Wyniki wyszukiwania dla: computer calculations
-
Smart Innovation Engineering: Toward Intelligent Industries of the Future
PublikacjaKnowledge-based Engineering Systems are founded upon integration of knowledge into computer systems and are one of the core requirements for the future Industry 4.0. This paper presents a system called Smart Innovation Engineering (SIE) capable of facilitating product innovation process semi-automatically. It enhances decision-making processes by using the explicit knowledge of formal decision events. The SIE system carries the...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublikacjaIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Virtual immersive environments
PublikacjaYet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...
-
Is it too late now to say we’re sorry? Examining anxiety contagion and crisis communication strategies using machine learning
PublikacjaIn this paper, we explore the role of perceived emotions and crisis communication strategies via organizational computer-mediated communication in predicting public anxiety, the default crisis emotion. We use a machine-learning approach to detect and predict anxiety scores in organizational crisis announcements on social media and the public’s responses to these posts. We also control for emotional and language tones in organizational...
-
The usage of the openBIM idea in architectural design on the example of Blender and BlenderBIM add-on
PublikacjaThe aim of the article is the research about the method and advancement of the openBIM idea implementation, clearly defined by the buildingSMART organization. The conducted analysis are limited to the Blender program and the BlenderBIM add-on and has been embedded in the context of the work of an architect and other IT solutions. The article presents four aspects of the openBIM concept implementation. The first approach relates...
-
Asynchronous WAM with Irregular Pulse Repetition
PublikacjaRadiolocation systems for aviation based on Multi-Lateration (MLAT) typically use a set of synchronised ground sensors to receive radio signals broadcast by onboard transmitters. In most cases, the sensor synchronisation in Wide Area Multi-Lateration Systems (WAM) is provided by Global Navigation Satellite System (GNSS) receivers. However, in the case of synchronisation failure, there is still a possibility to estimate the coordinates...
-
Business Sentiment Analysis. Concept and Method for Perceived Anticipated Effort Identification
PublikacjaRepresenting a valuable human-computer interaction interface, Sentiment Analysis (SA) is applied to a wide range of problems. In the present paper, the researchers introduce a novel concept of Business Sentiment (BS) as a measurement of a Perceived Anticipated Effort (PAE) in the context of business processes (BPs). BS is considered as an emotional component of BP task contextual complexity perceived by a process worker after reading...
-
Simulations of flows in the coastal zone of the Baltic Sea
Dane BadawczeThe study area is located in the Southern Baltic, within Polish Marine Areas, adjacent to the coastline in the vicinity of Lubiatowo village, where The Coastal Research Station (CRS) – a field laboratory of the Institute of Hydro-Engineering of the Polish Academy of Sciences (IBW PAN) –is situated. The numerical reconstruction of the coastal flow was...
-
Transition dipole moment functions of the KRb molecule
Dane BadawczeElectronic transition dipole moment functions (TDMF) have been calculated for the singlet (s) and triplet (t) Sigma+ (S+), Pi (P), and Delta (D) electronic states of the KRb molecule. TDMFs are needed in understanding processes like photodissociation, photoassociation, cooling, and trapping of molecules. All results of the transition dipole moments...
-
Permanent dipole moment functions of the KRb molecule
Dane BadawczeElectronic permanent dipole moment functions (PDMF) have been calculated for the singlet (s) and triplet (t) Sigma+, Sigma-, Pi, and Delta electronic states of the KRb molecule. PDMFs are needed in understanding processes like photodissociation, photoassociation, cooling, and trapping of molecules. All results of the permanent dipole moments have been...
-
Born-Oppenheimer potential energy curves of the NaK molecule
Dane BadawczeAdiabatic potential energy curves (APEC) of the singlet (s) and triplet (t) Sigma+, Pi, and Delta electronic states have been calculated for the NaK molecule. All results of the presented molecular states have been obtained by the nonrelativistic multireference configuration interaction (MRCI) method used with pseudopotentials describing the interaction...
-
Data obtained by computation for X-ray imaging of grating without magnification using oriented Gaussian beams
Dane BadawczeThe propagation of X-ray waves through an optical system consisting of grating and X-ray refractive lenses is considered. In this approach, the propagating wave is represented as a superposition of the oriented Gaussian beams. The direction of wave propagation in each Gaussian beam is consistent with the local propagation direction of the X-ray wavefront.
-
Data obtained by computation for X-ray imaging of grating with magnification factor equal 2 using oriented Gaussian beams
Dane BadawczeThe propagation of X-ray waves through an optical system consisting of grating and X-ray refractive lenses is considered. In this approach, the propagating wave is represented as a superposition of the oriented Gaussian beams. The direction of wave propagation in each Gaussian beam is consistent with the local propagation direction of the X-ray wavefront.
-
Data obtained by computation for X-ray imaging of grating with magnification factor equal 4 using oriented Gaussian beams
Dane BadawczeThe propagation of X-ray waves through an optical system consisting of grating and X-ray refractive lenses is considered. In this approach, the propagating wave is represented as a superposition of the oriented Gaussian beams. The direction of wave propagation in each Gaussian beam is consistent with the local propagation direction of the X-ray wavefront.
-
Data obtained by computation for X-ray imaging of grating with magnification factor equal 8 using oriented Gaussian beams
Dane BadawczeThe propagation of X-ray waves through an optical system consisting of grating and X-ray refractive lenses is considered. In this approach, the propagating wave is represented as a superposition of the oriented Gaussian beams. The direction of wave propagation in each Gaussian beam is consistent with the local propagation direction of the X-ray wavefront.
-
Safety issues referred to induced sheath voltages in high-voltage power cables – case study
PublikacjaLoad currents and short-circuit currents in high-voltage power cable lines are sources of the induced voltages in the power cables’ concentric metallic sheaths. When power cables operate with single-point bonding, which is the simplest bonding arrangement, these induced voltages may introduce an electric shock hazard or may lead to damage of the cables’ outer non-metallic sheaths at the unearthed end of the power cable line. To...
-
Algorytm kontroli jakości z elementami sterowania rozmytego dla elastycznie zautomatyzowanego wytwarzania.
PublikacjaPublikacja dotyczy struktury procesu produkcyjnego w środowisku komputerowo zintegrowanego wytwarzania (computer integrated manufacturing - CIM). Ukazuje ona aspekty kontroli jakości wykonania części na różnych etapach procesu wytwórczego, podkreślając jego istotność. W celu dokonania szczegółowej analizy problemu zebrano dane o jakości wykonania części na poszczególnych poziomach wytwarzania. Analizy dowiodły, że jakość wykonania...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublikacjaAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Effect of Simultaneous Valve Closures in Hydraulic Piping Systems
PublikacjaThe paper investigates wave interference (between pressure waves) occurring in simple hydraulic systems. Water hammer was induced by simultaneous closure of three valves located at the reservoirs of a “Y” type hydraulic system. Numerical simulations were carried out with the help of the freeware computer package Allievi enabling the reader to replicate results in a direct manner. The influence of the following quantities has been...
-
Lab-in-syringe as a practical technique for automatic microextraction: Evaluation by Blue Applicability Grade Index
PublikacjaLab-in-syringe (LIS) is a powerful automatic technique that is derived from sequential injection analysis. In LIS, a computer-controlled syringe pump is employed, and its syringe barrel serves as a mixing, reaction, and/or extraction chamber. Until now, the LIS concept has been efficiently employed for the automation of solid-phase microextraction and liquid-phase microextraction protocols as a front-end to a plethora of chromatographic...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublikacjaComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublikacjaRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Towards systemic functional safety and security management in hazardous plants
PublikacjaThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Stress anisotropy characterisation with the help of Barkhausen effect detector with adjustable magnetic field direction
PublikacjaIn the paper we describe a novel apparatus for the measurement of the Barkhausen noise (BN) angular dependence, which in turn may be indicative of the stress induced anisotropy of magnetic properties. Such dependence can be further used for the stress distribution evaluation. The change of magnetization direction in the material is obtained by varying the magnetic flux density in two perpendicular yokes of the apparatus. We present...
-
Food analysis using artificial senses.
PublikacjaNowadays, consumers are paying great attention to the characteristics of food such as smell, taste, and appearance. This motivates scientists to imitate human senses using devices known as electronic senses. These include electronic noses, electronic tongues, and computer vision. Thanks to the utilization of various sensors and methods of signal analysis, artificial senses are widely applied in food analysis for process monitoring...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublikacjaRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
TECHNIKI CAD W INŻYNIERII ELEKTRYCZNEJ - WYBRANE ZAGADNIENIA
PublikacjaW pracy przedstawiono różne techniki CAD (ang. Computer Aided Design) wykorzystywane w inżynierii elektrycznej dla potrzeb komputerowego modelowania 3D przetworników elektromechanicznych. Wirtualne modele 3D różnych urządzeń są użyteczne nie tylko przy opracowywaniu dokumentacji technicznej ale są także wykorzystywane w obliczeniach inżynierskich:...
-
Cross-domain applications of multimodal human-computer interfaces
PublikacjaDeveloped multimodal interfaces for education applications and for disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and audio interface for speech stretching for hearing impaired and stuttering people and intelligent pen allowing for diagnosing and ameliorating developmental dyslexia. The eye-gaze tracking system named...
-
Dynamic soil improvement by hybrid technologies
PublikacjaHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Multimedia interface using head movements tracking
PublikacjaThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublikacjaModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublikacjaNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublikacjaA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublikacjaCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublikacjaCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublikacjaGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
Virtual reality technology in architectural education
PublikacjaContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Z PERSPEKTYWY NIECO PONAD 15 LAT DZIAŁALNOŚCI ODDZIAŁU IEEE GDAŃSK COMPUTER SOCIETY (CHAPTER C16) NA WYDZIALE ELEKTRONIKI, TELEKOMUNIKACJI I INFORMATYKI, POLITECHNIKI GDAŃSKIEJ
PublikacjaW pracy przywołano pokrótce najważniejsze działania, które towarzyszyły powstaniu i funkcjonowaniu Oddziału IEEE Gdańsk Computer Society (Chapter C16). Zaprezentowano skład Zarządu Oddziału w kolejnych kadencjach. Zwrócono uwagę między innymi na rolę Oddziału w promowaniu osiągnięć wybitnych naukowców, prezentujących swoje prace w ramach wykładów, odbywających się pod auspicjami Oddziału, jak też na współudział Oddziału w organizacji...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublikacjaBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
A note on the affective computing systems and machines: a classification and appraisal
PublikacjaAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...
-
Role of research and development in internationalization of high-tech firms: Empirical results from Poland
PublikacjaThe article focuses on the significance of research and development (R&D) in driving the internationalization of Polish high-tech firms. R&D is essential for businesses to remain competitive and adapt their products to the specific requirements of different markets. The study aims to investigate the relationship between R&D and the internationalization process of high-tech firms based in Poland, with a focus on the innovation context....
-
Dual role of oxygen-related defects in the luminescence kinetics of AlNMn2+
Dane BadawczeThis dataset presents the impact of temperature and pressure on AlN:Mn2+ luminescence kinetics. Unusual behavior of Mn2+ optical properties during UV excitation is observed, where a strong afterglow luminescence of Mn2+ occurs even at low temperatures. When the temperature increases, the contribution of the afterglow luminescence is further enhanced,...
-
THE PANTOGRAPH AND ITS GEOMETRIC TRANSFORMATIONS - A FORMER POPULAR TOOL FOR COPYING AND SCALING
PublikacjaDevelopment of digital technology has resulted in significant transformations of designer workshops. Computer applications replaced the previously existing tools and methods for drawing up of projects. Professional, sophisticated drawing instruments and tools for manual plotting, as well as basic drawing aids, have gradually fallen into oblivion and become relicts of a bygone era - the objects of collectors' interest. Gdansk University...