Filtry
wszystkich: 1842
wybranych: 1708
-
Katalog
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MULTIMODAL THREAT DETECTION
-
Multimedia industrial and medical applications supported by machine learning
PublikacjaThis article outlines a keynote paper presented at the Intelligent DecisionTechnologies conference providing a part of the KES Multi-theme Conference “Smart Digital Futures” organized in Rome on June 14–16, 2023. It briefly discusses projects related to traffic control using developed intelligent traffic signs and diagnosing the health of wind turbine mechanisms and multimodal biometric authentication for banking branches to provide...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
A low complexity double-talk detector based on the signal envelope
PublikacjaA new algorithm for double-talk detection, intended for use in the acoustic echo canceller for voice communication applications, is proposed. The communication system developed by the authors required the use of a double-talk detection algorithm with low complexity and good accuracy. The authors propose an approach to doubletalk detection based on the signal envelopes. For each of three signals: the far-end speech, the microphone...
-
A double-talk detector using audio watermarking
Publikacjaa novel approach to double-talk detection in the acoustic echo canceler is proposed. a hidden signature is embedded into the arriving signal, using the echo-hiding method. next detection of the presence of this signature in the microphone signal is performed. the results of the signature detection may be used by the acoustic echo canceler to stop or restart the adaptation process.
-
New approaches for improving selectivity and sensitivity of resistive gas sensors: A review
PublikacjaResistive gas sensors are very popular and reliable but suffer from low selectivity and sensitivity. Various methods have been suggested to improve both features without increasing the number of sensors in gas detection systems. Fluctuation enhanced gas sensing was proposed to improve gas detection efficiency by analyzing low-frequency resistance fluctuations, and noise parameters can be more informative than the single DC resistance...
-
Cavitation Erosion of P110 Steel in Different Drilling Muds
PublikacjaThe P110 steel specimens were subjected to ultrasonic cavitation erosion in different compositions of drilling muds and surfactant additive. The test procedure was based on ASTM-G-32 standard recommendations. API 5CT-P110 steel is used for pipes in oil and gas industry. The harsh environment and high velocity of flows poses corrosive and erosive threat on materials used there. The composition of drilling fluid influences its rheological...
-
Malware - a survey on threats and mitigation techniques
PublikacjaThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Processing of Marine Satellite Data in WEB-BASED GIS
PublikacjaGIS systems are important modern word. They allow to quickly analyse and corelate various data bound to their geographical context. The paper describes Web-base GIS with ability to integrate and analyse data from many sources such as: satellite imagery, threat simulation models, marine vessels Automatic Identification System, raster and vector topographic charts. Some details of system architecture and implementation are presented...
-
Diagnostics in ballast water management
Publikacja. Diagnostics in ballast water management is the main remedy to protect against the threat of spreading invasive species that can be carried in ships' ballast tanks. This phenomenon is getting better known and understood. New and more effective methods of preventing threats related to this are being developed. Procedures are created to ensure environmental safety in the face of ever-increasing transport by sea. The article characterizes...
-
Testing Stability of Digital Filters Using Optimization Methods with Phase Analysis
PublikacjaIn this paper, novel methods for the evaluation of digital-filter stability are investigated. The methods are based on phase analysis of a complex function in the characteristic equation of a digital filter. It allows for evaluating stability when a characteristic equation is not based on a polynomial. The operation of these methods relies on sampling the unit circle on the complex plane and extracting the phase quadrant of a function...
-
Algorytmy wykrywania krawędzi w obrazie
PublikacjaWykrywanie krawędzi jest pierwszym etapem w cyfrowym przetwarzaniu obrazów. Operacja ta polega na usunięciu informacji takich jak kolor czy też jasność, a pozostawieniu jedynie krawędzi. Efektem tej operacji jest znaczna redukcja ilości danych do dalszej analizy. Pozwala to na zastosowanie w następnych etapach bardziej złożonych algorytmów rozpoznawania obiektów na podstawie kształtu. W artykule zaprezentowano zastosowanie algorytmów...
-
Effect of wet Hydrogen Sulfide on Carbon Steels Degradation in Refinery Based on Case Study
PublikacjaMaterial degradation caused by wet hydrogen sulfide (Wet H2S) is one of the major issues in refineries. Carbon steel is the main construction material used in refineries and is subjected not only to thickness loss but the hydrogen is the major concern. H2S leads to high atomic hydrogen penetration in steel which causes degradation in the form of blistering and/or cracking (HIC/SOHIC) and stress cracking in the area of welds and...
-
Adversarial attack algorithm for traffic sign recognition
PublikacjaDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Evaluation of the content of inorganic anions in tree saps
PublikacjaTree saps were once commonly used in the countries of Northern, Central and Eastern Europe. Although once almost forgotten, their popularity has been growing recently as part of an interest in organic food and traditional medicine. Tree saps, tapped mainly from birch and maple trees, are drunk both fresh and fermented or are used as raw material for the production of food products, e.g. syrups. The aim of this study was to determine...
-
Once in a season – the pragmatic function of fuck in “BoJack Horseman” TV Show
PublikacjaThis article investigates the use and pragmatic functions of the swear word fuck in the “BoJack Horseman” produced by Netflix and bridges the gap in the linguistic research on this particular TVshow. Incorporating corpus linguistics tools, the BoJack Horseman Corpus was compiled and thelemma fuck has been investigated and analysed from the multimodal perspective....
-
Effect of some organic solvent - water mixtures composion on precipitated calcium carbonate in carbonation process
PublikacjaPrecipitated calcium carbonate particles were obtained during carbonation of calcium hydroxide slurry with carbon dioxide. Aqueous solutions of isopropyl alcohol, n-butanol and glycerol were used as solvents. Concentration of organic additives in the reactive mixture was from 0 to 20 % (vol.). Precipitation process were performed in a stirred tank reactor equipped with gas distributor. Multimodal courses of particles size distribution...
-
Virtual immersive environments
PublikacjaYet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...
-
NONLINEAR VIBRATION ANALYSIS OF BEAM AND PLATE WITH CLOSED CRACK: A REVIEW
PublikacjaThe effect of nonlinearity is high sensitivity in damage detection, especially for closed cracks and delamination. This review illustrates the results of several researchers dealing with nonlinear effects caused by the closure of cracks in the structure, i.e., beam and plate structures. Early detection of damage is an important aspect for the structure and, therefore, continuous progress is being made in developing new and effective...
-
Moving object tracking algorithm evaluation in autonomous surveillance system
PublikacjaResults of evaluation of video object tracking algorithm being a part of an autonomous surveillance system are presented. The algorithm was investigated employing a set of benchmarks recorded locally. The precision of object detection, evaluated with such metrics as fragmentation, object area recall and object precision, is in focus. The experiments aimed at examining the detection quality using various object detection algorithm...
-
River flow simulation based on the HEC-RAS system
PublikacjaThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
River Flow Simulation Based on the HEC-RAS System
PublikacjaThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Identification of regions of interest in video for a traffic monitoring system
PublikacjaA system for automatic event detection in the camera image is presented in this paper. A method of limiting a region of interest to relevant parts of the image using a set of processing procedures is proposed. Image processing includes object detection with shadow removal performed in the modified YCbCr color space instead of RGB. The proposed procedures help to reduce the complexity of image processing algorithm and result in...
-
Measurements of Subnanometer Molecular Layers
PublikacjaSelected methods of formation and detection of nanometer and subnanometer molecular layers were shown. Additionally, a new method of detection and measurement with subnanometer resolution of layers adsorbed or bonded to the gate dielectric of the ion selective field effect transistor (ISFET) was presented.
-
Challenges in preparing honey samples for chromatographic determination of contaminants and trace residues
PublikacjaThe determination of contaminations and residues in honey is of growing concern over past few years, especially that these compounds can not only diminish beneficial properties of honey but more importantly, if present in significant amounts, can pose serious threat to human health. Since honey is characterized by complex composition of the matrix sample, it is often necessary to apply clean-up step, in order to eliminate interfering...
-
Reactive Processing and Functionalization of Ground Tire Rubber
PublikacjaThe dynamic development of the automotive industry resulted in a sig- nificant increase in rubber wastes, especially end-of-life tires, which are a serious threat to the natural environment and human health. This situation has enforced the industry and academic research groups to search new and cost-effective methods for recycling waste tires. In this field of research, reactive processing and functionaliza- tion seem to be a...
-
Immunogenic and protective activity of recombinant chimeric Toxoplasma gondii proteins
PublikacjaToxoplasmosis, one of the most common parasitic invasions worldwide, may pose a great threat for individuals with weakened immune system. The parasite also causes considerable economic losses due to infection of livestock. To date there is no efficient immunoprophylaxis for humans and animals, which would provide long-lasting protection against T. gondii invasion. Chimeric proteins, containing several selected fragments of parasite...
-
Parametric impulsive noise detector for corrupted audio signals based on hidden Markow model
PublikacjaThe paper addresses the problem of impulsive noise detection for audio signals. A structure of threshold parameter detectors using modelingof signals was introduced. the algorithm of the noise detection, based on discrete-time hidden Markow model (HMM)of whitened audio signal is elaborated
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublikacjaThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Leak detection methods for transmission pipelines.**2001, 156 s. 63 rys. 31 tab. bibliogr. 78 poz. maszyn. Rozprawa doktorska (2002.????) PG, Wydz. ETI. Promotor: dr hab. inż. Z. Kowalczuk, prof. nadzw. PG. Metody detekcji wycieków w rurociągach przemysłowych.
Publikacja.
-
Controlling computer by lip gestures employing neural network
PublikacjaResults of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....
-
Acoustics - new services for urban planning, research and education
PublikacjaThe main purpose of the presented design is twofold, namely: providing detailed information about the noise threats that occur every day in city areas and preventing the noise induced hearing loss especially among young people. An experimental system designed for the continuous monitoring of the acoustic climate of urban areas was developed and implemented within the PLGrid Plus project. The assessment of environmental threats...
-
Open-transistor fault diagnostics in voltage-source inverters by analyzing the load current
PublikacjaA novel method is presented for the detection andisolation of open-transistor faults in voltage-source invertersfeeding low-power AC motors. The method is based onmonitoring two diagnostic signals, one indicating sustained nearzerovalues of output current and thus permitting fault detection,the other permitting the isolation of the particular transistorwhich went faulty. The latter signal is the ratio of the averagephase current...
-
Analysis of soundscape recordings in close proximity to the road in changeable wather conditions
PublikacjaThe acoustic vehicle sensing is the least invasive type of traffic detection. Also, acoustic-based vehicle detection technology is insensitive to precipitation and can operate in low light level. Therefore, this kind of method may be used for automatic detection of the vehicle passage events. It can also be employed for measurements of a vehicle speed and the vehicle assignment to the particular category. In this paper the results...
-
Direct determination of paraquat herbicide by square-wave voltammetry by two-step transfer mechanism at heterogeneous boron-doped carbon nanowall electrodes
PublikacjaBoron-doped carbon nanowalls (B:CNW) versus boron-doped diamond (BDD) materials were investigated for the effective electrochemical detection of highly toxic herbicide paraquat (PQ). Depending on the surface morphology and functional groups of BDD and B:CNWs, the electrochemical absorption and detection of the target analyte PQ revealed different detection mechanisms. The surface absorption mechanism was mainly observed for BDD,...
-
Detekcja i lokalizacja nieprzewodzenia tranzystorów falownika napięcia na podstawie analizy prądu obciążenia
PublikacjaPrzedstawiono nową metodę detekcji i lokalizacji nieprzewodzenia tranzystorów w falownikach napięcia zasilających silniki indukcyjne małej mocy. Metoda bazuje na monitorowaniu wartości dwóch sygnałów dia-gnostycznych. Pierwszy z nich, wskaźnik braku przepływu prądu, wykorzystano w celu detekcji uszkodzeń. Drugi, stosunek wartości średniej prądu do wartości średniej bezwzględnej, zawiera informacje umożliwiające lokalizację uszkodzonych...
-
Style Transfer for Detecting Vehicles with Thermal Camera
PublikacjaIn this work we focus on nighttime vehicle detection for intelligent traffic monitoring from the thermal camera. To train a Convolutional Neural Network (CNN) detector we create a stylized version of COCO (Common Objects in Context) dataset using Style Transfer technique that imitates images obtained from thermal cameras. This new dataset is further used for fine-tuning of the model and as a result detection accuracy on images...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Molecular Imaging and Nanotechnology—Emerging Tools in Diagnostics and Therapy
PublikacjaPersonalized medicine is emerging as a new goal in the diagnosis and treatment of diseases. This approach aims to establish differences between patients suffering from the same disease, which allows to choose the most effective treatment. Molecular imaging (MI) enables advanced insight into molecule interactions and disease pathology, improving the process of diagnosis and therapy and, for that reason, plays a crucial role in personalized...
-
Macrocyclic derivatives of imidazole as chromoionophores for bismuth(III)/lead(II) pair
Publikacja18-membered diazomacrocycles with imidazole or 4-methylimidazole residue as a part of macrocycle were used as chromoionophores in bismuth(III) and lead(II) dual selective optodes for the first time. Cellulose triacetate membranes doped with macrocyclic chromoionophores are bismuth(III) and lead(II) selective with color change from orange/red to different shades of blue and violet, respectively. Results obtained for model and real...
-
Innowacyjny moduł ultradźwiękowy systemu monitoringu technicznego mostu podwieszonego w Rzeszowie
PublikacjaW artykule przedstawiono system monitoringu technicznego konstrukcji mostu podwieszonego nad rzeką Wisłok. System będzie wyposażony w dodatkowy moduł ultradźwiękowy umożliwiający śledzenie degradacji mechanicznej betonu w pylonie mostu. Wczesne wykrywanie stref mikropęknięć, przed pojawieniem się widocznych rys, umożliwia monitorowanie amplitud propagującej fali ultradźwiękowej oraz analizę sygnałów w dziedzinie częstotliwości.
-
Zastosowanie sieci neuronowych do detekcji impulsów o znanym kształcie w obecności silnego szumu i trendu
PublikacjaDetekcja impulsów w odebranym sygnale radiowym, zwłaszcza w obecności silnego szumu oraz trendu, jest trudnym zadaniem. Artykuł przedstawia propozycje rozwiązań wykorzystujących sieci neuronowe do detekcji impulsów o znanym kształcie w obecności silnego szumu i trendu. Na potrzeby realizacji tego zadania zaproponowano dwie architektury. W pracy przedstawiono wyniki badań wpływu kształtu impulsu, mocy zakłóceń szumowych oraz trendu...
-
Optimal detection observers based on eigenstructure assignment. W: FaultDiagnosis. Models, artificial intelligence, applications. Ed. J. Korbicz, J.M. Kościelny, Z. Kowalczuk, W. Cholewa. Berlin: Springer Verlag**2004 s. 219-259, 7 rys. bibliogr. 41 poz. Optymalne obseratory detekcyjne oparte na strukturze własnej.
PublikacjaPraca dotyczy analitycznych metod syntezy algorytmów detekcji uszkodzeń. De-finiując wektor resztowy jako ważony błąd uzyskanej oceny wyjścia danego o-biektu, poszukuje się takich obserwatorów stanu, dostarczających owych osza-cowań, dla których wektor resztowy jest w możlwie wysokim stopniu niezależnyod niemierzalnych zakłóceń oddziałujących na obiekt oraz od niemierzalnychszumów w torach pomiarowych. Rozważa się algorytmy...
-
Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku
PublikacjaStreszczenie: Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku. Celem artykułu jest wykazanie roli inicjatyw społecznych w budzeniu poczucia odpowiedzialności za dziedzictwo materialne i kulturowe. Przyjęto założenie, że dla lokalnych społeczności miasto jest przestrzenią pamięci. Nastrój, atmosfera i klimat miejsca to słowa, które określają fizyczny...
-
Application of data driven methods in diagnostic of selected process faults of nuclear power plant steam turbine
PublikacjaArticle presents a comparison of process anomaly detection in nuclear power plant steam turbine using combination of data driven methods. Three types of faults are considered: water hammering, fouling and thermocouple fault. As a virtual plant a nonlinear, dynamic, mathe- matical steam turbine model is used. Two approaches for fault detection using one class and two class classiers are tested and compared.
-
PCR-ELISA: inexpensive alternative to quantitative PCR
PublikacjaPCR-ELISA (polymerase chain reaction-enzyme linked immunosorbent assay), a combination of PCR and ELISA methods, has been used since late 1980s. The technique is based on specially labelled DNA fragments which are captured by specific DNA sequences and detected by antibodies. The whole procedure of PCR-ELISA is divided into three steps: DNA extraction, PCR reaction and detection by ELISA. The method has been found as very specific...
-
Visual Object Tracking System Employing Fixed and PTZ Cameras
PublikacjaThe paper presents a video monitoring system utilizing fixed and PTZ cameras for tracking of moving objects. First type of camera provides image for background modelling, being employed for foreground objects localization. Estimated objects locations are then utilised for steering of PTZ cameras when observing targeted objects with high close-ups. Objects are classified into several classes, then basic event detection is being...