Filtry
wszystkich: 2973
wybranych: 2487
-
Katalog
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: LEAK DETECTION AND IDENTIFICATION
-
Identification of the Contamination Source Location in the Drinking Water Distribution System Based on the Neural Network Classifier
PublikacjaThe contamination ingression to the Water Distribution System (WDS) may have a major impact on the drinking water consumers health. In the case of the WDS contamination the data from the water quality sensors may be efficiently used for the appropriate disaster management. In this paper the methodology based on the Learning Vector Quantization (LVQ) neural network classifier for the identification of the contamination source location...
-
Primary role identification in e-mail networks using pattern subgraphs and sequence diagrams
PublikacjaSocial networks often forms very complex structures that additionally change over time. Description of actors' roles in such structures requires to take into account this dynamics reflecting behavioral characteristics of the actors. A role can be defined as a sequence of different types of activities. Various types of activities are modeled by pattern subgraphs, whereas sequences of these activities are modeled by sequence diagrams....
-
Super-resolved Thermal Imagery for High-accuracy Facial Areas Detection and Analysis
PublikacjaIn this study, we evaluate various Convolutional Neural Networks based Super-Resolution (SR) models to improve facial areas detection in thermal images. In particular, we analyze the influence of selected spatiotemporal properties of thermal image sequences on detection accuracy. For this purpose, a thermal face database was acquired for 40 volunteers. Contrary to most of existing thermal databases of faces, we publish our dataset...
-
An Overview of Image Analysis Techniques in Endoscopic Bleeding Detection
PublikacjaAuthors review the existing bleeding detection methods focusing their attention on the image processing techniques utilised in the algorithms. In the article, 18 methods were analysed and their functional components were identified. The authors proposed six different groups, to which algorithms’ components were assigned: colour techniques, reflecting features of pixels as individual values, texture techniques, considering spatial...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Feature type and size selection for adaboost face detection algorithm
PublikacjaThe article presents different sets of Haar-like features defined for adaptive boosting (AdaBoost) algorithm for face detection. Apart from a simple set of pixel intensity differences between horizontally or vertically neighboring rectangles, the features based on rotated rectangles are considered. Additional parameter that limits the area on which the features are calculated is also introduced. The experiments carried out on...
-
Uncertainty Quantification in Experimental Structural Dynamics Identification of Composite Material Structures
PublikacjaComposite materials are widely used in manufacture of aerospace and wind energy structural components. These load carrying structures are subjected to dynamic time-varying loading conditions. Robust structural dynamics identification procedure impose tight constraints on the quality of modal models estimates obtained from vibration experiments. Modal testing results are influenced by numerous factors introducing uncertainty to...
-
Experimental verification and comparison of mode shape-based damage detection methods
PublikacjaThis paper presents experimental verification and comparison of damage detection methods based on changes in mode shapes such as: mode shape curvature (MSC), modal assurance criterion (MAC), strain energy (SE), modified Laplacian operator (MLO), generalized fractal dimension (GFD) and Wavelet Transform (WT).
-
Optimally regularized local basis function approach to identification of time-varying systems
PublikacjaAccurate identification of stochastic systems with fast-varying parameters is a challenging task which cannot be accomplished using model-free estimation methods, such as weighted least squares, which assume only that system coefficients can be regarded as locally constant. The current state of the art solutions are based on the assumption that system parameters can be locally approximated by a linear combination of appropriately...
-
Two-Stage Identification of Locally Stationary Autoregressive Processes and its Application to the Parametric Spectrum Estimation
PublikacjaThe problem of identification of a nonstationary autoregressive process with unknown, and possibly time-varying, rate of parameter changes, is considered and solved using the parallel estimation approach. The proposed two-stage estimation scheme, which combines the local estimation approach with the basis function one, offers both quantitative and qualitative improvements compared with the currently used single-stage methods.
-
Adaptive Identification of Underwater Acoustic Channel with a Mix of Static and Time-Varying Parameters
PublikacjaWe consider the problem of identification of communication channels with a mix of static and time-varying parameters. Such scenarios are typical, among others, in underwater acoustics. In this paper, we further develop adaptive algorithms built on the local basis function (LBF) principle resulting in excellent performance when identifying time-varying systems. The main drawback of an LBF algorithm is its high complexity. The subsequently...
-
Efficiency of gas mixtures detection by resistive gas sensors
PublikacjaResistive gas sensors are very popular and are commonly used to detect various gases and their mixtures. Theeir main disadvantage is very limited selectivity. Practical use of gas sensors in environenmental applications requires determination of concentration of a few mixed gases at the same time. We would like to present recent results of gas detection improvement by utilizing a single gas sensor and additional measurements to...
-
Histogram of Gradients with Cell Average Intensity for Human Detection
PublikacjaThe modification of the descriptor in human detector using Histogram of Oriented Gradients and support vector machine is presented. The proposed modification requires inserting the average cell intensitiesresulting with the increase of the length of the descriptor from 3780 to 4200 values, but it is easy to compute and instantly gives 14-26% of miss rate improvement at 10^-4 False Positives Per Window (FPPW). The modification...
-
Detection of Face Position and Orientation Using Depth Data
PublikacjaIn this paper an original approach is presented for real-time detection of user's face position and orientation based only on depth channel from a Microsoft Kinect sensor which can be used in facial analysis on scenes with poor lighting conditions where traditional algorithms based on optical channel may have failed. Thus the proposed approach can support, or even replace, algorithms based on optical channel or based on skeleton...
-
Optimal placement of IMU sensor for the detection of children activity
PublikacjaIn this paper an investigation to determine the optimal placement of IMU sensors for the purpose of children characteristic activity detection is presented. The article compares four different placement of two IMU sensors on human body. Ten healthy volunteers participated within the study. Data were collected firstly from two wireless 9-axial IMU sensors placed at the left and right wrists, then sensors were placed at lower back...
-
Real-Time Bleeding Detection in Gastrointestinal Tract Endoscopic Examinations Video
PublikacjaThe article presents a novel approach to medical video data analysis and recognition of bleedings. Emphasis has been put on adapting pre-existing algorithms dedicated to the detection of bleedings for real-time usage in a medical doctor’s office during an endoscopic examination. A real-time system for analyzing endoscopic videos has been designed according to the most significant requirements of medical doctors. The main goal of...
-
Fault detection in measuring systems of power plants
PublikacjaThis paper describes possibility of forming diagnostic relations based on application of the artifical neural networks (ANNs), intended for the identifying of degradation of measuring instruments used in developed power systems. As an example a steam turbine high-power plant was used. And, simulative calculations were applied to forming diagnostic neural relations. Both degradation of the measuring instruments and simultaneously...
-
Gas Detection Using Resistive Gas Sensors And Radial Basis Function Neural Networks
PublikacjaWe present a use of Radial Basis Function (RBF) neural networks and Fluctuation Enhanced Sensing (FES) method in gas detection system utilizing a prototype resistive WO3 gas sensing layer with gold nanoparticles. We investigated accuracy of gas detection for three different preprocessing methods: no preprocessing, Principal Component Analysis (PCA) and wavelet transformation. Low frequency noise voltage observed in resistive gas...
-
Detection and Direction-of-Arrival Estimation of Weak Spread Spectrum Signals Received with Antenna Array
PublikacjaThis paper presents a method for the joint detection and direction of arrival (DOA) estimation of low probability of detection (LPD) signals. The proposed approach is based on using the antenna array to receive spread-spectrum signals hidden below the noise floor. Array processing exploits the spatial correlation between phase-delayed copies of the signal and allows us to evaluate the parameter used to make the decision about the...
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublikacjaAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
EFFICIENCY OF GAS MIXTURES DETECTION BY RESISTIVE GAS SENSORS
PublikacjaResistive gas sensors are very popular and are commonly used to detect various gases and their mixtures. Their main disadvantage is very limited selectivity. Practical use of gas sensors in environmental applications (e.g., in sewage systems to protect workers, in air conditioning systems to monitor atmosphere quality) requires determination of concentration of a few mixed gases at the same time. We would like to present recent...
-
Sleep Apnea Detection by Means of Analyzing Electrocardiographic Signal
PublikacjaObstructive sleep apnea (OSA) is a condition of cyclic, periodic ob-struction (stenosis) of the upper respiratory tract. OSA could be associated with serious cardiovascular problems, such as hypertension, arrhythmias, hearth failure or peripheral vascular disease. Understanding the way of connection between OSA and cardiovascular diseases is important to choose proper treatment strategy. In this paper, we present a method for integrated...
-
Letters detection in the photograph
PublikacjaUrządzenie do lokalizacji i odczytu napisów z przeznaczeniem dla osób niewidomych może wykorzystywać standardowe systemy rozpoznawania znaków OCR (ang. Optical Character Recognition). Niestety ze względu na złożoność scen w terenie systemy takie nie potrafią analizować zdjęć bezpośrednio. Zdjęcia przed uruchomieniem systemu OCR wymagają przetworzenia polegającego na segmentacji i wyszukaniu segmentów podobnych do liter. Podejście...
-
Identification of residual force in static load tests on instrumented screw displacement piles
PublikacjaOccurrence of the so-called residual force of an unknown value significantly disturbs interpretation of static load tests performed on piles equipped with additional measuring instruments. Screw displacement piles are the piling technology in which the residual force phenomenon is very common. Its formation mechanism is closely related to the installation method of this type of piles, which initiates generation of negative pile...
-
Identification of Bodner-Partom Viscoplastic Model Parameters for Some Aluminum Alloys at Elevated Temperature
PublikacjaThe paper presents the identification process of inelastic (viscoplastic) properties for two aluminum alloys at a temperature of 120°C. The material parameters are calculated on the basis of uniaxial tension tests. Twelve tests at elevated temperature for each alloy have been performed—three tests for four different strain rates. The main purpose of the paper is to identify the Bodner-Partom viscoplastic model parameters for two...
-
Spectral Finite Element Method in Condition Monitoring and Damage Detection
PublikacjaIt is well known that the dynamic behaviour of engineering structures may carry very important and crucial information that can be further used for the assessment of their condition as well as detection of any damage induced. The current interest in monitoring techniques based on the propagation of guided elastic waves requires that numerical techniques used for modelling the phenomena associated must shift into the realm of high...
-
Detection of the Incoming Sound Direction Employing MEMS Microphones and the DSP
PublikacjaA 3D acoustic vector sensor based on MEMS microphones and its application to road traffic monitoring is presented in the paper. The sensor is constructed from three pairs of digital MEMS microphones, mounted on the orthogonal axes. Signals obtained from the microphones are used to compute sound intensity vectors in each direction. With this data, it is possible to compute the horizontal and vertical angle of an incoming sound....
-
Detection of Alzheimer's disease using Otsu thresholding with tunicate swarm algorithm and deep belief network
PublikacjaIntroduction: Alzheimer’s Disease (AD) is a degenerative brain disorder characterized by cognitive and memory dysfunctions. The early detection of AD is necessary to reduce the mortality rate through slowing down its progression. The prevention and detection of AD is the emerging research topic for many researchers. The structural Magnetic Resonance Imaging (sMRI) is an extensively used imaging technique in detection of AD, because...
-
Machine-aided detection of SARS-CoV-2 from complete blood count
PublikacjaThe current gold standard for SARS-CoV-2 detection methods lacks the functionality to perform population screening. Complete blood count (CBC) tests are a cost-effective way to reach a wide range of people – e.g. according to the data of the Central Statistical Office of Poland from 2016, there are 3,000 blood diagnostic laboratories in Poland, and 46% of Polish people have at least one CBC test per year. In our work, we show...
-
Material Parameters Identification of Historic Lighthouse Based on Operational Modal Analysis
PublikacjaIn the present paper, the identification of the material parameters of a masonry lighthouse is discussed. A fully non-invasive method was selected, in which the material properties were determined via numerical model validation applied to the first pair of natural frequencies and their related mode shapes, determined experimentally. The exact structural model was built by means of the finite element method. To obtain experimental...
-
A new assay based on terminal restriction fragment length polymorphism of homocitrate synthase gene fragments for Candida species identification
PublikacjaCandida sp. have been responsible for an increasing number of infections, especially in patients with immunodeficiency. Species specific differentiation of the Candida sp. is difficult in routine diagnosis. This identification can have a highly significant association in therapy and prophylaxis. This work has shown a new application of terminal restriction fragment length polymorphism (t-RFLP) method in molecular identification...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
A method of RTS noise identification in noise signals of semiconductor devices in the time domain
PublikacjaIn the paper a new method of Random Telegraph Signal (RTS) noise identification is presented. The method is based on a standardized histogram of instantaneous noise values and processing by Gram-Charlier series. To find a device generating RTS noise by the presented method one should count the number of significant coefficients of the Gram-Charlier series. This would allow to recognize the type of noise. There is always one (first)...
-
Optimal and suboptimal algorithms for identification of time-varying systems with randomly drifting parameters
PublikacjaNoncausal estimation algorithms, which involve smoothing, can be used for off-line identification of nonstationary systems. Since smoothingis based on both past and future data, it offers increased accuracy compared to causal (tracking) estimation schemes, incorporating past data only. It is shown that efficient smoothing variants of the popular exponentially weighted least squares and Kalman filter-based parameter trackers can...
-
Classification of Urban Regeneration Participants as a Basis for Identification of Construction Investment's Risk Sources
PublikacjaOn the basis of the conducted research it can be concluded that the majority of the existing urban regeneration problems are revealed by the lack of an in-depth analysis of sources and risk factors. For the above reasons, the subject of this study is classification of urban regeneration's participants as a basis for identification of construction investment's risk sources. The research methodology is based on an in-depth analysis...
-
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
PublikacjaIn this paper performance comparison of co-polarized and cross-polarized microstrip Van Atta arrays working in the 60 GHz frequency range is presented. They can be treated as simple chipless RFID tags with frequency response based identification. Tags with three different nominal resonance frequencies of 57, 62 and 67 GHz are designed by scaling optimized base model. Designed 62 GHz co-polarized and cross-polarized arrays with...
-
LOS and NLOS identification in real indoor environment using deep learning approach
PublikacjaVisibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a deep learning (DL) model to classify LOS/NLOS...
-
CMGNet: Context-aware middle-layer guidance network for salient object detection
PublikacjaSalient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature...
-
Shore Construction Detection by Automotive Radar for the Needs of Autonomous Surface Vehicle Navigation
PublikacjaAutonomous surface vehicles (ASVs) are becoming more and more popular for performing hydrographic and navigational tasks. One of the key aspects of autonomous navigation is the need to avoid collisions with other objects, including shore structures. During a mission, an ASV should be able to automatically detect obstacles and perform suitable maneuvers. This situation also arises in near-coastal areas, where shore structures like...
-
Novel staphylococci nucH taxonomical marker used in identification of human-associated Staphylococcus succinus subsp. casei
PublikacjaThe aim of our study was to assess the sequencing of unique nucH gene fragment based on performed bioinformatics analysis as a novel diagnostic method for the identification of difficult to identify staphylococcal human pathogenic strains. Initially, PCR-RFLP-rrn analysis specific to the spacers between 16SrDNA and 23SrDNA followed by HhaI restriction analysis was performed. Further, sequencing of nucH and 16S rDNA genes fragments...
-
Towards bees detection on images: study of different color models for neural networks
PublikacjaThis paper presents an approach to bee detection in videostreams using a neural network classifier. We describe the motivationfor our research and the methodology of data acquisition. The maincontribution to this work is a comparison of different color models usedas an input format for a feedforward convolutional architecture appliedto bee detection. The detection process has is based on a neural...
-
Simulation and measurements for the substance identification by AFM
Publikacja -
Optimal inputs in pharmacokinetics model's identification
PublikacjaW pracy przedstawiono zagadnienie optymalizacji pobudzeń dla identyfikacji parametrycznej kompartmentowych modeli zmiennych stanu SISO systemów farmakokinetycznych. Zaimplementowano kryterium w postaci śladu macierzy informacyjnej Fishera (kryterium czułościowe). Rozważono klasę pobudzeń dopuszczalnych o ograniczonej energii, gdyż w przypadku wielu leków zbyt szybkie ich podawanie wiąże się z występowaniem skutków ubocznych. Zadanie...
-
IDENTIFICATION OF THE INTERFECE OF LATERAL SLIDE BEARINGS
PublikacjaIn the paper, the model of slide bearings of motor engine, the metodology of research on this type of bearings and its results are presented measurement standpoint consisting of main elements of Briggs & Stratton 550 serie 10 T 802 model piston motor engine driven by three phase elektric engine is introduced . On the measurement standpoint are measurements were done, needed for specification...
-
Simulation and identification of damage in bar structures.
PublikacjaPraca zawiera opis i testy 3 procedur badawczych dotyczących lokalizacjizniszczeń w konstrukcjach. Procedury bazują na danych modalnych jakie obiektgeneruje podczas swoich drgań tzn. częstościach własnych i postaciach drgań Badane są zmiany podatności układu, zmiany krzywizn postaci drgań i wrażli-wość częstości na założone zniszczenia. Odpowiednie procedury wiążące się ztymi trzema metodami są przestestowane na przykładzie wspornika...
-
Risk Identification Patterns for Software Projects.
PublikacjaArtykuł prezentuje metodę identyfikacji ryzyka w projektach informatycznych z użyciem wzorców ryzyka odnoszących się do modelu procesu projektowego. W artykule zdefiniowano meta-model dla modelowania procesów ukierunkowany na analizę ryzyka oraz proste i złożone wzorce ryzyka wywiedzione z tego meta-modelu, jak również pokazano przykładowe użycie wzorców do opisu czynników ryzyka odnoszących się do modelu RUP. Metodę poddano walidacji...
-
A service-oriented approach to the identification of IT Risk
PublikacjaArtykuł przedstawia ogólne podejście do identyfikacji ryzyka eksploatacji systemów informatycznych, które obejmuje bezpieczeństwo, ochronę, prywatność oraz uzależnienie. Podejście oparte jest na badaniu trybów awarii usług dostarczanych użytkownikom przez oprogramowanie. Identyfikacja ryzyka na podstawie przeglądu usług uzupełniana jest listami kontrolnymi wyprowadzonymi ze standardów, a także klasycznymi technikami analizy bezpieczeństwa...
-
Detection of debonding in adhesive joints using Lamb wave propagation
PublikacjaAdhesively bonded joints are widely used in many branches of industry. Mechanical degradation of this type of connections does not have significant symptoms that can be noticed during visual assessment, so non-destructive testing becomes a very important issue. The paper deals with experimental investigations of adhesively bonded steel plates with different defects. Five samples (an intact one and four with damages in the form...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublikacjaAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...