline Multiple Camera Set (EBMCS). EBMCS has some features of a camera matrix and a camera array. EBMCS is regarded as a set of stereo cameras for estimating distances by obtaining disparity maps and depth maps. This...

    Full text to download in external service

  • Stereo Camera Upgraded to Equal Baseline Multiple Camera Set (EBMCS)
    Publication

    - Year 2017

    The paper presents the results of using a set of five cameras called Equal Baseline Multiple Camera Set (EBMCS) for making 3D images, disparity maps and depth maps. Cameras in the set are located in the vicinity of each other and therefore the set can be used for the purpose of stereoscopy similarly as a stereo camera.EBMCS provides disparity maps and depth maps which have a better quality than these maps obtained with the use...

    Full text available to download

  • Podstawy projektowania interfejsów użytkownika
    Publication

    - Year 2017

    Dobry interfejs użytkownika to podstawa sukcesu każdej aplikacji! Poznaj różne sposoby komunikowania się użytkownika z komputerem. Dowiedz się, co w kwestii interfejsu użytkownika oferują współczesne urządzenia i programy Naucz się projektować efektowne i proste w obsłudze interfejsy użytkownika. Interfejs użytkownika to wizytówka każdej aplikacji komputerowej i strony WWW, a także brama zapewniająca dostęp do ich funkcji. Nawet...

    Full text to download in external service

  • Playback detection using machine learning with spectrogram features approach
    Publication

    - Year 2017

    This paper presents 2D image processing approach to playback detection in automatic speaker verification (ASV) systems using spectrograms as speech signal representation. Three feature extraction and classification methods: histograms of oriented gradients (HOG) with support vector machines (SVM), HAAR wavelets with AdaBoost classifier and deep convolutional neural networks (CNN) were compared on different data partitions in respect...

    Full text available to download

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
    Publication

    - Year 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Full text to download in external service

  • Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition

    The article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...

    Full text to download in external service

  • Behaviometrics of Digital Games for Children with Autism Spectrum Disorder

    Te paper reports current stage of the project Automated Terapy Monitoring for Children with Developmental Disorders of Autism Spectrum (AUTMON), that aims at development of methods and tools to allow for the automatic evaluation of the therapy progress among children with autism. Finding objective measures suitable for evaluating therapy progress would let create a system supporting those who diagnose autism and the therapists...

    Full text available to download

  • Automatic recognition of therapy progress among children with autism
    Publication

    - Scientific Reports - Year 2017

    The article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...

    Full text available to download

  • A new library for construction of automata
    Publication

    - Year 2017

    We present a new library of functions that construct minimal, acyclic, deterministic, finite-state automata in the same format as the author's fsa package, and also accepted by the author's fadd library of functions that use finite-state automata as dictionaries in natural language processing.

Year 2018
Year 2019
Year 2020
  • Wirtualna rekonstrukcja Jaszczurki Gierłowskiej = Virtual reconstruction of Gierłowska’s Lizard
    Publication

    - Bursztynisko - Year 2020

    Gdańsk znany jest z posiadania wielu osobliwości. Jedną z nich jest niewielka, choć licząca aż 44 miliony lat jaszczurka (podrząd Sauria, rodzina Lacertidae) zatopiona w trzyipółcentymetrowej bryłce bursztynu bałtyckiego – sukcynitu. Określa się ją mianem Jaszczurki Gierłowskiej, jako że w czerwcu 1997 r. znalazła ją na gdańskich Stogach bursztynniczka Gabriela Gierłowska. Obecnie bursztyn z jaszczurką oglądać można w Muzeum Bursztynu...

    Full text to download in external service

  • Weighted Clustering for Bees Detection on Video Images
    Publication

    This work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...

    Full text available to download

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • To Survive in a CBRN Hostile Environment: Application of CAVE Automatic Virtual Environments in First Responder Training
    Publication
    • P. Maciejewski
    • M. Gawlik-Kobylińska
    • J. Lebiedź
    • W. Ostant
    • D. Aydın

    - Year 2020

    This paper is of a conceptual nature and focuses on the use of a specific virtual reality environment in civil-military training. We analyzed the didactic potential of so-called CAVE automatic virtual environments for First Responder training, a type of training that fills the gap between First Aid training and the training received by emergency medical technicians. Since real training involves live drills based on unexpected situations,...

    Full text to download in external service

  • Texture Features for the Detection of Playback Attacks: Towards a Robust Solution

    This paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...

    Full text to download in external service

  • Factors Affecting the Effectiveness of Military Training in Virtual Reality Environment
    Publication
    • M. Gawlik-Kobylińska
    • P. Maciejewski
    • J. Lebiedź
    • A. Wysokińska-Senkus

    - Year 2020

    In this paper, we explored the factors influencing the effectiveness of military trainings performed in a virtual reality environment. The rationale for taking up the topic is the fact that such trainings are often conducted under specific operational procedures. These procedures may create rigorous frameworks for all elements of the learning environment, including the teacher’s performance. Therefore, to ensure the most conducive...

    Full text to download in external service

  • Autonomous Ship Utility Model Parameter Estimation Utilising Extended Kalman Filter

    In this paper, a problem of autonomous ship utility model identification for control purposes is considered. In particular, the problem is formulated in terms of model parameter estimation (one-step-ahead prediction). This is a complex task due to lack of measurements of the parameter values, their time-variability and structural uncertainty introduced by the available models. In this work, authors consider and compare two utility...

    Full text to download in external service

  • A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors
    Publication

    In recent years, emotion recognition algorithms have achieved high efficiency, allowing the development of various affective and affect-aware applications. This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels. However, the increase in computing and communication capabilities of smartphones,...

    Full text available to download

  • 3D Vision System for a Robotic Arm Based on Equal Baseline Camera Array

    This paper presents a lightweight 3D vision system called Equal Baseline Camera Array (EBCA). EBCA can work in different light conditions and it can be applied for measuring large range of distances. The system is a useful alternative to other known distance measuring devices such as structured-light 3D scanners, time-of-flight cameras, Light Detection and Ranging (LIDAR) devices and structure from motion techniques. EBCA can be...

    Full text available to download

Year 2021
  • Multiuser Stereoscopic Projection Techniques for CAVE-Type Virtual Reality Systems

    Despite the development of increasingly popular head mounted displays, CAVE-type systems may still be considered one of the most immersive virtual reality systems with many advantages. However, a serious limitation of most CAVE-type systems is the generation of a three-dimensional (3-D) image from the perspective of only one person. This problem is significant because in some applications, the participants must cooperate with each...

    Full text available to download

  • Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
    Publication

    - Year 2021

    The aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...

    Full text to download in external service

  • Klasyfikator Adaboost w detekcji i rozpoznawaniu obiektów graficznych
    Publication

    - Year 2021

    W pracy opisano metode Adaboost w zastosowaniu do detekcji obiektów graficznych, takich jak twarze lub rozpoznawania np. osób na podstawie obrazu twarzy. Przedstawiono podstawy algorytm, wersje kaskadowa, schemat przepływu danych i sterowania w zadaniu detekcji twarzy oraz sposoby adaptacji tej metody do problemów wieloklasowych. Opisano równiez zbiory cech obrazów, takie jak HAAR, LBP czy HOG stosowane w zadaniach detekcji i rozpoznawania...

    Full text to download in external service

  • Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
    Publication

    This paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...

    Full text available to download

  • Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents

    Electronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...

    Full text available to download

  • Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
    Publication
    • M. Gawlik-Kobylińska
    • P. Maciejewski
    • J. Lebiedź
    • A. Kravcov

    - International Journal on Information Technologies and Security - Year 2021

    Testing unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...

    Full text to download in external service

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download