Wyniki wyszukiwania dla: computer-aided sperm analysis - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: computer-aided sperm analysis

Wyniki wyszukiwania dla: computer-aided sperm analysis

  • KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO

    Publikacja

    Problematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...

  • POSSIBILITIES OF ELECTRICAL ENERGY GENERATION IN PHOTOVOLTAIC SYSTEMS INSTALLED IN CENTRAL EUROPE

    Publikacja

    - Rok 2013

    Nowadays, fossil fuels are the main sources of energy from which electricity is obtained. But these sources will not last forever, so in due course renewable energies will have to replace them in this role. One of these new sources is solar energy. To generate electricity from sunlight, solar (photovoltaic - PV) cells and modules are used. The increasing interest in PV cells and modules worldwide is due mainly to the fact that...

  • Voice command recognition using hybrid genetic algorithm

    Publikacja

    Abstract: Speech recognition is a process of converting the acoustic signal into a set of words, whereas voice command recognition consists in the correct identification of voice commands, usually single words. Voice command recognition systems are widely used in the military, control systems, electronic devices, such as cellular phones, or by people with disabilities (e.g., for controlling a wheelchair or operating a computer...

    Pełny tekst do pobrania w portalu

  • System of monitoring of the Forest Opera in Sopot structure and roofing

    The authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publikacja

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Rok 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Engineering and Management of Space Systems (EMSS) - an international joint Master's double-degree program

    Publikacja

    Dynamic development of the space sector of European, and especially of Polish and German economies results in a necessity for suitable Higher Education Institution graduates. The increasing digitization, distribution and networking of technical systems leads to the necessity of a degree programme teaching “the systems view” and “interdisciplinarity” methods and skills. Furthermore, it is necessary to consider the entire life cycle...

    Pełny tekst do pobrania w portalu

  • Orken Mamyrbayev Professor

    Osoby

    1.  Education: Higher. In 2001, graduated from the Abay Almaty State University (now Abay Kazakh National Pedagogical University), in the specialty: Computer science and computerization manager. 2.  Academic degree: Ph.D. in the specialty "6D070300-Information systems". The dissertation was defended in 2014 on the topic: "Kazakh soileulerin tanudyn kupmodaldy zhuyesin kuru". Under my supervision, 16 masters, 1 dissertation...

  • Rola i znaczenie zbiornika sieciowego w kształtowaniu hydrauliki i jakości wody w systemie wodociągowym

    Publikacja

    - Rok 2012

    Eksploatacja zbiornika sieciowego powinna zapewniać cykliczną wymianę wody w jego komorach. Koniecznym warunkiem prawidłowej eksploatacji zbiornika jest zgodność założeń projektowych ze stanem faktycznym. Praktyka eksploatacyjna wskazuje na szereg nieprawidłowości w tym względzie. Z powodu lokalizacji zbiornika sieciowego za nisko lub za wysoko albo wskutek błędów popełnionych w ustaleniu jego parametrów obserwuje się niestabilność...

  • Wyróżniki modelu biznesu przedsiębiorstwa inteligentnego

    Publikacja

    - Rok 2016

    Burzliwa zmiana środowiska biznesowego wpływa na ludzi tak, że generują oczekiwania na wyroby i usługi zaspokajające ich dotychczasowe i nowe potrzeby w coraz większym stopniu. W ten sposób przed menedżerami powstają wciąż nowe, bardziej skomplikowane i wysublimowane wymagania. W takich uwarunkowaniach prowadzenia biznesu sukces osiąga to przedsiębiorstwo, które jest inteligentne. W takiej perspektywie celem badań było wyłonienie...

  • Usability of Mobile Applications: A Consolidated Model

    Publikacja

    - IEEE Access - Rok 2024

    Mobile devices have become an integral part of the digital ecosystem, connecting people, businesses, and information around the world in ways never before possible. In particular, smartphones, tablets and other handheld devices equipped with mobile applications have changed every aspect of our lives. Today, a user can choose from nearly five million applications available for both Android and iOS operating systems. However, only...

    Pełny tekst do pobrania w portalu

  • Can augmented democracy fulfil the ideal of deliberative democracy?

    Publikacja

    - Rok 2023

    New technologies can broaden the scope of human limits. We can fly to the moon thanks to rocket science, we can communicate with each other by mobile phones and WiFi and we can exceed human life with medical equipment like pacemakers. But there are aspects of our life that still are very distrustful of implementing new technology into functioning. An example of such a field of our everyday life is...

    Pełny tekst do pobrania w portalu

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publikacja

    - Rok 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...