Filtry
wszystkich: 412
Wyniki wyszukiwania dla: computer-aided sperm analysis
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublikacjaProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
POSSIBILITIES OF ELECTRICAL ENERGY GENERATION IN PHOTOVOLTAIC SYSTEMS INSTALLED IN CENTRAL EUROPE
PublikacjaNowadays, fossil fuels are the main sources of energy from which electricity is obtained. But these sources will not last forever, so in due course renewable energies will have to replace them in this role. One of these new sources is solar energy. To generate electricity from sunlight, solar (photovoltaic - PV) cells and modules are used. The increasing interest in PV cells and modules worldwide is due mainly to the fact that...
-
Voice command recognition using hybrid genetic algorithm
PublikacjaAbstract: Speech recognition is a process of converting the acoustic signal into a set of words, whereas voice command recognition consists in the correct identification of voice commands, usually single words. Voice command recognition systems are widely used in the military, control systems, electronic devices, such as cellular phones, or by people with disabilities (e.g., for controlling a wheelchair or operating a computer...
-
System of monitoring of the Forest Opera in Sopot structure and roofing
PublikacjaThe authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Engineering and Management of Space Systems (EMSS) - an international joint Master's double-degree program
PublikacjaDynamic development of the space sector of European, and especially of Polish and German economies results in a necessity for suitable Higher Education Institution graduates. The increasing digitization, distribution and networking of technical systems leads to the necessity of a degree programme teaching “the systems view” and “interdisciplinarity” methods and skills. Furthermore, it is necessary to consider the entire life cycle...
-
Orken Mamyrbayev Professor
Osoby1. Education: Higher. In 2001, graduated from the Abay Almaty State University (now Abay Kazakh National Pedagogical University), in the specialty: Computer science and computerization manager. 2. Academic degree: Ph.D. in the specialty "6D070300-Information systems". The dissertation was defended in 2014 on the topic: "Kazakh soileulerin tanudyn kupmodaldy zhuyesin kuru". Under my supervision, 16 masters, 1 dissertation...
-
Rola i znaczenie zbiornika sieciowego w kształtowaniu hydrauliki i jakości wody w systemie wodociągowym
PublikacjaEksploatacja zbiornika sieciowego powinna zapewniać cykliczną wymianę wody w jego komorach. Koniecznym warunkiem prawidłowej eksploatacji zbiornika jest zgodność założeń projektowych ze stanem faktycznym. Praktyka eksploatacyjna wskazuje na szereg nieprawidłowości w tym względzie. Z powodu lokalizacji zbiornika sieciowego za nisko lub za wysoko albo wskutek błędów popełnionych w ustaleniu jego parametrów obserwuje się niestabilność...
-
Wyróżniki modelu biznesu przedsiębiorstwa inteligentnego
PublikacjaBurzliwa zmiana środowiska biznesowego wpływa na ludzi tak, że generują oczekiwania na wyroby i usługi zaspokajające ich dotychczasowe i nowe potrzeby w coraz większym stopniu. W ten sposób przed menedżerami powstają wciąż nowe, bardziej skomplikowane i wysublimowane wymagania. W takich uwarunkowaniach prowadzenia biznesu sukces osiąga to przedsiębiorstwo, które jest inteligentne. W takiej perspektywie celem badań było wyłonienie...
-
Usability of Mobile Applications: A Consolidated Model
PublikacjaMobile devices have become an integral part of the digital ecosystem, connecting people, businesses, and information around the world in ways never before possible. In particular, smartphones, tablets and other handheld devices equipped with mobile applications have changed every aspect of our lives. Today, a user can choose from nearly five million applications available for both Android and iOS operating systems. However, only...
-
Can augmented democracy fulfil the ideal of deliberative democracy?
PublikacjaNew technologies can broaden the scope of human limits. We can fly to the moon thanks to rocket science, we can communicate with each other by mobile phones and WiFi and we can exceed human life with medical equipment like pacemakers. But there are aspects of our life that still are very distrustful of implementing new technology into functioning. An example of such a field of our everyday life is...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...