Filtry
wszystkich: 2364
wybranych: 1412
-
Katalog
- Publikacje 1412 wyników po odfiltrowaniu
- Czasopisma 13 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 86 wyników po odfiltrowaniu
- Wynalazki 2 wyników po odfiltrowaniu
- Projekty 6 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 80 wyników po odfiltrowaniu
- Wydarzenia 9 wyników po odfiltrowaniu
- Dane Badawcze 754 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: pixel shader
-
Zaawansowane techniki optymalizacji Pixel Shaderów 2.0
PublikacjaArtykuł ma na celu przedstawienie wybranych technik optymalizacji kodu pixel shaderów w wersji 2.0. Omówiona została specyfika programowania Pixel Shaderów 2.0 oraz przedstawiony został język programowania niskopoziomowego, którego znajomość jest przydatna w procesie optymalizacji kodu pixel shaderów. Nastepnie na przykładzie Pixel Shadera realizującego efekt Screen Space Ambient Occlusion pokazane zostały wybrane metody optymalizacji...
-
In-ADC, Rank-Order Filter for Digital Pixel Sensors
PublikacjaThis paper presents a new implementation of the rank-order filter, which is established on a parallel-operated array of single-slope (SS) analog-to-digital converters (ADCs). The SS ADCs use an “on-the-ramp processing” technique, i.e., filtration is performed along with analog-to-digital conversion, so the final states of the converters represent a filtered image. A proof-of-concept 64 × 64 array of SS ADCs, integrated with MOS...
-
Commissioning and performance of the CMS pixel tracker with cosmic ray muons
Publikacja -
On analog comparators for CMOS digital pixel applications. A comparative study
PublikacjaVoltage comparator is the only – apart from the light-to-voltage converter – analog component in the digital CMOS pixel. In this work, the influence of the analog comparator nonidealities on the performance of the digital pixel has been investigated. In particular, two versions of the digital pixel have been designed in 0.35 μm CMOS technology, each using a different type of analog comparator. The properties of both versions have...
-
An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing
PublikacjaA new approach to an analog ultra-low power medium-resolution vision chip design is presented. The prototype chip performs low-level image processing algorithms in real time. Only a photo-diode, MOS switches and two capacitors are used to create an analog processing element (APE) that is able to realize any convolution algorithm based on a full 3x3 kernel. The proof-of-concept circuit is implemented in 0.35 µm CMOS technology,...
-
Classification of Thyroid Tumors Based on Mass Spectrometry Imaging of Tissue Microarrays; a Single-Pixel Approach
Publikacja -
Guitar String Sound Retrieved from Moving Pixels
PublikacjaThe aim of this study was to develop a method of visual recording and analyzing the vibrations of guitar strings using high-speed cameras and dedicated video processing algorithms. The recording of a plucked string reveals the way in which the deformations propagate, composing the standing and travelling wave. The paper compares the results for a few selected models of classical and acoustic guitars, and it involves processing...
-
A CMOS Pixel With Embedded ADC, Digital CDS and Gain Correction Capability for Massively Parallel Imaging Array
PublikacjaIn the paper, a CMOS pixel has been proposed for imaging arrays with massively parallel image acquisition and simultaneous compensation of dark signal nonuniformity (DSNU) as well as photoresponse nonuniformity (PRNU). In our solution the pixel contains all necessary functional blocks: a photosensor and an analog-to-digital converter (ADC) with built-in correlated double sampling (CDS) integrated together. It is implemented in...
-
Shape Restoration of Deformed Egg-Shaped Single Layer Space Frames
Publikacja -
Shaper-GA
Publikacja -
Fully Automated AI-powered Contactless Cough Detection based on Pixel Value Dynamics Occurring within Facial Regions
PublikacjaIncreased interest in non-contact evaluation of the health state has led to higher expectations for delivering automated and reliable solutions that can be conveniently used during daily activities. Although some solutions for cough detection exist, they suffer from a series of limitations. Some of them rely on gesture or body pose recognition, which might not be possible in cases of occlusions, closer camera distances or impediments...
-
Reversible Video Stream Anonymization for Video Surveillance Systems Based on Pixels Relocation and Watermarking
PublikacjaA method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to theanonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI) hiding in video is presented,...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublikacjaIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Alternative shaper: a model for automatic design generation
Publikacja -
Shared processor scheduling
PublikacjaWe study the shared processor scheduling problem with a single shared processor to maximize total weighted overlap, where an overlap for a job is the amount of time it is processed on its private and shared processor in parallel. A polynomial-time optimization algorithm has been given for the problem with equal weights in the literature. This paper extends that result by showing an (log)-time optimization algorithm for a class...
-
Poll Reader - the working prototype of optical mark recognition software
PublikacjaAutomatyczne rozpoznawanie zaznaczeń wydaje się stosunkowo prostym zadaniem z dziedziny przetwarzania dokumentów, a komercyjne systemy OMR są dostępne na rynku już od dłuższego czasu. Zdecydowaliśmy się jednak na stworzenie prostego darmowego oprogramowania, które mogłoby być wykorzystywane przez uczelnie zobowiązane do przeprowadzania ankiet wśród studentów. W rozdziale opisano konstrukcję programu oraz najważniejsze algorytmy...
-
Analysis of the objects images on the sea using Dempster-Shafer Theory
PublikacjaThe paper presents the concept of using aerial and satellite imagery or images coming from the marine radar to identify and track vessels at sea. The acquired data were subjected to a highly advanced image analysis. The development of remote sensing techniques allows to gain a huge amount of data. These data are useful information source however usually we have to use different data mining methods to gain interested information....
-
The Role of a Leader in Contemporary Organizations
Publikacja -
Hyperbolically shaped centrifugal compressor.
PublikacjaPrzedstawiono rozwiązanie zadania odwrotnego dla sprężarki promieniowej powietrza w ramach modelu dwuwymiarowego. Zaproponowano kształt pokrywy koła łopatkowego, jako wynik optymalizacji, gdzie kryterium była minimalizacja odpowiednio zdefiniowanego parametru. Na podstawie uzyskanego rozwiązania zaprojektowano koło wirnikowe oraz wykonano obliczenia przepływowe w ramach modelu trójwymiarowego. Wyniki analizy porównano z założeniami...
-
Hyperbolically shaped centrifugal compressor.
PublikacjaPrzedstawiono możliwość optymalizacji kształtu łopatki koła wirnikowego sprężarki promieniowej ze względu na kryterium równomierności pola przepływu na wylocie. Zamieszczono porównanie wyników obliczeń na etapie projektowania w ramach osiowosymetrycznego modelu 2D z wynikami obliczeń modelem 3D dla zaprojektowanego kanału międzyłopatkowego.
-
Creating Shared Value by the University
PublikacjaPurpose Works that link creating shared value (CSV) with the university are arising, and there is a hope for a great future of this combination. The main problem with these works is that they are based on the wrong assumptions of what CSV is. The aim of the paper is to properly explain the concept of CSV and match it with university social responsibility (USR) at a strategic level. Design/methodology/approach A literature review...
-
Shared multi-processor scheduling
PublikacjaWe study shared multi-processor scheduling problem where each job can be executed on its private processor and simultaneously on one of many processors shared by all jobs in order to reduce the job’s completion time due to processing time overlap. The total weighted overlap of all jobs is to be maximized. The problem models subcontracting scheduling in supply chains and divisible load scheduling in computing. We show that synchronized...
-
Using Dempster-Shafer approach to support reasoning about trust in IT infrastructures
PublikacjaW artykule przedstawiono zastosowanie podejścia Dempstera-Shafera do do wnioskowania o poziomie zaufania do infrastruktur TI.
-
Taking advantage of the shared explicit cache system based critical sections in the shared memory parallel architectures
PublikacjaArtykuł prezentuje nową metodę implementacji sekcji krytycznych w równoległych architekturach z pamięcią współdzieloną, takich jak systemy zintegrowane wielowątkowe wieloprocesorowe. Metoda stanowi modyfikację i rozbudowanie metody zwanej Folding, dostępnej w procesorach sieciowych oraz jest w założeniach podobna do techniki zwanej cache-based locking. W porównaniu do dostępnych metod, nowa metoda usuwa problemy skalowalności i...
-
Entasis- shape of beauty
PublikacjaTwo algorithms for the construction of entasis given by [2,3] are examined in this study. It has been shown, that those shapes are not an ellipse for which they were considered by the authors, but another curves.
-
Entasis- shape of beauty
PublikacjaTwo algorithms for the construction of entasis given by [2,3] are examined in this study. It has been shown, that those shapes are not an ellipse for which they were considered by the authors, but another curves.
-
The Challenges Of The Next Generation Leader 5.0
Publikacjahttp://ak.aos.sk/images/repozitar/zborniky/NTPP_clanky23/10_Balcerzyk.pdf
-
Shared processor scheduling of multiprocessor jobs
PublikacjaWe study a problem of shared processor scheduling of multiprocessor weighted jobs. Each job can be executed on its private processor and simultaneously on possibly many processors shared by all jobs. This simultaneous execution reduces their completion times due to the processing time overlap. Each of the m shared processors may charge a different fee but otherwise the processors are identical. The goal is to maximize the total...
-
Composite GFRP U-shaped footbridge
PublikacjaThe paper presents proposals for the use of glass fiber reinforced polymer composites for the construction of engineering objects, known and commonly used in the shipbuilding industry. An example of a pedestrian footbridge was used in this case, which, despite the considerable thickness of the structural material, was made using infusion technology in one production cycle. The designed and produced footbridge span is durable, dynamically...
-
Query-by-Shape Interface for Content Based Image Retrieval Based on Shape Analysis
Publikacja -
Detection and segmentation of moving vehicles and trains using Gaussian mixtures, shadow detection and morphological processing
PublikacjaSolution presented in this paper combines background modelling, shadow detection and morphological and temporal processing into one system responsible for detection and segmentation of moving objects recorded with a static camera. Vehicles and trains are detected based on their pixellevel difference from the continually updated background model utilizing a Gaussian mixture calculated separately for every pixel. The shadow detection...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublikacjaA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublikacjaThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Hardware realization of shadow detection algorithm in FPGA
PublikacjaW referacie opisano problem detekcji cieni w sekwencjach wideo. Na podstawie metod znanych z literatury opracowano algorytm detekcji cieni, działający w czasie rzeczywistym i przeznaczony do realizacji sprzętowej w układzie FPGA. Algorytmy zostały przetestowane i porównane w środowisku MATLAB. Za pomocą języka VHDL zrealizowano system detekcji cieni wykorzystujący opracowany algorytm i zaimplementowano go w układzie Virtex-4. Został...
-
Potrzeby wodne gospodarstwa wodnego. Spadek konsumpcji.
PublikacjaOmówiono zjawisko spadku wielkości zużycia wody w domu. Problem wiarygodności prognozy. Ocena dalszego rozwoju zjawiska.
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Active shape models in practice
PublikacjaAutorzy wykonali uniwersalny system lokalizacji obiektów zawierający implementację aktywnych modeli kształtu, a przeprowadzone z użyciem tego systemu eksperymenty wykazały powżne wady badanej metody. W pracy przedstawiono zaobserwowane w praktyce problemy związane ze stosowaniem metody aktywnych modeli kształtu (ASM).
-
A benchmark for particle shape dependence
PublikacjaParticle shape is a major parameter for the space-filling and strength properties of granular materials. For a systematic investigation of shape effect, a numerical benchmark test was set up within a collaborative group using different numerical methods and particles of various shape characteristics such as elongation, angularity and nonconvexity. Extensive 2D shear simulations were performed in this framework and the shear strength...
-
Shape-Memory Polyurethane Polymers
PublikacjaPolyurethanes (PUs) are one of the most widely used polymers in research and industry. They can be synthesized from chemical sources and natural sources. PUs are a very useful class of polymers and exhibit many desirable properties that can be exploited in various applications. PUs are formed by the reaction between polyols and isocyanates. A wide variety of polyols and isocyanates are available for synthesis, and hence we can...
-
The Role of Virtual Package Shapes in Digital Product Presentation
Publikacja -
Conley index in Hilbert spaces and the Leray-Schauder degree
PublikacjaZdefiniowane są liczby Bettiego i charakterystyka Eulera LS-indeksu dla potoków generowanych przez pole zwarte w przestrzeni Hilberta. Główna teza pracy to wzór typu Poincare-Hopfa łączący wspomnianą chatrakterystykę Eulera ze stopniem Leray-Schaudera.
-
Local Government as an Actor in Collaborative Governance – Partner or Leader?
Publikacja -
Shales Leaching Modelling for Prediction of Flowback Fluid Composition
PublikacjaThe object of the paper is the prediction of flowback fluid composition at a laboratory scale, for which a new approach is described. The authors define leaching as a flowback fluid generation related to the shale processing. In the first step shale rock was characterized using X-ray fluorescence spectroscopy, X-ray diractometry and laboratory analysis. It was proven that shale rock samples taken from the selected sections of horizontal...
-
Mineral and Organic Matter Constituents in Weak Interfaces in Shales
PublikacjaThis paper identifies formation interfaces that would appear to be "weak interfaces", in the Jurassic, Early- Cretaceous Vaca Muerta formation, in the Neuquén Basin, Argentina. Significant distribution of the weak interfaces was observed including contacts between volcanic ash layers of varying thicknesses, calcite-filled veins, and contacts between lithology changes, such as between argillaceous mudstone and mottled carbonates....
-
Compact antenna array comprising fractal-shaped microstripradiators
PublikacjaA design method of antenna array consisting of eight microstrip patches modified with Sierpinski fractal curves has been presented andexperimentally validated in this paper. Method proposed has enabled the achievement of considerable miniaturization of array length (26%),together with multi-band behavior of the antenna, which proves the attractiveness of presented design methodology and its ability to be implemented in more complex...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublikacjaWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
2D inverse solution for cone-shaped centrifugal compressor
PublikacjaWprowadzono stożkowy układ współrzędnych dla opisania obszaru wirnika sprężarki promieniowej. W takim układzie został sformułowany problem odwrotny. Oznacza to, że dla założonej jednej rodziny powierzchni prądu (S1) w formie powierzchni stożkowych druga rodzina (S2) jest znajdywana w drodze rozwiązania układu równań zachowania. Pokazano w jaki sposób rozwiązanie zależy od warunków brzegowych. Przedstawiona metoda jest przydatna...
-
A Novel Device and System for Fall Detection Under the Shower
PublikacjaIn this paper, device construction and preliminary results for shower safety assistance are presented. The device allows monitoring of shower-taking persons without violating privacy and intimacy, while it has the ability to detect a persons entering and leaving the shower and detecting fall conditions. It allows better supervision of elders living independently at their locations.
-
Computer simulation of detonation of shaped charge in sea water
PublikacjaArtykuł zawiera opis systemu przeciwnimowego Głuptak, koncentrując się na opisie działania ładunku kumulacyjnego do niszczenia min morskich. Opisano sposób formowania wiązki plazmy uderzającej w obudowę miny po zdetonowaniu opisywanego ładunku kształtowego. Zaprezentowano obraz symulacyjny i zdjęcia poklatkowe penetracji plazmy w obiekcie niszczonym.
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...