Filtry
wszystkich: 974
wybranych: 898
Wyniki wyszukiwania dla: a computer model
-
Micromouse robot - technical design and construction
PublikacjaW ostatnich latach obserwuje się intensywny rozwój robotyki. Roboty znajdują zastosowanie w różnych gałęziach przemysłu i życiu codziennym. Ich projektowanie wymaga interdyscyplinarnej wiedzy obejmującej obszary mechaniki, elektroniki, metrologii, automatyki i informatyki. W artykule przedstawiono poszczególne etapy wykonania robota typu Micromouse. Jest to specyficzne urządzenie, którego zadaniem jest zbadanie labiryntu, dotarcie...
-
Hand gesture recognition supported by fuzzy rules and Kalman filters
PublikacjaThe paper presents a system based on camera and multimediaprojector enabling a user to control computer applications by dynamic hand gestures. Gesture recognition methodology based on representing hand movement trajectory by motion vectors analysed using fuzzy rule-based inference is first given. For effective hand position tracking Kalman filters are employed. The system engineered is developed using J2SE and C++/OpenCV technology....
-
VARIANT DESIGNING IN the PRELIMINARY SMALL SHIP DESIGN PROCESS
PublikacjaShip designing is a complex process, as the ship itself is a complex, technical multi-level object which operates in the air/water boundary environment and is exposed to the action of many different external and internal factors resulting from the adopted technical solutions, type of operation, and environmental conditions. A traditional ship design process consists of a series of subsequent multistage iterations, which gradually...
-
STRUCTURE AND ALGORITHMS OF A DIAGNOSTIC DEVICE IN A WHEELED TRACTOR
PublikacjaDiagnostic device monitors the tractor’s technical condition and identifies the location of damaged components during operation. The diagnostic device detects and identifies the following types of defects: functional defects (uf) which affect performance, exhaust defects (ue) which increase toxic emissions and fuel consumption, defects that jeopardize driving safety (us), defects that affect engine performance (ud). The key component...
-
Structure of liquid gold from tight-binding driven molecular-dynamics
PublikacjaPraca przedstawia wyniki symulacji ciekłego złota w nadkomórce periodycznej przy użyciu stworzonego przez autorów programu komputerowego, za pomocą połączonych metod dynamiki molekularnej (MD) i ciasnego wiązania (TB). Omówiono strukturę tak symulowanej cieczy, porównując ją z dostępnymi danymi doświadczalnymi oraz wynikami innych symulacji, pod kątem radialnej i kątowej funkcji rozkładu i elektronowej gęstości stanów.A tight-binding...
-
Adjusting Game Difficulty by Recreating Behavioral Trees of Human Player Actions
PublikacjaThis paper presents a proposition of a method for adjusting game difficulty to the current level of player's skills in one-on-one games. The method is based on recognition of human player's actions and recording of those actions in the form of behavioral trees. Such trees are later used to drive behaviors of computer-controlled opponents so that human player has beat hit own strategy and improve on it, to win subsequent games....
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
Publikacja“If knowledge can create problems, it is not through ignorance that we can solve them.” (Isaac Asimov). Nevertheless, at any point of human activity, knowledge (besides practice) is a key factor in understanding and solving any given problem. Nowadays, computer systems have the ability to support their users in an efficient and reliable way. In this paper we present and describe the functionality of the Cognitum Ontorion system....
-
Receiver of Doppler multistatic system for moving target detection and tracking
PublikacjaThe article presents a method for solving major structural problems that occur in the receiver used in the multistatic Doppler system, aimed at determination of the trajectory and velocity of a moving target. In the system two transmitters emit acoustic continuous sinusoidal waves at different frequencies. The signals, scattered from a moving target are received by four hydrophones. Beside of the echoes, much larger signals coming...
-
Innovative Solutions for Immersive 3D Visualization Laboratory
PublikacjaThe paper presents results of the work concerning the technical specification of Immersive 3D Visualization Laboratory to be opened in late summer 2014 at the Faculty of Electronics, Telecommunications and Informatics at Gdańsk University of Technology in Poland. The person immersed in VR space will be placed in a transparent sphere with a diameter of over 10 feet, supported on rollers and equipped with a motion tracking system....
-
Zastosowanie elektronicznych zmysłów w analizie żywności. Cz. III Sztuczne oko
PublikacjaW dzisiejszych czasach konsumenci zwracają dużą uwagę na takie cechy żywności jak: zapach, smak i wygląd. Ze względu na to naukowcy od wielu lat podejmują próby naśladowania ludzkich narządów zmysłów za pomocą urządzeń określanych jako elektroniczne zmysły. Zaliczamy do nich elektroniczny nos i język oraz komputerowy system rozróżnienia barw i kształtów. Komputerowy system analizy obrazu zwany „Computer Vision” obejmuje zagadnienia...
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
LabVIEW-based intelligent system of protection against electric shock for photovoltaic installations
PublikacjaEvaluation of shock hazard in installations with photovoltaic sources of energy is more complicated than in a conventional low voltage system. In case of earth fault in photovoltaic generators, that are connected to the AC power public grid, a composite waveform of earth fault current in the installation may occur. For composite waveforms, the safety criteria should be modified. The paper considers the effect of the composite waveforms...
-
Asynchronous WAM with Irregular Pulse Repetition
PublikacjaRadiolocation systems for aviation based on Multi-Lateration (MLAT) typically use a set of synchronised ground sensors to receive radio signals broadcast by onboard transmitters. In most cases, the sensor synchronisation in Wide Area Multi-Lateration Systems (WAM) is provided by Global Navigation Satellite System (GNSS) receivers. However, in the case of synchronisation failure, there is still a possibility to estimate the coordinates...
-
Business Sentiment Analysis. Concept and Method for Perceived Anticipated Effort Identification
PublikacjaRepresenting a valuable human-computer interaction interface, Sentiment Analysis (SA) is applied to a wide range of problems. In the present paper, the researchers introduce a novel concept of Business Sentiment (BS) as a measurement of a Perceived Anticipated Effort (PAE) in the context of business processes (BPs). BS is considered as an emotional component of BP task contextual complexity perceived by a process worker after reading...
-
CHALK & TALK OR SWIPE & SKYPE?
PublikacjaTechnology in classroom is a matter of heated discussions in the field of education development, especially when multidisciplinary education goes along with language skills. Engineers’ education requires theoretical and practical knowledge. Moreover, dedicated computer skills become crucial for both young graduates and experienced educators on the labor market. Teaching online with or without using different Learning Management...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublikacjaIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
The usage of the openBIM idea in architectural design on the example of Blender and BlenderBIM add-on
PublikacjaThe aim of the article is the research about the method and advancement of the openBIM idea implementation, clearly defined by the buildingSMART organization. The conducted analysis are limited to the Blender program and the BlenderBIM add-on and has been embedded in the context of the work of an architect and other IT solutions. The article presents four aspects of the openBIM concept implementation. The first approach relates...
-
Selected Aspect of IT Tools Application in Process Improvement in Industrial Laundry Services
PublikacjaThe laundry services sector in Poland is growing dynamically and currently has around 13,000 enterprises, mainly micro, small and medium size. The increasing competitiveness of this industry, causes more emphasis on solutions that can in-crease the efficiency of laundry processes and thereby strengthen the market position. One of the methods that can be used for this purpose is Lean Six Sigma, aided by specialized computer software....
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Is it too late now to say we’re sorry? Examining anxiety contagion and crisis communication strategies using machine learning
PublikacjaIn this paper, we explore the role of perceived emotions and crisis communication strategies via organizational computer-mediated communication in predicting public anxiety, the default crisis emotion. We use a machine-learning approach to detect and predict anxiety scores in organizational crisis announcements on social media and the public’s responses to these posts. We also control for emotional and language tones in organizational...
-
Autonomous Control of the Underwater Remotely Operated Vehicle in Collision Situation with Stationary Obstacle
PublikacjaThe article considers the problem of autonomous control of the underwater remotely operated vehicle mini Remotely Operated Vehicle (ROV) in a collision situation with a stationary obstacle. The control of the collision avoidance process is presented as a synthesis of fuzzy proportional-differential controllers for the control of distance and orientation concerning the detected stationary obstacle. The control of the submergence...
-
Smart Innovation Engineering: Toward Intelligent Industries of the Future
PublikacjaKnowledge-based Engineering Systems are founded upon integration of knowledge into computer systems and are one of the core requirements for the future Industry 4.0. This paper presents a system called Smart Innovation Engineering (SIE) capable of facilitating product innovation process semi-automatically. It enhances decision-making processes by using the explicit knowledge of formal decision events. The SIE system carries the...
-
Virtual immersive environments
PublikacjaYet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...
-
Safety issues referred to induced sheath voltages in high-voltage power cables – case study
PublikacjaLoad currents and short-circuit currents in high-voltage power cable lines are sources of the induced voltages in the power cables’ concentric metallic sheaths. When power cables operate with single-point bonding, which is the simplest bonding arrangement, these induced voltages may introduce an electric shock hazard or may lead to damage of the cables’ outer non-metallic sheaths at the unearthed end of the power cable line. To...
-
Lab-in-syringe as a practical technique for automatic microextraction: Evaluation by Blue Applicability Grade Index
PublikacjaLab-in-syringe (LIS) is a powerful automatic technique that is derived from sequential injection analysis. In LIS, a computer-controlled syringe pump is employed, and its syringe barrel serves as a mixing, reaction, and/or extraction chamber. Until now, the LIS concept has been efficiently employed for the automation of solid-phase microextraction and liquid-phase microextraction protocols as a front-end to a plethora of chromatographic...
-
Role of research and development in internationalization of high-tech firms: Empirical results from Poland
PublikacjaThe article focuses on the significance of research and development (R&D) in driving the internationalization of Polish high-tech firms. R&D is essential for businesses to remain competitive and adapt their products to the specific requirements of different markets. The study aims to investigate the relationship between R&D and the internationalization process of high-tech firms based in Poland, with a focus on the innovation context....
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublikacjaA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Running performance of an aerodynamic journal bearing with squeeze film effect
PublikacjaResults of theoretical and experimental studies concerning the performance of an aerodynamic journal bearing of which running is assisted by squeeze film ultrasonic levitation (SFUL) are presented in this paper. The SFUL mechanism not only can separate journal from the bearing at the start and stop phases of operation but also can significantly contribute to the dynamic stability of the bearing when it runs at speed. Computer calculations...
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublikacjaGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublikacjaComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublikacjaRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Computational methods for calculation of binding free energy for ligand-receptor complexes
PublikacjaAccurate description of the molecular complexes energetic influence is required for understanding of many biological functions carried out by proteins. Therefore, estimation of binding free energy for ligand-receptor complexes is of highest importance for structure-based ligand design and drug discovery approaches.Experimental methods of determination of difference in Gibbs'es free energy have many limitations. Thus, computational...
-
Multimedia interface using head movements tracking
PublikacjaThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
TECHNIKI CAD W INŻYNIERII ELEKTRYCZNEJ - WYBRANE ZAGADNIENIA
PublikacjaW pracy przedstawiono różne techniki CAD (ang. Computer Aided Design) wykorzystywane w inżynierii elektrycznej dla potrzeb komputerowego modelowania 3D przetworników elektromechanicznych. Wirtualne modele 3D różnych urządzeń są użyteczne nie tylko przy opracowywaniu dokumentacji technicznej ale są także wykorzystywane w obliczeniach inżynierskich:...
-
Stress anisotropy characterisation with the help of Barkhausen effect detector with adjustable magnetic field direction
PublikacjaIn the paper we describe a novel apparatus for the measurement of the Barkhausen noise (BN) angular dependence, which in turn may be indicative of the stress induced anisotropy of magnetic properties. Such dependence can be further used for the stress distribution evaluation. The change of magnetization direction in the material is obtained by varying the magnetic flux density in two perpendicular yokes of the apparatus. We present...
-
Dynamic soil improvement by hybrid technologies
PublikacjaHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublikacjaCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublikacjaAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublikacjaRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Towards systemic functional safety and security management in hazardous plants
PublikacjaThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Visualization of a lifeboat motion during lowering along ship’s side
PublikacjaThis paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublikacjaCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Effect of Simultaneous Valve Closures in Hydraulic Piping Systems
PublikacjaThe paper investigates wave interference (between pressure waves) occurring in simple hydraulic systems. Water hammer was induced by simultaneous closure of three valves located at the reservoirs of a “Y” type hydraulic system. Numerical simulations were carried out with the help of the freeware computer package Allievi enabling the reader to replicate results in a direct manner. The influence of the following quantities has been...
-
A note on the affective computing systems and machines: a classification and appraisal
PublikacjaAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...