Filtry
wszystkich: 544
wybranych: 344
Wyniki wyszukiwania dla: COMPUTER-BASED THERAPEUTIC EXERCISES
-
System of protection against electric shock for circuits with power electronics converters
PublikacjaModern low voltage circuits are very often equipped with power electronics converters, therefore in these circuits non-sinusoidal earth currents (touch currents) may occur. For non-sinusoidal currents safety criteria should be modified. This paper presents these modified criteria and a computer system of protection against electric shock which can be implemented in circuits with power electronics converters. The system is based...
-
Intelligent turbogenerator controller based on artifical neural network
PublikacjaThe paper presents a desing of an intelligent controller based on neural network (ICNN). The ICNN ensures at the same time two fundamental functions : the maintaining of generator voltage at the desired value and the damping of the electromechanical oscillations. Its performance is evaluted on a single machine infinite bus power system through computer simulations. The dynamic and transient operation of the proposed controller...
-
Multi-criterion decision making in distributed systems by quantum evolutionary algorithms
PublikacjaDecision making by the AQMEA (Adaptive Quantum-based Multi-criterion Evolutionary Algorithm) has been considered for distributed computer systems. AQMEA has been extended by a chromosome representation with the registry of the smallest units of quantum information. Evolutionary computing with Q-bit chromosomes has been proofed to characterize by the enhanced population diversity than other representations, since individuals represent...
-
A new approach to modeling of selected human respiratory system diseases, directed to computer simulations
PublikacjaThis paper presents a new versatile approach to model severe human respiratory diseases via computer simulation. The proposed approach enables one to predict the time histories of various diseases via information accessible in medical publications. This knowledge is useful to bioengineers involved in the design and construction of medical devices that are employed for monitoring of respiratory condition. The approach provides the...
-
STEADY STATE VISUALLY EVOKED POTENTIALS FOR BRAIN COMPUTER INTERFACE
PublikacjaAn experiment conducted to validate a possibility of use a single active electrode EEG device for detecting Steady State Visually Evoked Potentials (SSVEP) is shown. A LED stimulator was applied to stimulate patients with two different frequencies - 13 Hz and 17 Hz. First, EEG signals were recorded and pre-processed using MATLAB software. In the next step recordings were analysed and classified employing the WEKA software. As indicated...
-
FEM ANALYSIS AND EXPERIMENTAL TESTS OF RIGID RISER HANGING SYSTEM
PublikacjaThe article presents the analysis, project, and experimental examination of an original rigid riser for Coil Tubing Pipes. The principle of riser operation is based on the use of friction forces. The research included the FEM analysis of the designed riser, calculations of the required bolt tensions, and checking the effect of the clamping force on stress distribution in the pipeline. The results of computer simulation were verified...
-
ANFIS-Based NPC Population Control in Video Games
PublikacjaModern computer games aim at providing rich, vivid worlds. The aim is to encourage the player to explore and interact with the in-game world. To describe the complex relations between in-game NPCs and their surrounding fuzzy logic is used. The paper presents ANFIS based population control in the video game. We present an approach allowing stabilizing the number of NPCs in-game by providing a certain amount of food to the environment....
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublikacjaWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
How Integration of a Brain-Machine Interface and Obstacle Detection System Can Improve Wheelchair Control via Movement Image
PublikacjaThis study presents a human-computer interaction combined with a brain-machine interface (BMI) and obstacle detection system for remote control of a wheeled robot through movement imagery, providing a potential solution for individuals facing challenges with conventional vehicle operation. The primary focus of this work is the classification of surface EEG signals related to mental activity when envisioning movement and deep relaxation...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublikacjaIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Waveguide model of the hearing aid earmold system
PublikacjaBackground The earmold system of the Behind-The-Ear hearing aid is an acoustic system that modifies the spectrum of the propagated sound waves. Improper selection of the earmold system may result in deterioration of sound quality and speech intelligibility. Computer modeling methods may be useful in the process of hearing aid fitting, allowing physician to examine various earmold system configurations and choose the optimum one...
-
Waveguide model of the hearing aid earmold system
PublikacjaBackground The earmold system of the Behind-The-Ear hearing aid is an acoustic system that modifies the spectrum of the propagated sound waves. Improper selection of the earmold system may result in deterioration of sound quality and speech intelligibility. Computer modeling methods may be useful in the process of hearing aid fitting, allowing physician to examine various earmold system configurations and choose the optimum one...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublikacjaA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Influence of statistical errors on damage detection based on structuralflexibility and mode shape curvature
PublikacjaDamage detection procedures based on measured natural frequencies and building structure mode shapes are discussed in this paper. Modal curvature and structural flexibility approaches are tested. Attention is paid to the modal identification errors that influence damage detection. This problem is studied using a computer simulation of a simple supported beam. For practical cases, the peak picking methodand its statistical errors...
-
Local Texture Pattern Selection for Efficient Face Recognition and Tracking
PublikacjaThis paper describes the research aimed at finding the optimal configuration of the face recognition algorithm based on local texture descriptors (binary and ternary patterns). Since the identification module was supposed to be a part of the face tracking system developed for interactive wearable computer, proper feature selection, allowing for real-time operation, became particularly important. Our experiments showed that it is...
-
Automatic system for optical parameters measurements of biological tissues
PublikacjaIn this paper a system allowing execution of automatic measurements of optical parameters of scattering materials in an efficient and accurate manner is proposed and described. The system is designed especially for measurements of biological tissues including phantoms, which closely imitate optical characteristics of real tissue. The system has modular construction and is based on the ISEL system, luminance and color meter and...
-
A VISION-BASED UNMANNED AERIAL VEHICLE NAVIGATION METHOD
PublikacjaThe satellite navigation systems are the main position sources for unmanned aerial vehicles (UAVs). This fact limits the area of UAVs operation to the places where radio signals is visible for a satellite navigation system receiver, mounted on the vehicle-outdoor navigation. Closed spaced are unavailable for vehicles which navigation is based on global satellite navigation systems (GNSS). Miniature UAV (MiniUAV) is able to operate...
-
The experimental evaluation and modeling of SBR removing nutrients under varied aeration conditions
PublikacjaSequencing batch reactors (SBR) are mainly characterized by sequential process phases of fill, react, settle, decant and idle periods that allow considerable flexibility in the design and operation in different conditions. This flexibility and the unique features of SBRs used to wastewater treatment by activated sludge systems operated in laboratory scale, allow not only conducting experiments for the standard conditions but also...
-
Knowledge pills in Education and Training: A Literature Review
PublikacjaObject and purpose: Knowledge pills (KPs) are a technique for transferring knowledge through short factual batches of content. In education and vocational training, they can help learners acquire specific pieces of knowledge in a few minutes, through a “microteaching” approach where learners can be involved in active and interactive exercises, quizzes, and games. Thanks to the advancements of multimedia platforms, they can contain...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublikacjaRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
Employing a biofeedback method based on hemispheric synchronization in effective learning
PublikacjaIn this paper an approach to build a brain computer-based hemispheric synchronization system is presented. The concept utilizes the wireless EEG signal registration and acquisition as well as advanced pre-processing methods. The influence of various filtration techniques of EOG artifacts on brain state recognition is examined. The emphasis is put on brain state recognition using band pass filtration for separation of individual...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublikacjaIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Design, synthesis, and biological evaluation of tetrahydroquinolinones and tetrahydroquinolines with anticancer activity
PublikacjaColorectal cancer (CRC) is the most commonly diagnosed cancer in Europe and the United States and the second leading cause of cancer related mortality. A therapeutic strategy used for the treatment of CRC involves targeting the intracellular levels of reactive oxygen species (ROS). In this study, we synthesized a series of novel tetrahydroquinolinones and assessed their ability to inhibit CRC growth and proliferation by evoking...
-
Robust-adaptive dynamic programming-based time-delay control of autonomous ships under stochastic disturbances using an actor-critic learning algorithm
PublikacjaThis paper proposes a hybrid robust-adaptive learning-based control scheme based on Approximate Dynamic Programming (ADP) for the tracking control of autonomous ship maneuvering. We adopt a Time-Delay Control (TDC) approach, which is known as a simple, practical, model free and roughly robust strategy, combined with an Actor-Critic Approximate Dynamic Programming (ACADP) algorithm as an adaptive part in the proposed hybrid control...
-
Metody sztucznej inteligencji do wspomagania bankowych systemów informatycznych
PublikacjaW pracy opisano zastosowania nowoczesnych metod sztucznej inteligencji do wspomagania bankowych systemów informatycznych. Wykorzystanie w systemach informatycznych algorytmów ewolucyjnych, harmonicznych, czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwiają zasadniczy wzrost konkurencyjności banku. Dlatego w pracy omówiono wybrane zastosowania bankowe ze szczególnym uwzględnieniem zbliżeniowych...
-
Naval mine detection system based of FPGA circuit
PublikacjaElectrochemical processes take place in a metal object immersed into sea water even if an anticorrosive coating is applied [1]. As a result, flowing field appears around the object. There are naval mines between many other objects situated in the sea. Naval mines can be put in the seabed in order to be more difficult to detect by sonars. Such a mine is located on the line demarking two environments of different electrical conductivity....
-
Operational Enhancement of Numerical Weather Prediction with Data from Real-time Satellite Images
PublikacjaNumerical weather prediction (NWP) is a rapidly expanding field of science, which is related to meteorology, remote sensing and computer science. Authors present methods of enhancing WRF EMS (Weather Research and Forecast Environmental Modeling System) weather prediction system using data from satellites equipped with AMSU sensor (Advanced Microwave Sounding Unit). The data is acquired with Department of Geoinformatics’ ground...
-
Measurement of luminance and color uniformity of displays using the large-format scanner
PublikacjaUniformity of display luminance and color is important for comfort and good perception of the information presented on the display. Although display technology has developed and improved a lot over the past years, different types of displays still present a challenge in selected applications, e.g. in medical use or in case of multi-screen installations. A simplified 9-point method of determining uniformity does not always produce...
-
Simulation of Life Raft Motions on Irregular Wave - An Analysis of Situations Leading to Raft Capsizing
PublikacjaSuccessful rescue action at sea is based on a. o. a correct choice of rescue means and their reliability. Operational characteristics of life-saving appliances determine their performance in a given water area. Therefore they affect duration time of rescue action and decide this way on survival time of shipwrecked persons. This paper presents impact of characteristics of circular inflatable life rafts on their dynamics in a...
-
Machine Learning Algorithm-Based Tool and Digital Framework for Substituting Daylight Simulations In Early- Stage Architectural Design Evaluation
PublikacjaThe aim of this paper is to examine the new method of obtaining the simulation-based results using backpropagation of errors artificial neural networks. The primary motivation to conduct the research was to determine an alternative, more efficient and less timeconsuming method which would serve to achieve the results of daylight simulations. Three daylight metrics: Daylight Factor, Daylight Autonomy and Daylight Glare Probability have...
-
Artificial intelligence in architectural education - green campus development research
PublikacjaThe rapid advancement of artificial intelligence (AI) technologies has introduced new possibilities and challenges in design education. This article explores the need for changes and adaptations in the teaching process of design as AI-related technologies, based on image generation, transform the creative process and offer novel opportunities. In a research-by-design studio in an architectural faculty in Poland, students who utilised...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Speech synthesis controlled by eye gazing
PublikacjaA method of communication based on eye gaze controlling is presented. Investigations of using gaze tracking have been carried out in various context applications. The solution proposed in the paper could be referred to as ''talking by eyes'' providing an innovative approach in the domain of speech synthesis. The application proposed is dedicated to disabled people, especially to persons in a so-called locked-in syndrome who cannot...
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublikacjaIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Tracing of dynamic objects in distributed interactive simulation systems
PublikacjaDistributed interactive simulation systems require integration of several areas of computer science and applied mathematics to enable each individual simulation object to visualize effectively dynamic states of other objects. Objects are unpredictable,i.e., controlled by their local operators, and are remote, i.e., must rely on some transmission media to visualize dynamic scene from their local perspectives. The paper...
-
Expert systems in quality control of manufacturing processes
PublikacjaThe paper deals with quality control in conditions of computer integrated manufacturing (CIM). It shows that quality of material stream items have to be analyzed on every stage of manufacturing process. Collecting and analyzing quantity of data with usage of expert systems make it possible to create a system for coordination of cell's work. The system contains error recovery algorithm and adaptive control subsystem based on fuzzy...
-
SYNTHESIZING MEDICAL TERMS – QUALITY AND NATURALNESS OF THE DEEP TEXT-TO-SPEECH ALGORITHM
PublikacjaThe main purpose of this study is to develop a deep text-to-speech (TTS) algorithm designated for an embedded system device. First, a critical literature review of state-of-the-art speech synthesis deep models is provided. The algorithm implementation covers both hardware and algorithmic solutions. The algorithm is designed for use with the Raspberry Pi 4 board. 80 synthesized sentences were prepared based on medical and everyday...
-
Imidazoacridinone-dependent lysosomal photodestruction: a pharmacological Trojan horse approach to eradicate multidrug-resistant cancers
PublikacjaMultidrug resistance (MDR) remains a primary hindrance to curative cancer therapy. Thus, introduction of novel strategies to overcome MDR is of paramount therapeutic significance. Sequestration of chemotherapeutics in lysosomes is an established mechanism of drug resistance. Here, we show that MDR cells display a marked increase in lysosome number. We further demonstrate that imidazoacridinones (IAs), which are cytotoxic fluorochromes,...
-
Reinforcement Learning Algorithm and FDTD-based Simulation Applied to Schroeder Diffuser Design Optimization
PublikacjaThe aim of this paper is to propose a novel approach to the algorithmic design of Schroeder acoustic diffusers employing a deep learning optimization algorithm and a fitness function based on a computer simulation of the propagation of acoustic waves. The deep learning method employed for the research is a deep policy gradient algorithm. It is used as a tool for carrying out a sequential optimization process the goal of which is...
-
METHODS OF TEACHING NOISE PROTECTION AT ENVIRONMENTAL ENGINEERING
PublikacjaNoise strongly influences both our health and behavior in everyday life and as employees or employers. The lost of hearing and other effects of noise on humans result not only in a significant decrease in the quality of life or work efficiency but have also have economic consequences. As noise can be preventable in part by the Environmental Engineers, but it is necessary to introduce them noise issues during their education process....
-
Ocena kształtu geometrycznego torów tramwajowych na podstawie pomiarów satelitarnych
PublikacjaW pracy przedstawiono ocenę możliwości wykorzystania dwusystemowych fazowych odbiorników GNSS (GPS/Glonass) dla realizacji pomiaru inwentaryzacyjnego linii tramwajowych. Opisano przebieg pomiarów przeprowadzonych na terenie Gdańska i uzyskane wyniki. Wykazano, że dla obszarów miejskich zastosowanie rozwiązań GNSS w oparciu o lokalną stację referencyjną może być alternatywnym podejściem względem pomiarów opartych o sieć ASG-EUPOS...
-
Electrophoretic Deposition of Chitosan/Eudragit E 100/AgNPs Coatings for Controlled Release of Antibacterial Substance
PublikacjaThe development of bacterial infection of the tissues surrounding an implant is one of the leading causes of implant surgery failure. In order to prevent the deposition of bacteria on the implant surface and the formation of biofilm, coatings that exhibit antibacterial properties are manufactured. However, the problem is the controlled release of the therapeutic substance from the coating over the extended life of the implant [1],...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
The use of mathematical models for diagnosis of activated sludge systems in WWTP
PublikacjaIn this study diagnosis of activated sludge systems in wastewater treatment plant (WWTP) was investigated. Diagnosis of technical objects can be realized in many ways. One of the divisions of the diagnostic methods include modelling with or without a model of the object. The first of these is the analysis of the symptoms for which, based on the parameter values, the abnormality in the diagnosed objects are sought. Another way is...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...