Wyniki wyszukiwania dla: human computer iteraction - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: human computer iteraction

Filtry

wszystkich: 4230
wybranych: 2904

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: human computer iteraction

  • AUTOMATYCZNA KLASYFIKACJA MOWY PATOLOGICZNEJ

    Publikacja

    Aplikacja przedstawiona w niniejszym rozdziale służy do automatycznego wykrywania mowy patologicznej na podstawie bazy nagrań. W pierwszej kolejności przedstawiono założenia leżące u podstaw przeprowadzonych badan wraz z wyborem bazy mowy patologicznej. Zaprezentowano również zastosowane algorytmy oraz cechy sygnału mowy, które pozwalają odróżnić mowę niezaburzoną od mowy patologicznej. Wytrenowane sieci neuronowe zostały następnie...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Cost assessment of computer security activities

    Publikacja

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Controlling computer by lip gestures employing neural network

    Publikacja

    - Rok 2010

    Results of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Human Feedback and Knowledge Discovery: Towards Cognitive Systems Optimization

    Publikacja

    - Procedia Computer Science - Rok 2020

    Current computer vision systems, especially those using machine learning techniques are data-hungry and frequently only perform well when dealing with patterns they have seen before. As an alternative, cognitive systems have become a focus of attention for applications that involve complex visual scenes, and in which conditions may vary. In theory, cognitive applications uses current machine learning algorithms, such as deep learning,...

    Pełny tekst do pobrania w portalu

  • Modeling of Human Tissue for Medical Purposes

    The paper describes the possibilities offered for medicine by modeling of human tissue using virtual and augmented reality. It also presents three proposals of breast modeling for the use in clinical practice. These proposals are the result of arrangements of medical and computer scientists team (the authors) and will be pursued and implemented in the near future. There is included also a brief description of the most popular methods...

    Pełny tekst do pobrania w portalu

  • Computer application for railway track realignment

    Publikacja

    - Rok 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Computer modeling and testing of structural metamaterials

    Publikacja
    • T. Krolikowski
    • R. Knitter
    • A. Blazejewski

    - Procedia Computer Science - Rok 2019

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Utilization of fuzzy rules in computer character animation

    Publikacja

    - Rok 2010

    The chapter presents a method for automatic enhancement of computer character animation utilizing fuzzy inference. First the user designs a prototype version of animation, with keyframes only for important poses, roughly describing the action. Then animation is enriched with new motion phases calculated by the fuzzy inference system using descriptors given by the user. Various degrees of motion fluency and naturalness are possible...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Heuristic scheduling algorithms for uniform load of computer system

    Publikacja

    - Rok 2006

    W pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...

  • ASON/GMPLS connection control servers in virtual computer environment

    In the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...

  • 3D Computer Model of the Hip Joint Cartilage

    This paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body

    In the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Harmonics produced by traction substations – computer modelling and experimental verification

    Voltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion include traction rectifiers. This paper presents results of the computer investigation of...

    Pełny tekst do pobrania w portalu

  • Modelling the malware propagation in mobile computer devices

    Publikacja

    - COMPUTERS & SECURITY - Rok 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Human hair as a biomarker of human exposure to persistent organic pollutants (POPs)

    The main aim of this article is to investigate the possibility of using human hair as a biomarker with particular emphasis on persistent organic pollutants (POPs). We report previous results of studies of this topic. We critically review the available information on analytical procedures applied during analysis of human hair. Finally, we discuss future trends and possibilities arising from hair analysis.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Pełny tekst do pobrania w portalu

  • Social media and efficient computer infrastructure in smart city

    Publikacja

    - Rok 2018

    Social media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...

    Pełny tekst do pobrania w serwisie zewnętrznym