Wyniki wyszukiwania dla: SEQUENCE%20MINING%20WEB%20USAGE - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SEQUENCE%20MINING%20WEB%20USAGE

Wyniki wyszukiwania dla: SEQUENCE%20MINING%20WEB%20USAGE

  • Asymmetric Renyi Problem and > PATRICIA Tries

    Publikacja

    - Rok 2016

    In 1960 R´enyi asked for the number of random queries necessary to recover a hidden bijective labeling of n distinct objects. In each query one selects a random subset of labels and asks, what is the set of objects that have theselabels? Weconsider here anasymmetric version of the problem in which in every query an object is chosenwith probability p > 1/2 and we ignore “inconclusive” queries. We study the number of queries needed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Sequential treatment of landfill leachate by electrocoagulation/aeration, PMS/ZVI/UV and electro-Fenton: Performance, biodegradability and toxicity studies

    Publikacja

    - JOURNAL OF ENVIRONMENTAL MANAGEMENT - Rok 2023

    This study presents a systematic study on sequential treatment of highly resistant landfill leachate by electrocoagulation (EC)/aeration, sulfate radical advanced oxidation process (SR-AOP) and electro-Fenton (EF). In case of SR-AOP, peroxymonosulfate (PMS) catalyzed by zero valent iron (ZVI) and ultraviolet irradiation (UV) system was developed. Treatment process was optimized in respect to COD removal. Analysis of results revealed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Subjective Quality Evaluation of Underground BPL-PLC Voice Communication System

    Publikacja

    - Rok 2020

    Designing a reliable voice transmission system is not a trivial task. Wired media, thanks to their resistance to mechanical damage, seem an ideal solution. The BPL-PLC (Broadband over Power Line – Power Line Communication) cable is resilient to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency situation, including paramedic rescue operations. These features...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine

    Publikacja

    In order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...

    Pełny tekst do pobrania w portalu

  • Selection of Organic Coating Systems for Corrosion Protection of Industrial Equipment

    Publikacja

    - Coatings - Rok 2022

    The most important element of corrosion protection in industrial conditions is the protective coating system. However, selecting the right coating can often be a real problem due to the sheer number of coating manufacturers and their products on the market. A quantitative approach based on the data mining technique used to analyze the obtained multi-site exposure data has been proposed. This was demonstrated by the example of the...

    Pełny tekst do pobrania w portalu

  • Machine Learning Techniques in Concrete Mix Design

    Concrete mix design is a complex and multistage process in which we try to find the best composition of ingredients to create good performing concrete. In contemporary literature, as well as in state-of-the-art corporate practice, there are some methods of concrete mix design, from which the most popular are methods derived from The Three Equation Method. One of the most important features of concrete is compressive strength, which...

    Pełny tekst do pobrania w portalu

  • Evaluation of a company’s image on social media using the Net Sentiment Rate

    Publikacja

    - Rok 2020

    Vast amounts of new types of data are constantly being created as a result of dynamic digitization in all areas of our lives. One of the most important and valuable categories for business is data from social networks such as Facebook. Feedback resulting from the sharing of thoughts and emotions, expressed in comments on various products and services, is becoming the key factor on which modern business is based. This feedback is...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Prototype of a low-cost luxmeter with wide measuring range designed for railway stations dynamic lighting systems

    Publikacja

    - Rok 2014

    The paper presents the development of a low-cost luxmeter designed for usage in automatic applications for continual (long-term) measurement of illuminance. The measured information is used to adjust the level of lighting systems of artificial lighting on railways (platforms, marshalling yard, tracks etc.). The reason of this measuring device is a requirement for massive deployment of dimmable lighting systems for railways, in...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Comparison of selected electroencephalographic signal classification methods

    A variety of methods exists for electroencephalographic (EEG) signals classification. In this paper, we briefly review selected methods developed for such a purpose. First, a short description of the EEG signal characteristics is shown. Then, a comparison between the selected EEG signal classification methods, based on the overview of research studies on this topic, is presented. Examples of methods included in the study are: Artificial...

  • Quantum randomness protected against detection loophole attacks

    Publikacja
    • P. A. Mironowicz
    • G. Cañas
    • J. Cariñe
    • E. S. Gómez
    • J. F. Barra
    • A. Cabello
    • G. B. Xavier
    • G. Lima
    • M. Pawłowski

    - Quantum Information Processing - Rok 2021

    Device and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....

    Pełny tekst do pobrania w serwisie zewnętrznym