Filtry
wszystkich: 3513
-
Katalog
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: Algorithm of DOA detection
-
Towards bees detection on images: study of different color models for neural networks
PublikacjaThis paper presents an approach to bee detection in videostreams using a neural network classifier. We describe the motivationfor our research and the methodology of data acquisition. The maincontribution to this work is a comparison of different color models usedas an input format for a feedforward convolutional architecture appliedto bee detection. The detection process has is based on a neural...
-
Sensorless algorithm for sustaining controllability of IPMSM drive in electric vehicle after resolver fault
PublikacjaThis paper presents a sensorless algorithm designated for the emergency control of an interior permanent magnet synchronous motor (IPMSM) drive in electric or hybrid vehicle. The algorithm is based on analysing the derivatives of motor phase currents measured over the duration of particular inverter states. The method is computationally simple and does not require additional hardware since the derivatives are measured indirectly....
-
An Optimal Power Point Tracking Algorithm in a Solar PV Generation System
PublikacjaThe non-linearity in I-V characteristics of a PV panel requires to be operated at knee point to extract maximum power. In order to operate the panel at optimal point, maximum power point tracking (MPPT) algorithm is employed in the control structure. The main objective of MPP tracking is to keep the operation at knee point of I-V characteristics under varying condition of temperature and solar insolation. Under non uniform solar...
-
Detection of Toxoplasma gondii oocysts in environmental samples
PublikacjaToxoplasma gondii is an obligate intracellular parasite that has capacity to infect warm-blooded animals. Human toxoplasmosis is usually asymptomatic, whereas severe complications may occur in immunocompromised patients (e.g. AIDS) or in case of congenitalinfection. One of the sources of acquiring human toxoplasmosis is ingestion of T. gondii oocysts. It is known that newly infected cats can shed millions of oocysts into the environment,...
-
Quantum randomness protected against detection loophole attacks
PublikacjaDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Time-current tripping curves of arc fault detection devices
PublikacjaTripping curves of arc fault detection devices, in accordance with PN-EN 62606 “General requirements for arc fault detection devices” have been presented in the paper. Consequently the most fundamental differences in arc fault detection devices tripping compared to circuit-breakers and residual current devices have been indicated.
-
Detection of Toxoplasma gondii in meat - available techniques
PublikacjaToxoplasma gondii, which belongs to the phylum Apicomplexa, is an absolute intercellular parasite that infects a wide range of hosts, including warm-blooded animals and humans. An infection with this parasite causes toxoplasmosis, which in most cases remains latent. However, this disease is a major threat to immunocompromised people and pregnant women. In extreme cases, it can damage nervous system or case fatal abortion. Infected...
-
Improved magnitude estimation of complex numbers using alpha max and beta min algorithm
PublikacjaThe paper presents an improved algorithm for calculating the magnitude of complex numbers. This problem, which is a special case of square rooting, occurs for example, in FFT processors and complex FIR filters. The proposed method of magnitude calculation makes use of the modified alpha max and beta min algorithm. The improved version of the algorithm allows to control the maximum magnitude approximation error by using an adequate...
-
Updating the Coupling Algorithm between HYDRUS and MODFLOW in the HYDRUS Package for MODFLOW
PublikacjaThe HYDRUS-based flow package for MODFLOW (the HPM or the HYDRUS package) is an existing unsaturated zone flow package for MODFLOW. In MODFLOW with the HPM, the groundwater modeling domain is discretized into regular grids that can be combined into multiple zones based on similarities in soil hydrology, topographical characteristics, and the depth to the groundwater. Each of these zones is assigned one unsaturated soil profile...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
PublikacjaThe underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...
-
Interference aware Bluetooth scatternet (Re)configuration algorithm IBLUEREA
PublikacjaThe paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth (BT) scatternet to reduce mutual interferences between BT and Wi-Fi (IEEE 802.11b) networks operating on the same area. IBLUEREA makes use of proposed procedure for modelling ISM environment around a given BT scatternet. The mechanism is based on estimation of the probabilities of successful (unsuccessful) frame transmissions. This determination...
-
Central heating temperature control algorithm for systems with condensing boilers
PublikacjaThe problem of control of a central heating system in a small residence is considered. It is assumed that the system is based on a condensing boiler. Since the boiler efficiency depends on a returning water temperature, the proposed control goal is to provide proper air temperature in the residence as well as the lowest possible water temperature. The proposed algorithm is applied to two buildings. Both of them have the same heating...
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublikacjaResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Detection of the Direct Sequence Spread Spectrum Signals with BPSK Modulation
PublikacjaThis paper presents a method of the DS CDMA signals with BPSK modulation detection through the examination of the enhanced signal spectrum density. On the base of experiments carried out on the real radio communication signals the impact of a narrowband emission occurring in the examined frequency band on the detection process effectiveness was shown. The results of the experiment aimed at the detection of the satellite navigation...
-
The chapter analyses the K-Means algorithm in its parallel setting. We provide detailed description of the algorithm as well as the way we paralellize the computations. We identified complexity of the particular steps of the algorithm that allows us to build the algorithm model in MERPSYS system. The simulations with the MERPSYS have been performed for different size of the data as well as for different number of the processors used for the computations. The results we got using the model have been compared to the results obtained from real computational environment.
PublikacjaThe chapter analyses the K-Means algorithm in its parallel setting. We provide detailed description of the algorithm as well as the way we paralellize the computations. We identified complexity of the particular steps of the algorithm that allows us to build the algorithm model in MERPSYS system. The simulations with the MERPSYS have been performed for different size of the data as well as for different number of the processors used...
-
Comparison of Single and Multi-Population Evolutionary Algorithm for Path Planning in Navigation Situation
PublikacjaIn this paper a comparison of single and multi-population evolutionary algorithm is presented. Tested algorithms are used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of single-population and multi-population evolutionary algorithm is described....
-
Emerging strategies for enhancing detection of explosives by artificial olfaction
PublikacjaExplosives detection systems need to be able to reliably detect a wide range of explosive materials and their vapours. The continued development and improvement of artificial olfaction techniques, including electronic nose (EN), remains important to overcome existing challenges and meet requirements posed by new improvements in the field of explosives. There is an increasingly popular trend aimed at improvement of fundamental metrological...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publikacja. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Evaluating the Use of Edge Device Towards Fall Detection in Smart City Environment
PublikacjaThis paper presents the development and preliminary testing of a fall detection algorithm that leverages OpenPose for real-time human pose estimation from video feeds. The system is designed to function optimally within a range of up to 7 meters from ground-level cameras, focusing exclusively on detected human silhouettes to enhance processing efficiency. The performance of the proposed approach was evaluated using accuracy values...
-
Path planning algorithm for ship collisions avoidance in environment with changing strategy of dynamic obstacles
PublikacjaIn this paper a path planning algorithm for the ship collision avoidance is presented. Tested algorithm is used to determine close to optimal ship paths taking into account changing strategy of dynamic obstacles. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of evolutionary algorithm and based on it dedicated application...
-
APPLICATION OF APRIORI ALGORITHM IN THE LAMINATION PROCESS IN YACHT PRODUCTION
PublikacjaThe article specifies the dependence of defects occurring in the lamination process in the production of yachts. Despite great knowledge about their genesis, they cannot be completely eliminated. Authentic data obtained through cooperation with one of the Polish yacht shipyards during the years 2013–2017 were used for the analysis. To perform a simulation, the sample size was observed in 1450 samples, consisting of 6 models of...
-
Prediction based on integration of Decisional DNA and a feature selection algorithm Relief-F
PublikacjaThe paper presents prediction model based on Decisional DNA and Set of experienced integrated with Relief_F algorithm for feature selection
-
Optical-Spectrometry-Based Method for Immunosuppressant Medicine Level Detection in Aqueous Solutions
PublikacjaIn this paper, an investigation into detecting immunosuppressive medicine in aqueous solutions using a spectrometry-based technique is described. Using optical transmissive spectrometry, absorbance measurements in the spectra range from 250 nm to 1000 nm were carried out for different cyclosporine A (CsA) concentrations in aqueous solutions. The experiment was conducted for samples both with and without interferent substances—glucose...
-
Application of the Monte Carlo algorithm for solving volume integral equation in light scattering simulations
PublikacjaVarious numerical methods were proposed for analysis of the light scattering phenomenon. Important group of these methods is based on solving the volume integral equation describing the light scattering process. The popular method from this group is the discrete dipole approximation (DDA). DDA uses various numerical algorithms to solve the discretized integral equation. In the recent years, the application of the Monte Carlo (MC)...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Camera Orientation-Independent Parking Events Detection
PublikacjaThe paper describes the method for detecting precise position and time of vehicles parking in a parking lot. This task is trivial in case of favorable camera orientation but gets much more complex when an angle between the camera viewing axis and the ground is small. The method utilizes background subtraction and object tracking algorithms for detecting moving objects in a video stream. Objects are classified into vehicles and...
-
EFFICIENT LINE DETECTION METHOD BASED ON 2D CONVOLUTION FILTER
PublikacjaThe article proposes an efficient line detection method using a 2D convolution filter. The proposed method was compared with the Hough transform, the most popular method of straight lines detection. The developed method is suitable for local detection of straight lines with a slope from -45˚ to 45˚. Also, it can be used for curve detection which shape is approximated with the short straight sections. The new method is characterized...
-
Non-Least Square GNSS Positioning Algorithm for Densely Urbanized Areas
PublikacjaThe paper introduces an essentially new algorithm for calculating the GNSS position as an alternative to the least-square method. The proposed approach can be widely applied to any positioning method that uses multiple position lines for position calculation and is an example ofhow using a numerical solution can improve position accuracy without access to historical data. In essence, the method is based on the adaptation of the...
-
Implementation of the FOPID Algorithm in the PLC Controller - PWR Thermal Power Control Case Study
PublikacjaIn the paper authors describe proposition of design and verification procedures of the discrete Fractional Order PID (FOPID) algorithm for control of the Pressurized Water Reactor (PWR) thermal power near its nominal operating point. The FOPID algorithm synthesis consists of: off-line optimal tunning of its parameters in continuous time-domain with LQ (Linear Quadratic) performance index and simplified models of nuclear reactor...
-
Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing
PublikacjaIn this article authors present an application of spatial processing methods for GPS spoofing detection and mitigation. In the first part of this article, a spoofing detection method, based on phase delay measurements, is proposed. Accuracy and precision of phase delay estimation is assessed for various qualities of received signal. Spoofing detection thresholds are determined. Efficiency of this method is evaluated in terms of...
-
An Improvement of Global Complex Roots and Poles Finding Algorithm for Propagation and Radiation Problems
PublikacjaAn improvement of the recently developed global roots finding algorithm has been proposed. The modification allows to shorten the computational time by reducing the number of function calls. Moreover, both versions of the algorithms (standard and modified) have been tested for numerically defined functions obtained from spectral domain approach and field matching method. The tests have been performed for three simple microwave...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Reinforcement Learning Algorithm and FDTD-based Simulation Applied to Schroeder Diffuser Design Optimization
PublikacjaThe aim of this paper is to propose a novel approach to the algorithmic design of Schroeder acoustic diffusers employing a deep learning optimization algorithm and a fitness function based on a computer simulation of the propagation of acoustic waves. The deep learning method employed for the research is a deep policy gradient algorithm. It is used as a tool for carrying out a sequential optimization process the goal of which is...
-
Numerically efficient algorithm for compact microwave device optimization with flexible sensitivity updating scheme
PublikacjaAn efficient trust-region algorithm with flexible sensitivity updating management scheme for electromagnetic (EM)-driven design optimization of compact microwave components is proposed. During the optimization process, updating of selected columns of the circuit response Jacobian is performed using a rank-one Broyden formula (BF) replacing finite differentiation (FD). The FD update is omitted for directions sufficiently well aligned...
-
An optimal sliding mode control based on immune-wavelet algorithm for underwater robotic manipulator
PublikacjaIn this paper, a robust optimal Sliding Mode Controller (SMC) based on new algorithm of Artificial Immune System (AIS) is proposed for trajectory tracking of underwater manipulators. A new AIS algorithm is used to derive optimal values of surface parameters and boundary layer thickness in SMC with considering minimum torques and error. Surface parameters and boundary layer thickness are considered as antibody in AIS and Morlet...
-
The Influence of Global Corrosion Degradation on Localized Damage Detection Using Guided Waves
PublikacjaThis paper presents the results of a numerical analysis of the influence of corrosion degradation of metal plates on the wave propagation phenomenon. There are several different corrosion types, but general and pitting corrosion are the most common. General corrosion is more or less uniformly distributed over the entire exposed surface of the metal while pitting corrosion takes the form of localized cracks. Because the general...
-
Driver fatigue detection method based on facial image analysis
PublikacjaNowadays, ensuring road safety is a crucial issue that demands continuous development and measures to minimize the risk of accidents. This paper presents the development of a driver fatigue detection method based on the analysis of facial images. To monitor the driver's condition in real-time, a video camera was used. The method of detection is based on analyzing facial features related to the mouth area and eyes, such as...
-
Things You Might Not Know about the k-Nearest Neighbors Algorithm
PublikacjaRecommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...
-
Automatic detection of abandoned luggage employing a dual camera system
PublikacjaA system for automatic detection of events using a system of fixed and PTZ (pan-tilt-zoom) cameras is described. Images from the fixed camera are analyzed by means of object detection and tracking. Event detection system uses a set of rules to analyze data on the tracked moving objects and to detect defined events. A PTZ camera is used to obtain a detailed view of a selected object. A procedure for conversion between the pixel...
-
The choice of parameters of induction motor model using a genetic algorithm.
PublikacjaRozważano problem doboru parametrów modeli matematycznych dużych 3 -fazowych silników indukcyjnych. Modele o prawidłowo dobranych parametrach mogą być pomocne podczas procedur projektowych. Podane silniki mogą być używane jako napędy sterów strumieniowych statków. Symulacje w środowisku Matlab, uwzględniają modele statyczne silników. Parametry silników dobierane są za pomocą przybornika Genetic Algorithm Toolbox. Skuteczność metody...
-
Evolutional algorithm in stock control
Publikacja -
Application of RMS for damage detection by guided elastic waves
PublikacjaThis paper presents certain results of an experimental study related with a damage detection in structural elements based on deviations in guided elastic wave propagation patterns.
-
Mask Detection and Classification in Thermal Face Images
PublikacjaFace masks are recommended to reduce the transmission of many viruses, especially SARS-CoV-2. Therefore, the automatic detection of whether there is a mask on the face, what type of mask is worn, and how it is worn is an important research topic. In this work, the use of thermal imaging was considered to analyze the possibility of detecting (localizing) a mask on the face, as well as to check whether it is possible to classify...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublikacjaThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Self-Adaptive Mesh Generator for Global Complex Roots and Poles Finding Algorithm
PublikacjaIn any global method of searching for roots and poles, increasing the number of samples increases the chances of finding them precisely in a given area. However, the global complex roots and poles finding algorithm (GRPF) (as one of the few) has direct control over the accuracy of the results. In addition, this algorithm has a simple condition for finding all roots and poles in a given area: it only requires a sufficiently dense...
-
Constant-Factor Approximation Algorithm for Binary Search in Trees with Monotonic Query Times
PublikacjaWe consider a generalization of binary search in linear orders to the domain of weighted trees. The goal is to design an adaptive search strategy whose aim is to locate an unknown target vertex of a given tree. Each query to a vertex v incurs a non-negative cost ω(v) (that can be interpreted as the duration of the query) and returns a feedback that either v is the target or the edge incident to v is given that is on the path towards...
-
Automated detection of sleep apnea and hypopnea events based on robust airflow envelope tracking
PublikacjaThe paper presents a new approach to detection of apnea/hypopnea events, in the presence of artifacts and breathing irregularities, from a single-channel airflow record. The proposed algorithm identifies segments of signal affected by a high amplitude modulation corresponding to apnea/hypopnea events. It is shown that a robust airflow envelope—free of breathing artifacts—improves effectiveness of the diagnostic process and allows...
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publikacjagenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...