Filtry
wszystkich: 2132
-
Katalog
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: PLAYBACK ATTACK DETECTION
-
Video recordings of static hand gestures for gesture based interaction
Dane BadawczeThis data set contains video recording of selected simple hand gestures related to sign language. The purpose of the data set is to evaluate different computer algorithms design for hand gesture detection as well as for hand features and hand pose detection and identification. The data set contains 5 video recordings in mp4 format. Each recording is...
-
Leak detection methods for transmission pipelines.**2001, 156 s. 63 rys. 31 tab. bibliogr. 78 poz. maszyn. Rozprawa doktorska (2002.????) PG, Wydz. ETI. Promotor: dr hab. inż. Z. Kowalczuk, prof. nadzw. PG. Metody detekcji wycieków w rurociągach przemysłowych.
Publikacja.
-
Detekcja i lokalizacja nieprzewodzenia tranzystorów falownika napięcia na podstawie analizy prądu obciążenia
PublikacjaPrzedstawiono nową metodę detekcji i lokalizacji nieprzewodzenia tranzystorów w falownikach napięcia zasilających silniki indukcyjne małej mocy. Metoda bazuje na monitorowaniu wartości dwóch sygnałów dia-gnostycznych. Pierwszy z nich, wskaźnik braku przepływu prądu, wykorzystano w celu detekcji uszkodzeń. Drugi, stosunek wartości średniej prądu do wartości średniej bezwzględnej, zawiera informacje umożliwiające lokalizację uszkodzonych...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Dane BadawczeNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Aktywny system RFID do lokalizacji i identyfikacji obiektów w wielomodalnej infrastrukturze bezpieczeństwa
PublikacjaPrzedstawiono prace koncepcyjne, badawcze oraz implementacyjne skoncentrowane na praktycznej realizacji systemu detekcji obiektów z wykorzystaniem kamer wizyjnych i identyfikacji radiowej. Zaproponowano rozbudowę wielomodalnego teleinformatycznego systemu bezpieczeństwa o warstwę identyfikacji radiowej obiektów. Omówiono założenia zaprojektowanego systemu oraz opracowaną warstwę sprzętową. Zaproponowano i przedyskutowano praktyczne...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublikacjaDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Open-transistor fault diagnostics in voltage-source inverters by analyzing the load current
PublikacjaA novel method is presented for the detection andisolation of open-transistor faults in voltage-source invertersfeeding low-power AC motors. The method is based onmonitoring two diagnostic signals, one indicating sustained nearzerovalues of output current and thus permitting fault detection,the other permitting the isolation of the particular transistorwhich went faulty. The latter signal is the ratio of the averagephase current...
-
Analysis of soundscape recordings in close proximity to the road in changeable wather conditions
PublikacjaThe acoustic vehicle sensing is the least invasive type of traffic detection. Also, acoustic-based vehicle detection technology is insensitive to precipitation and can operate in low light level. Therefore, this kind of method may be used for automatic detection of the vehicle passage events. It can also be employed for measurements of a vehicle speed and the vehicle assignment to the particular category. In this paper the results...
-
Fluctuation-enhanced sensing of organic solvent vapors mixture by machine learning
Dane BadawczeThe data set consists of exemplary results of the product of voltage noise power spectral density S(f) multiplied by frequency f and normalized to squared DC voltage U^2 recorded in the graphene back-gated Field Effect Transistor under UV light assistance (275 nm) in the selected ambient atmospheres (Figure 3) and the results of gas detection by SVM...
-
Direct determination of paraquat herbicide by square-wave voltammetry by two-step transfer mechanism at heterogeneous boron-doped carbon nanowall electrodes
PublikacjaBoron-doped carbon nanowalls (B:CNW) versus boron-doped diamond (BDD) materials were investigated for the effective electrochemical detection of highly toxic herbicide paraquat (PQ). Depending on the surface morphology and functional groups of BDD and B:CNWs, the electrochemical absorption and detection of the target analyte PQ revealed different detection mechanisms. The surface absorption mechanism was mainly observed for BDD,...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Innowacyjny moduł ultradźwiękowy systemu monitoringu technicznego mostu podwieszonego w Rzeszowie
PublikacjaW artykule przedstawiono system monitoringu technicznego konstrukcji mostu podwieszonego nad rzeką Wisłok. System będzie wyposażony w dodatkowy moduł ultradźwiękowy umożliwiający śledzenie degradacji mechanicznej betonu w pylonie mostu. Wczesne wykrywanie stref mikropęknięć, przed pojawieniem się widocznych rys, umożliwia monitorowanie amplitud propagującej fali ultradźwiękowej oraz analizę sygnałów w dziedzinie częstotliwości.
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Style Transfer for Detecting Vehicles with Thermal Camera
PublikacjaIn this work we focus on nighttime vehicle detection for intelligent traffic monitoring from the thermal camera. To train a Convolutional Neural Network (CNN) detector we create a stylized version of COCO (Common Objects in Context) dataset using Style Transfer technique that imitates images obtained from thermal cameras. This new dataset is further used for fine-tuning of the model and as a result detection accuracy on images...
-
Real-Time Skin Quality Assessment System
PublikacjaThis thesis presents a real-time skin assessment system with the main aim of detecting inflammatory acne lesions and tracking skin conditions. A facial acne lesion detection algorithm was developed, using a pre-trained YOLOv8 model for lesion detection and a Mediapipe detector for face detection. The proposed solution aims to create a system used in smart mirrors to help users self-monitor and monitor their skin condition in real...
-
Zastosowanie sieci neuronowych do detekcji impulsów o znanym kształcie w obecności silnego szumu i trendu
PublikacjaDetekcja impulsów w odebranym sygnale radiowym, zwłaszcza w obecności silnego szumu oraz trendu, jest trudnym zadaniem. Artykuł przedstawia propozycje rozwiązań wykorzystujących sieci neuronowe do detekcji impulsów o znanym kształcie w obecności silnego szumu i trendu. Na potrzeby realizacji tego zadania zaproponowano dwie architektury. W pracy przedstawiono wyniki badań wpływu kształtu impulsu, mocy zakłóceń szumowych oraz trendu...
-
Kazimierz Darowicki prof. dr hab. inż.
OsobyStudia wyższe ukończyłem w czerwcu 1981 roku po zdaniu egzaminu dyplomowego i obronie pracy magisterskiej. Opiekunem pracy magisterskiej był dr hab. inż. Tadeusz Szauer. W roku 1991, 27 listopada uzyskałem stopień naukowy broniąc pracę doktorską zatytułowaną „Symulacyjna i korelacyjna analiza widm immitancyjnych inhibitowanej reakcji elektrodowej”. Promotorem pracy był prof. dr hab. inż. Józef Kubicki (Wydział Chemiczny...
-
Automated Parking Management for Urban Efficiency: A Comprehensive Approach
PublikacjaEffective parking management is essential for ad-dressing the challenges of traffic congestion, city logistics, and air pollution in densely populated urban areas. This paper presents an algorithm designed to optimize parking management within city environments. The proposed system leverages deep learning models to accurately detect and classify street elements and events. Various algorithms, including automatic segmentation of...
-
Macrocyclic derivatives of imidazole as chromoionophores for bismuth(III)/lead(II) pair
Publikacja18-membered diazomacrocycles with imidazole or 4-methylimidazole residue as a part of macrocycle were used as chromoionophores in bismuth(III) and lead(II) dual selective optodes for the first time. Cellulose triacetate membranes doped with macrocyclic chromoionophores are bismuth(III) and lead(II) selective with color change from orange/red to different shades of blue and violet, respectively. Results obtained for model and real...
-
Abdalraheem Ijjeh Ph.D. Eng.
OsobyThe primary research areas of interest are artificial intelligence (AI), machine learning, deep learning, and computer vision, as well as modeling physical phenomena (i.e., guided waves in composite laminates). The research interests described above are utilized for SHM and NDE applications, namely damage detection and localization in composite materials.
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Optimal detection observers based on eigenstructure assignment. W: FaultDiagnosis. Models, artificial intelligence, applications. Ed. J. Korbicz, J.M. Kościelny, Z. Kowalczuk, W. Cholewa. Berlin: Springer Verlag**2004 s. 219-259, 7 rys. bibliogr. 41 poz. Optymalne obseratory detekcyjne oparte na strukturze własnej.
PublikacjaPraca dotyczy analitycznych metod syntezy algorytmów detekcji uszkodzeń. De-finiując wektor resztowy jako ważony błąd uzyskanej oceny wyjścia danego o-biektu, poszukuje się takich obserwatorów stanu, dostarczających owych osza-cowań, dla których wektor resztowy jest w możlwie wysokim stopniu niezależnyod niemierzalnych zakłóceń oddziałujących na obiekt oraz od niemierzalnychszumów w torach pomiarowych. Rozważa się algorytmy...
-
Application of data driven methods in diagnostic of selected process faults of nuclear power plant steam turbine
PublikacjaArticle presents a comparison of process anomaly detection in nuclear power plant steam turbine using combination of data driven methods. Three types of faults are considered: water hammering, fouling and thermocouple fault. As a virtual plant a nonlinear, dynamic, mathe- matical steam turbine model is used. Two approaches for fault detection using one class and two class classiers are tested and compared.
-
PCR-ELISA: inexpensive alternative to quantitative PCR
PublikacjaPCR-ELISA (polymerase chain reaction-enzyme linked immunosorbent assay), a combination of PCR and ELISA methods, has been used since late 1980s. The technique is based on specially labelled DNA fragments which are captured by specific DNA sequences and detected by antibodies. The whole procedure of PCR-ELISA is divided into three steps: DNA extraction, PCR reaction and detection by ELISA. The method has been found as very specific...
-
BADANIE EFEKTYWNOŚCI WYKRYWANIA ANOMALII PROCESOWYCH W DZIAŁANIU TURBINY PAROWEJ ELEKTROWNI JĄDROWEJ PRZY POMOCY METOD WIELOWYMIAROWEJ ANALIZY STATYSTYCZNEJ
PublikacjaW artykule przedstawiono analizę możliwości wykrywania anomalii procesowych w działaniu turbiny parowej elektrowni jądrowej przy pomocy metod wielowymiarowej analizy statystycznej. Zasymulowano symptomy dwóch rodzajów uszkodzeń turbiny parowej tj. uderzenie wodne oraz, wyciek pary z zaworu części niskoprężnej. Jako narzędzie diagnostyczne wykorzystano Metodę Składników Podstawowych PCA (z ang. Principal Component Analysis). Jako...
-
Classification of Sea Going Vessels Properties Using SAR Satellite Images
PublikacjaThe aim of the project was to analyze the possibility of using machine learning and computer vision to identify (indicate the location) of all sea-going vessels located in the selected area of the open sea and to classify the main attributes of the vessel. The key elements of the project were to download data from the Sentinel-1 satellite [1], download data on the sea vessels [2], then automatically tag data and develop a detection...
-
Visual Object Tracking System Employing Fixed and PTZ Cameras
PublikacjaThe paper presents a video monitoring system utilizing fixed and PTZ cameras for tracking of moving objects. First type of camera provides image for background modelling, being employed for foreground objects localization. Estimated objects locations are then utilised for steering of PTZ cameras when observing targeted objects with high close-ups. Objects are classified into several classes, then basic event detection is being...
-
Piotr Konieczka prof. dr hab. inż.
Osoby -
Thermal dewetting as a method of surface modification of the gold thin films for surface plasmon resonance based sensor applications
PublikacjaHere, we report a quick and simple approach with low, optimized production costs to obtain surface plasmon resonance (SPR) based sensors fabricated through a time- and resource-effective method based on thermal dewetting of thin Au films. From the applicative point of view, the method of detection presented here should be easier to implement, since light transmission measurements seem to be much less challenging than light refractive...
-
Implementacja w FPGA algorytmu detekcji krawędzi obrazu w czasie rzeczywistym
PublikacjaW artykule przedstawiono projekt architektury oraz implementację układową toru przetwarzania wstępnego obrazu z modułem detekcji krawędzi. Układ został zaimplementowany w FPGA Intel Cyclone. Zrealizowany moduł wykorzystuje pięć wybranych algorytmów wykrywania krawędzi, w tym Robertsa, Sobela i Prewitt.
-
Performance evaulation of video object tracking algorithm in autonomous surveillance system
PublikacjaResults of performance evaluation of a video object tracking algorithm are presented. The method of moving objects detection and tracking is based on background modelling with mixtures of Gaussians and Kalman filters. An emphasis is put on algorithm's efficiency with regards to its settings. Utilized methods of performance evaluation based on comparison of algorithm output to manually prepared reference data are introduced. The...
-
Performance evaluation of video object tracking algorithm in autonomous surveillance system
PublikacjaResults of performance evaluation of a video object tracking algorithm are presented. The method of moving objects detection and tracking is based on background modelling with mixtures of Gaussians and Kalman filters. An emphasis is put on algorithm's efficiency with regards to its settings. Utilized methods of performance evaluation based on comparison of algorithm output to manually prepared reference data are introduced. The...
-
Electrochemical determination of nitroaromatic explosives at boron-doped diamond/graphene nanowall electrodes: 2,4,6-trinitrotoluene and 2,4,6-trinitroanisole in liquid effluents
PublikacjaThe study is devoted to the electrochemical detection of trace explosives on boron-doped diamond/graphene nanowall electrodes (B:DGNW). The electrodes were fabricated in a one-step growth process using chemical vapour deposition without any additional modifications. The electrochemical investigations were focused on the determination of the important nitroaromatic explosive compounds, 2,4,6-trinitrotoluene (TNT) and 2,4,6-trinitroanisole...
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublikacjaThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
Bartosz Szostak mgr inż.
OsobyBartosz Szostak w 2019 r. ukończył studia inżynierskie na Politechnice Gdańskiej na kierunku Geodezja i Kartografia. W 2021 r. ukończył studia magisterskie również w dziedzinie Geodezji i Kartografii na Politechnice Gdańskiej. Tematyka jego prac dyplomowych dotyczyła uczenia maszynowego i detekcji obiektów.
-
Evaluating calibration and robustness of pedestrian detectors
PublikacjaIn this work robustness and calibration of modern pedestrian detectors are evaluated. Pedestrian detection is a crucial perception com- ponent in autonomous driving and here we study its performance under different image corruptions. Furthermore, we provide analysis of classifi- cation calibration of pedestrian detectors and we show a positive effect of using style-transfer augmentation technique. Our analysis is aimed as a step...
-
Electrochemical glucose sensor based on the glucose oxidase entrapped in chitosan immobilized onto laser-processed Au-Ti electrode
PublikacjaThe study on novel electrode material composed of structured titanium foil with embedded Au nanoparticles and modified with chitosan with entrapped glucose oxidase is presented. To confirm the successful immobilization of glucose oxidase FT-IR analysis was performed. The response of electrodes were tested towards glucose in the presence of different interference compounds and biological fluids. The prepared material exhibits excellent...
-
An experimental study of self-sensing concrete enhanced with multi-wall carbon nanotubes in wedge splitting test and DIC
PublikacjaConcrete is the worldwide most utilized construction material because of its very good performance, forming ability, long-term durability, and low costs. Concrete is a brittle material prone to cracking. Extensive cracking may impact durability and performance over time considerably. The addition of a small amount of carbon nanotubes (CNT) increases the concrete’s overall electrical conductivity, enabling internal structure...
-
Dopants and gas modifiers in ion mobility spectrometry
PublikacjaThe ion mobility techniques, including the most commonly used drift-tube ion mobility spectrometry (IMS) and differential mobility spectrometry (DMS), are used successfully for the detection of a wide range of organic compounds in the gas phase. In order to improve detection quality, admixtures are added to gas streams flowing through the detector. Dopants mostly prevent the ionization of interfering chemicals however, better detection...
-
New procedure for the examination of the degradation of volatile organonitrogen compounds during the treatment of industrial effluents
PublikacjaWe present a new procedure for the determination of 32 volatile organonitrogen compounds in samples of industrial effluents with a complex matrix. The procedure, based on dispersive liquid–liquid microex-traction followed by gas chromatography with nitrogen-phosphorus and mass spectrometric detection, wasoptimized and validated. Optimization of the extraction included the type of extraction and disperser sol-vent, disperser solvent...
-
Dongdong Liu Ph.D.
OsobyHis research interests include traffic organization, abnormal detection, fundamental study of traffic flow on the sea, ship collision avoidance, and collision risk assessment.