Filtry
wszystkich: 9004
-
Katalog
- Publikacje 6149 wyników po odfiltrowaniu
- Czasopisma 751 wyników po odfiltrowaniu
- Konferencje 363 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 506 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 25 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 3 wyników po odfiltrowaniu
- Kursy Online 325 wyników po odfiltrowaniu
- Wydarzenia 11 wyników po odfiltrowaniu
- Dane Badawcze 867 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: safety of computer systems
-
Innovative method for utilization of wastewater for security and safety in rural areas
PublikacjaIn the rural areas building of sewerage systems and central wastewater treatment plants (WWTPs) often brings too high costs, due to high distances from one farm to another and terrain configuration. Individual treatment systems for each farm are a good solution. The teratment wetlands for nine individual farms were constructed in Kaszubian Lake District in summer and autumn 2009. Three configurations of reed beds were chosen. In...
-
Assessing the Effects of the Road Surface and Weather Conditions on Road Safety
PublikacjaWhen transport is analysed for its safe delivery the focus is mainly on assessing the safety of roads and the risk of undesired events. These include road accidents, an occurrence which is relatively rare and random. Randomness means that accidents depend on several factors which are partly deterministic (can be controlled) and partly stochastic (random and unpredictable). The set of crash contributing factors can be classified...
-
Periodic Solutions of Generalized Lagrangian Systems with Small Perturbations
PublikacjaIn this paper we study the generalized Lagrangian system with a small perturbation. We assume the main term in the system to have a maximum, but do not suppose any condition for perturbation term. Then we prove the existence of a periodic solution via Ekeland’s principle. Moreover, we prove a convergence theorem for periodic solutions of perturbed systems.
-
A CONTEXT IN RECOMMENDER SYSTEMS
PublikacjaRecommender systems aim to propose potentially interesting items to a user based on his preferences or previous interaction with the system. In the last decade, researcher found out that known recommendation techniques are not sufficient to predict user decisions. It has been noticed that user preferences strongly depend on the context in which he currently is. This raises new challenges for the researchers such as how to obtain...
-
Roads safety programmes as an effective tool for developing system-based road safety policies
PublikacjaW sytuacji niskiego poziomu bezpieczeństwa ruchu drogowego w Polsce, dążąc do realizacji rekomendacji Unii Europejskiej, Polska przyjęła ambitny cel zmniejszenia liczby ofiar śmiertelnych wypadków drogowych o 50% w okresie 2003-2013. Osiągnięcie tego celu wymaga podjęcia skoordynowanych działań wskazanych we wcześniej przygotowanych programach bezpieczeństwa ruchu drogowego. W artykule scharakteryzowano przyjęte w tych programach...
-
Safety Qualification Process for an Autonomous Ship Prototype – a Goal-based Safety Case Approach
Publikacja -
Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA
PublikacjaVisual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...
-
Identifying the Effects of Selected Road and Roadside Parameters on Road Safety Using Geodetic Techniques
PublikacjaThe paper will present techniques that can be used to obtain data on road alignment and profile including the roadside. In-the-field and simulation studies have helped to develop mathematical models that integrate vehicle position data. The experiments were conducted in a virtual environment using the software ArcGIS that reflects the actual roadside conditions. The site tests were made using a purpose-built device which integrates...
-
Assessing vehicle restraint systems on horizontal curves
PublikacjaHorizontal curves, an element of road infrastructure, have a statistically high number of accidents. Considering that horizontal curves in the last ten years have had app. 10% of all road accidents representing app. 14% of all fatalities on Polish roads, the issue is serious and requires more research and proper road safety treatments. Data for 2007 - 2016 show that in the case of accidents on horizontal curves app. 45% of the...
-
Stress anisotropy characterisation with the help of Barkhausen effect detector with adjustable magnetic field direction
PublikacjaIn the paper we describe a novel apparatus for the measurement of the Barkhausen noise (BN) angular dependence, which in turn may be indicative of the stress induced anisotropy of magnetic properties. Such dependence can be further used for the stress distribution evaluation. The change of magnetization direction in the material is obtained by varying the magnetic flux density in two perpendicular yokes of the apparatus. We present...
-
Running performance of an aerodynamic journal bearing with squeeze film effect
PublikacjaResults of theoretical and experimental studies concerning the performance of an aerodynamic journal bearing of which running is assisted by squeeze film ultrasonic levitation (SFUL) are presented in this paper. The SFUL mechanism not only can separate journal from the bearing at the start and stop phases of operation but also can significantly contribute to the dynamic stability of the bearing when it runs at speed. Computer calculations...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Virtual reality technology in architectural education
PublikacjaContemporary virtual reality (VR) technology allows the recreation of non-existent architectural objects of which there may be no trace remaining. Virtual reality applications allow access to digital models, which visualise the lost architecture. The popularity of VR has resulted in it being applied not only to computer games, but also in visualising the past. Maps allow movement through historical trails and 3D models of architecture...
-
Overheating of underground power cable line due to its partial exposition to solar radiation
PublikacjaCurrent-carrying capacity of underground power cable lines depends, among others, on thermal resistivity of the soil and cables layout: trefoil formation, flat formation with or without spacing. If conditions for heat transfer in the ground are favorable, the current-carrying capacity is relatively high. Therefore, it generates risk of the power cables overheating, if part of the cable line is located vertically in the air, to...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Multimedia interface using head movements tracking
PublikacjaThe presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublikacjaModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
PERFORMANCE OF ENDOSCOPIC IMAGE ANALYSIS ALGORITHMS IN LARGE BOWEL VIDEOS PROCESSING
PublikacjaComputer-assisted endoscopy is a rapidly developing eld of study. Many image anal- ysis algorithms exist, achieving very high rates of eciency at processing single endoscopic images. However, most of them were never tested in processing real-life endoscopic videos. In the article such tests of 16 endoscopy image analysis algorithms are presented and dis- cussed. Tests were performed on two real-life endoscopic videos of a human...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Dynamic soil improvement by hybrid technologies
PublikacjaHybrid method of subsoil improvement for road embankment foundation is described. This method is composed of two wellknown methods: dynamic replacement (DR) and microblasting (DDC) one (Deep Dynamic Compaction). The method was used for both the strengthening of the fully saturated organic subsoil as well as for acceleration of the consolidation of the organic layers. The practice ensures the expected results. A proper example on...
-
Effect of plasma sprayed and laser re-melted Al2O3 coatings on hardness and wear properties of stainless steel
PublikacjaCommercially available austenic stainless steel substrate was coated with commercially available, raw Al2O3 powder applied by means of plasma spraying method and then re-melted with CO2 laser beam of various parameters. Tribological and mechanical properties of the 120 J/mm and 160 J/mm laser re-melted coatings were compared with the tribological and mechanical properties of the “as-sprayed” coating. The influence of the laser...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Algorytm kontroli jakości z elementami sterowania rozmytego dla elastycznie zautomatyzowanego wytwarzania.
PublikacjaPublikacja dotyczy struktury procesu produkcyjnego w środowisku komputerowo zintegrowanego wytwarzania (computer integrated manufacturing - CIM). Ukazuje ona aspekty kontroli jakości wykonania części na różnych etapach procesu wytwórczego, podkreślając jego istotność. W celu dokonania szczegółowej analizy problemu zebrano dane o jakości wykonania części na poszczególnych poziomach wytwarzania. Analizy dowiodły, że jakość wykonania...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublikacjaNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
Visualization of a lifeboat motion during lowering along ship’s side
PublikacjaThis paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublikacjaA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
Role of research and development in internationalization of high-tech firms: Empirical results from Poland
PublikacjaThe article focuses on the significance of research and development (R&D) in driving the internationalization of Polish high-tech firms. R&D is essential for businesses to remain competitive and adapt their products to the specific requirements of different markets. The study aims to investigate the relationship between R&D and the internationalization process of high-tech firms based in Poland, with a focus on the innovation context....
-
Computational methods for calculation of binding free energy for ligand-receptor complexes
PublikacjaAccurate description of the molecular complexes energetic influence is required for understanding of many biological functions carried out by proteins. Therefore, estimation of binding free energy for ligand-receptor complexes is of highest importance for structure-based ligand design and drug discovery approaches.Experimental methods of determination of difference in Gibbs'es free energy have many limitations. Thus, computational...
-
Intra-subject class-incremental deep learning approach for EEG-based imagined speech recognition
PublikacjaBrain–computer interfaces (BCIs) aim to decode brain signals and transform them into commands for device operation. The present study aimed to decode the brain activity during imagined speech. The BCI must identify imagined words within a given vocabulary and thus perform the requested action. A possible scenario when using this approach is the gradual addition of new words to the vocabulary using incremental learning methods....
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublikacjaIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Proposed method for estimating the costs of safety barrier life cycle
PublikacjaToday barrier types are frequently selected for their price with little regard for the total costs the structure will incur over its lifetime. One of the basic tools designed to manage road infrastructure is the life cycle cost method (LCC, Life cycle cost). It sums up the costs to plan, design, build, operate (use and maintain) and decommission a road structure. Having developed dynamically at the turn of the century the method...
-
Editorial: Applied intelligence and knowledge based systems: approaches and case studies - part 2
PublikacjaWydanie Cybernetics and Systems poswiecone zagadnieniom zarzadzania wiedza.
-
Cognitive memory for intelligent systems of decision-making, based on human psychology
PublikacjaA model of memory, which allows to expand the functionality of autonomous decision-making systems for robotic and human-system-interface purposes, is discussed. The model provides functions and features which make the prospective robotic and interfacing systems more human-like as well as more efficient in solving interactive issues.
-
Computer Aided Design - 2022/23
Kursy Online -
Human Computer Interaction 2018/19
Kursy Online -
Computer Aided Design 23/24
Kursy Online -
Computer Networks - lectures 2024/2025
Kursy OnlineStudent uczy się: jak mówić o sieciach komputerowych - poznaje podstawowe pojęcia (np. protokół komunikacyjny), ich znaczenie i związki; jak sieci komuterowe są zbudowane i wykorzystywne - uczy się podstaw działania sieci (np. komutacja pakietów) i architektury sieci (np. płaszczyzny sieci) oraz poznaje podstawowe technologie sieciowe (np. protokół IP); jak sieci komputerowe ewoluują - poznaje historię rozwoju sieci, ewolucję wymagań,...
-
History-based dynamic weight voting for multi-agent systems
PublikacjaTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
Abstract class method use on common characteristics of UE regions for better road safety management in these regions.
PublikacjaRoad Safety is the significant problem requiring still a lot of attention. Despite lots of actions for road fatalities reduction, in many countries or regions situation doesn't improve as good as in the other cases. Even if these actions are very similar. It is so difficult issue, that the answer why is that happens hasn't been found yet. In this paper authors focused on the road network of European regions, classified as NUTS...
-
Road safety system in Poland
PublikacjaCelem niniejszego artykułu jest przedstawienie kluczowych dla poprawy brd elementów diagnozy stanu i systemu bezpieczeństwa w Polsce, które jednocześnie mogłyby wejść w zakres działań objętych Projektem ZEUS. Ocenę diagnozy wykonano poprzez porównanie z wzorcami z tych krajów, które od lat uważa się za liderów w zakresie bezpieczeństwa.
-
Integrated system of transport safety
PublikacjaW styczniu 2007 Minister Nauki i Szkolnictwa Wyższego, na podstawie konkursu na projekt badawczy zamawiany PBZ 2/2006, podjął decyzję o przyznaniu prawa realizacji trzyletniego projektu pt. ''Zintegrowany system bezpieczeństwa transportu'' konsorcjum naukowemu w składzie: Politechnika Gdańska, Politechnika Śląska, Instytut Techniczny Wojsk Lotniczych w Warszawie oraz Akademia Morska w Szczecinie. Przedmiotem niniejszego referatu...
-
Traffic Safety in the TRISTAR System
Publikacja -
Electrical safety in medical locations
PublikacjaW artykule zwrócono uwagę na niezawodność zasilania i ochronę przeciwporażeniową w pomieszczeniach użytkowanych medycznie. Przedstawiono wymagania stawiane zasilaniu, zabezpieczeniom i obwodom sygnalizacji w tych pomieszczeniach, według norm międzynarodowych. Zaprezentowano zasady doboru zabezpieczeń ochronnych oraz przykładowe rozwiązanie zasilania sali operacyjnej w szpitalu.
-
Opportunities and challenges for exploiting drones in agile manufacturing systems
PublikacjaDrones have become an advanced supply chain implementation instrument, especially in connecting warehouses to outlet points or even individual customers. However, their potential application in an intra-logistics framework has not been studied, let alone explored so far. Modeling and simulations in virtual environments can help explore and evaluate the opportunities for practical and profitable applications of drones in manufacturing...
-
Implementation of failover and load balancing algorithms in SIP PBX High Availability system
PublikacjaGoal of the project was to design a High Availability SIP VoIP system that guarantees access to additional services like auto-attendent and automatic call distribution. The realization of the project required system to have load balancing and failover algorithms implemented. From the end users’ point of view the whole system had to figure as a single element. After taking under consideration the known methods of implementations...
-
Segmentation-Based BI-RADS ensemble classification of breast tumours in ultrasound images
PublikacjaBackground: The development of computer-aided diagnosis systems in breast cancer imaging is exponential. Since 2016, 81 papers have described the automated segmentation of breast lesions in ultrasound images using arti- ficial intelligence. However, only two papers have dealt with complex BI-RADS classifications. Purpose: This study addresses the automatic classification of breast lesions into binary classes (benign vs. ma- lignant)...
-
Towards the development of a system-theoretic model for safety assessment of autonomous merchant vessels
Publikacja -
Studying road restraint systems to develop new guidelines
PublikacjaThe paper will present a proposed approach to such work along with preliminary results of numerical studies for selected problems using road safety devices such as safety barriers on horizontal curves, the effect of kerbs on bridges or the location of obstacles within the barrier’s working width. The paper will discuss assumptions to a methodology of numerical models, calculations and automated processing of data to help with assessing...
-
Path integrals formulations leading to propagator evaluation for coupled linear physics in large geometric models
PublikacjaReformulating linear physics using second kind Fredholm equations is very standard practice. One of the straightforward consequences is that the resulting integrals can be expanded (when the Neumann expansion converges) and probabilized, leading to path statistics and Monte Carlo estimations. An essential feature of these algorithms is that they also allow to estimate propagators for all types of sources, including initial conditions....