Filtry
wszystkich: 3417
wybranych: 2916
-
Katalog
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: Algorithm of DOA detection
-
Detection of Toxoplasma gondii in meat - available techniques
PublikacjaToxoplasma gondii, which belongs to the phylum Apicomplexa, is an absolute intercellular parasite that infects a wide range of hosts, including warm-blooded animals and humans. An infection with this parasite causes toxoplasmosis, which in most cases remains latent. However, this disease is a major threat to immunocompromised people and pregnant women. In extreme cases, it can damage nervous system or case fatal abortion. Infected...
-
Improved magnitude estimation of complex numbers using alpha max and beta min algorithm
PublikacjaThe paper presents an improved algorithm for calculating the magnitude of complex numbers. This problem, which is a special case of square rooting, occurs for example, in FFT processors and complex FIR filters. The proposed method of magnitude calculation makes use of the modified alpha max and beta min algorithm. The improved version of the algorithm allows to control the maximum magnitude approximation error by using an adequate...
-
Updating the Coupling Algorithm between HYDRUS and MODFLOW in the HYDRUS Package for MODFLOW
PublikacjaThe HYDRUS-based flow package for MODFLOW (the HPM or the HYDRUS package) is an existing unsaturated zone flow package for MODFLOW. In MODFLOW with the HPM, the groundwater modeling domain is discretized into regular grids that can be combined into multiple zones based on similarities in soil hydrology, topographical characteristics, and the depth to the groundwater. Each of these zones is assigned one unsaturated soil profile...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
PublikacjaThe underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublikacjaResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Detection of the Direct Sequence Spread Spectrum Signals with BPSK Modulation
PublikacjaThis paper presents a method of the DS CDMA signals with BPSK modulation detection through the examination of the enhanced signal spectrum density. On the base of experiments carried out on the real radio communication signals the impact of a narrowband emission occurring in the examined frequency band on the detection process effectiveness was shown. The results of the experiment aimed at the detection of the satellite navigation...
-
Emerging strategies for enhancing detection of explosives by artificial olfaction
PublikacjaExplosives detection systems need to be able to reliably detect a wide range of explosive materials and their vapours. The continued development and improvement of artificial olfaction techniques, including electronic nose (EN), remains important to overcome existing challenges and meet requirements posed by new improvements in the field of explosives. There is an increasingly popular trend aimed at improvement of fundamental metrological...
-
The chapter analyses the K-Means algorithm in its parallel setting. We provide detailed description of the algorithm as well as the way we paralellize the computations. We identified complexity of the particular steps of the algorithm that allows us to build the algorithm model in MERPSYS system. The simulations with the MERPSYS have been performed for different size of the data as well as for different number of the processors used for the computations. The results we got using the model have been compared to the results obtained from real computational environment.
PublikacjaThe chapter analyses the K-Means algorithm in its parallel setting. We provide detailed description of the algorithm as well as the way we paralellize the computations. We identified complexity of the particular steps of the algorithm that allows us to build the algorithm model in MERPSYS system. The simulations with the MERPSYS have been performed for different size of the data as well as for different number of the processors used...
-
Interference aware Bluetooth scatternet (Re)configuration algorithm IBLUEREA
PublikacjaThe paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth (BT) scatternet to reduce mutual interferences between BT and Wi-Fi (IEEE 802.11b) networks operating on the same area. IBLUEREA makes use of proposed procedure for modelling ISM environment around a given BT scatternet. The mechanism is based on estimation of the probabilities of successful (unsuccessful) frame transmissions. This determination...
-
Central heating temperature control algorithm for systems with condensing boilers
PublikacjaThe problem of control of a central heating system in a small residence is considered. It is assumed that the system is based on a condensing boiler. Since the boiler efficiency depends on a returning water temperature, the proposed control goal is to provide proper air temperature in the residence as well as the lowest possible water temperature. The proposed algorithm is applied to two buildings. Both of them have the same heating...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publikacja. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Comparison of Single and Multi-Population Evolutionary Algorithm for Path Planning in Navigation Situation
PublikacjaIn this paper a comparison of single and multi-population evolutionary algorithm is presented. Tested algorithms are used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of single-population and multi-population evolutionary algorithm is described....
-
Optical-Spectrometry-Based Method for Immunosuppressant Medicine Level Detection in Aqueous Solutions
PublikacjaIn this paper, an investigation into detecting immunosuppressive medicine in aqueous solutions using a spectrometry-based technique is described. Using optical transmissive spectrometry, absorbance measurements in the spectra range from 250 nm to 1000 nm were carried out for different cyclosporine A (CsA) concentrations in aqueous solutions. The experiment was conducted for samples both with and without interferent substances—glucose...
-
Path planning algorithm for ship collisions avoidance in environment with changing strategy of dynamic obstacles
PublikacjaIn this paper a path planning algorithm for the ship collision avoidance is presented. Tested algorithm is used to determine close to optimal ship paths taking into account changing strategy of dynamic obstacles. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of evolutionary algorithm and based on it dedicated application...
-
Prediction based on integration of Decisional DNA and a feature selection algorithm Relief-F
PublikacjaThe paper presents prediction model based on Decisional DNA and Set of experienced integrated with Relief_F algorithm for feature selection
-
APPLICATION OF APRIORI ALGORITHM IN THE LAMINATION PROCESS IN YACHT PRODUCTION
PublikacjaThe article specifies the dependence of defects occurring in the lamination process in the production of yachts. Despite great knowledge about their genesis, they cannot be completely eliminated. Authentic data obtained through cooperation with one of the Polish yacht shipyards during the years 2013–2017 were used for the analysis. To perform a simulation, the sample size was observed in 1450 samples, consisting of 6 models of...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
EFFICIENT LINE DETECTION METHOD BASED ON 2D CONVOLUTION FILTER
PublikacjaThe article proposes an efficient line detection method using a 2D convolution filter. The proposed method was compared with the Hough transform, the most popular method of straight lines detection. The developed method is suitable for local detection of straight lines with a slope from -45˚ to 45˚. Also, it can be used for curve detection which shape is approximated with the short straight sections. The new method is characterized...
-
Camera Orientation-Independent Parking Events Detection
PublikacjaThe paper describes the method for detecting precise position and time of vehicles parking in a parking lot. This task is trivial in case of favorable camera orientation but gets much more complex when an angle between the camera viewing axis and the ground is small. The method utilizes background subtraction and object tracking algorithms for detecting moving objects in a video stream. Objects are classified into vehicles and...
-
Application of the Monte Carlo algorithm for solving volume integral equation in light scattering simulations
PublikacjaVarious numerical methods were proposed for analysis of the light scattering phenomenon. Important group of these methods is based on solving the volume integral equation describing the light scattering process. The popular method from this group is the discrete dipole approximation (DDA). DDA uses various numerical algorithms to solve the discretized integral equation. In the recent years, the application of the Monte Carlo (MC)...
-
Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing
PublikacjaIn this article authors present an application of spatial processing methods for GPS spoofing detection and mitigation. In the first part of this article, a spoofing detection method, based on phase delay measurements, is proposed. Accuracy and precision of phase delay estimation is assessed for various qualities of received signal. Spoofing detection thresholds are determined. Efficiency of this method is evaluated in terms of...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Non-Least Square GNSS Positioning Algorithm for Densely Urbanized Areas
PublikacjaThe paper introduces an essentially new algorithm for calculating the GNSS position as an alternative to the least-square method. The proposed approach can be widely applied to any positioning method that uses multiple position lines for position calculation and is an example ofhow using a numerical solution can improve position accuracy without access to historical data. In essence, the method is based on the adaptation of the...
-
Implementation of the FOPID Algorithm in the PLC Controller - PWR Thermal Power Control Case Study
PublikacjaIn the paper authors describe proposition of design and verification procedures of the discrete Fractional Order PID (FOPID) algorithm for control of the Pressurized Water Reactor (PWR) thermal power near its nominal operating point. The FOPID algorithm synthesis consists of: off-line optimal tunning of its parameters in continuous time-domain with LQ (Linear Quadratic) performance index and simplified models of nuclear reactor...
-
Reinforcement Learning Algorithm and FDTD-based Simulation Applied to Schroeder Diffuser Design Optimization
PublikacjaThe aim of this paper is to propose a novel approach to the algorithmic design of Schroeder acoustic diffusers employing a deep learning optimization algorithm and a fitness function based on a computer simulation of the propagation of acoustic waves. The deep learning method employed for the research is a deep policy gradient algorithm. It is used as a tool for carrying out a sequential optimization process the goal of which is...
-
Numerically efficient algorithm for compact microwave device optimization with flexible sensitivity updating scheme
PublikacjaAn efficient trust-region algorithm with flexible sensitivity updating management scheme for electromagnetic (EM)-driven design optimization of compact microwave components is proposed. During the optimization process, updating of selected columns of the circuit response Jacobian is performed using a rank-one Broyden formula (BF) replacing finite differentiation (FD). The FD update is omitted for directions sufficiently well aligned...
-
An Improvement of Global Complex Roots and Poles Finding Algorithm for Propagation and Radiation Problems
PublikacjaAn improvement of the recently developed global roots finding algorithm has been proposed. The modification allows to shorten the computational time by reducing the number of function calls. Moreover, both versions of the algorithms (standard and modified) have been tested for numerically defined functions obtained from spectral domain approach and field matching method. The tests have been performed for three simple microwave...
-
Automatic detection of abandoned luggage employing a dual camera system
PublikacjaA system for automatic detection of events using a system of fixed and PTZ (pan-tilt-zoom) cameras is described. Images from the fixed camera are analyzed by means of object detection and tracking. Event detection system uses a set of rules to analyze data on the tracked moving objects and to detect defined events. A PTZ camera is used to obtain a detailed view of a selected object. A procedure for conversion between the pixel...
-
An optimal sliding mode control based on immune-wavelet algorithm for underwater robotic manipulator
PublikacjaIn this paper, a robust optimal Sliding Mode Controller (SMC) based on new algorithm of Artificial Immune System (AIS) is proposed for trajectory tracking of underwater manipulators. A new AIS algorithm is used to derive optimal values of surface parameters and boundary layer thickness in SMC with considering minimum torques and error. Surface parameters and boundary layer thickness are considered as antibody in AIS and Morlet...
-
Things You Might Not Know about the k-Nearest Neighbors Algorithm
PublikacjaRecommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...
-
Application of RMS for damage detection by guided elastic waves
PublikacjaThis paper presents certain results of an experimental study related with a damage detection in structural elements based on deviations in guided elastic wave propagation patterns.
-
The choice of parameters of induction motor model using a genetic algorithm.
PublikacjaRozważano problem doboru parametrów modeli matematycznych dużych 3 -fazowych silników indukcyjnych. Modele o prawidłowo dobranych parametrach mogą być pomocne podczas procedur projektowych. Podane silniki mogą być używane jako napędy sterów strumieniowych statków. Symulacje w środowisku Matlab, uwzględniają modele statyczne silników. Parametry silników dobierane są za pomocą przybornika Genetic Algorithm Toolbox. Skuteczność metody...
-
Evolutional algorithm in stock control
Publikacja -
Mask Detection and Classification in Thermal Face Images
PublikacjaFace masks are recommended to reduce the transmission of many viruses, especially SARS-CoV-2. Therefore, the automatic detection of whether there is a mask on the face, what type of mask is worn, and how it is worn is an important research topic. In this work, the use of thermal imaging was considered to analyze the possibility of detecting (localizing) a mask on the face, as well as to check whether it is possible to classify...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublikacjaThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Constant-Factor Approximation Algorithm for Binary Search in Trees with Monotonic Query Times
PublikacjaWe consider a generalization of binary search in linear orders to the domain of weighted trees. The goal is to design an adaptive search strategy whose aim is to locate an unknown target vertex of a given tree. Each query to a vertex v incurs a non-negative cost ω(v) (that can be interpreted as the duration of the query) and returns a feedback that either v is the target or the edge incident to v is given that is on the path towards...
-
Self-Adaptive Mesh Generator for Global Complex Roots and Poles Finding Algorithm
PublikacjaIn any global method of searching for roots and poles, increasing the number of samples increases the chances of finding them precisely in a given area. However, the global complex roots and poles finding algorithm (GRPF) (as one of the few) has direct control over the accuracy of the results. In addition, this algorithm has a simple condition for finding all roots and poles in a given area: it only requires a sufficiently dense...
-
Automated detection of sleep apnea and hypopnea events based on robust airflow envelope tracking
PublikacjaThe paper presents a new approach to detection of apnea/hypopnea events, in the presence of artifacts and breathing irregularities, from a single-channel airflow record. The proposed algorithm identifies segments of signal affected by a high amplitude modulation corresponding to apnea/hypopnea events. It is shown that a robust airflow envelope—free of breathing artifacts—improves effectiveness of the diagnostic process and allows...
-
Operational algae bloom detection in the Baltic Sea using GIS and AVHRR data
PublikacjaDuring the blooming season, algal colonies can, in extreme cases, cover up to 200 000 square kilometres of the Baltic Sea water surface. Because the position and shape of the blooms may significantly change in very short time due to the influence of wind and waves, regular monitoring of the blooms' development is necessary. Currently, the desired monitoring frequency may only be achieved by means of remote sensing. The article...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublikacjaIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publikacjagenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...
-
Sonar Pulse Detection Using Chirp Rate Estimation and CFAR Algorithms
PublikacjaThis paper presents a new approach to sonar pulse detection. The method uses chirp rate estimators and algorithms for the adaptive threshold, commonly used in radiolocation. The proposed approach allows detection of pulses of unknown parameters, which may be used in passive hydrolocation or jamming detection in underwater communication. Such an analysis is possible thanks to a new kind of imaging, which presents signal energy in...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
An optimized system for sensor ontology meta-matching using swarm intelligent algorithm
PublikacjaIt is beneficial to annotate sensor data with distinct sensor ontologies in order to facilitate interoperability among different sensor systems. However, for this interoperability to be possible, comparable sensor ontologies are required since it is essential to make meaningful links between relevant sensor data. Swarm Intelligent Algorithms (SIAs), namely the Beetle Swarm Optimisation Algorithm (BSO), present a possible answer...
-
Sensorless Fault Detection of Induction Motor with Inverter Output Filter
PublikacjaThe paper presents the problem of monitoring and fault detection of a sensorless voltage inverter fed squirrel cage induction motor with LC filter. The detection is based on load torque estimation of the investigated torque transmission system. The load torque is calculated besides the computation of other variables that are mandatory for sensorless drive operation such as rotor flux and speed. The implemented LC filter smooths...
-
Pareto Ranking Bisection Algorithm for Expedited Multi-Objective Optimization of Antenna Structures
PublikacjaThe purpose of this letter is introduction of a novel methodology for expedited multi-objective design of antenna structures. The key component of the presented approach is fast identification of the initial representation of the Pareto front (i.e., a set of design representing the best possible trade-offs between conflicting objectives) using a Pareto-ranking bisection algorithm. The algorithm finds a discrete set of Pareto-optimal...
-
Convex set of quantum states with positive partial transpose analysed by hit and run algorithm
PublikacjaThe convex set of quantum states of a composite K×K system with positive partial transpose is analysed. A version of the hit and run algorithm is used to generate a sequence of random points covering this set uniformly and an estimation for the convergence speed of the algorithm is derived. For K >3 or K=3 this algorithm works faster than sampling over the entire set of states and verifying whether the partial transpose is positive....
-
3D polypyrrole structures as a sensing material for glucose detection
PublikacjaIn this work, 3D polypyrrole (PPy) structures as material for glucose detection is proposed. Polypyrrole was electrochemically polymerized on platinum screen-printed electrode from an aqueous solution of lithium perchlorate and pyrrole. The growth mechanism of such PPy structures was studied by ex-situ scanning electron microscopy. Preliminary studies show that studied here PPy film is a good candidate as a sensing material for...