Publikacje
Filtry
wszystkich: 170
Katalog Publikacji
Rok 2020
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublikacjaThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Weighted Clustering for Bees Detection on Video Images
PublikacjaThis work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...
-
Wirtualna rekonstrukcja Jaszczurki Gierłowskiej = Virtual reconstruction of Gierłowska’s Lizard
PublikacjaGdańsk znany jest z posiadania wielu osobliwości. Jedną z nich jest niewielka, choć licząca aż 44 miliony lat jaszczurka (podrząd Sauria, rodzina Lacertidae) zatopiona w trzyipółcentymetrowej bryłce bursztynu bałtyckiego – sukcynitu. Określa się ją mianem Jaszczurki Gierłowskiej, jako że w czerwcu 1997 r. znalazła ją na gdańskich Stogach bursztynniczka Gabriela Gierłowska. Obecnie bursztyn z jaszczurką oglądać można w Muzeum Bursztynu...
Rok 2021
-
3D Scanning of Semitransparent Amber with and without Inclusions
PublikacjaThis paper is concerned with making 3D scans of semitransparent ambers with and without inclusions. The paper presents results of using a variety of devices applied for this purpose. Equipment used in the experiments includes a 3D laser scanner, a structured light scanner, a stereo camera, a camera array and a tomograph. The main object used in the experiment was an amber with a fossil of a lizard. The paper shows possibilities...
-
Equal Baseline Camera Array—Calibration, Testbed and Applications
PublikacjaThis paper presents research on 3D scanning by taking advantage of a camera array consisting of up to five adjacent cameras. Such an array makes it possible to make a disparity map with a higher precision than a stereo camera, however it preserves the advantages of a stereo camera such as a possibility to operate in wide range of distances and in highly illuminated areas. In an outdoor environment, the array is a competitive alternative...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublikacjaUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublikacjaTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Klasyfikator Adaboost w detekcji i rozpoznawaniu obiektów graficznych
PublikacjaW pracy opisano metode Adaboost w zastosowaniu do detekcji obiektów graficznych, takich jak twarze lub rozpoznawania np. osób na podstawie obrazu twarzy. Przedstawiono podstawy algorytm, wersje kaskadowa, schemat przepływu danych i sterowania w zadaniu detekcji twarzy oraz sposoby adaptacji tej metody do problemów wieloklasowych. Opisano równiez zbiory cech obrazów, takie jak HAAR, LBP czy HOG stosowane w zadaniach detekcji i rozpoznawania...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Multiuser Stereoscopic Projection Techniques for CAVE-Type Virtual Reality Systems
PublikacjaDespite the development of increasingly popular head mounted displays, CAVE-type systems may still be considered one of the most immersive virtual reality systems with many advantages. However, a serious limitation of most CAVE-type systems is the generation of a three-dimensional (3-D) image from the perspective of only one person. This problem is significant because in some applications, the participants must cooperate with each...
Rok 2022
-
Affect aware video games
PublikacjaIn this chapter a problem of affect aware video games is described, including such issue as: emotional model of the player, design, development and UX testing of affect-aware video games, multimodal emotion recognition and a featured review of affect-aware video games.
-
Analysis of Factors Influencing the Prices of Tourist Offers
PublikacjaTourism is a significant branch of many world economies. Many factors influence the volume of tourist traffic and the prices of trips. There are factors that clearly affect tourism, such as COVID-19. The paper describes the methods of machine learning and process mining that allow for assessing the impact of various factors (micro, mezzo and macro) on the prices of tourist offers. The methods were used on large sets of real data...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Computer Aided Telediagnostics System for Stoma Patients
PublikacjaStoma surgery may concern patients with colorectal cancer and inflammatory bowel disease. More than half of patients diagnosed with colon cancer present at an advanced stage, and palliative treatment may involve stoma formation. This type of surgery may change the patient’s life strongly, therefore they should receive special medical care. The paper presents the assumptions, concept, and architecture of the Stoma-Alert diagnosis...
-
Document centric knowledge processes
Publikacja.
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Featured based CAVE software factory
PublikacjaIn the paper we convey the lessons learned along the path we have gone through several years since establishing a room-sized CAVE installation at our university, from craft manufacturing and ad-hoc software reuse of VR software products to the robust feature driven software product line (SPL) implementing the Product Line Engineering (PLE) factory paradigm. With that we can serve all our departments and other entities from the...