Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska
Latest Publications


TOTAL DOCUMENTS

644
(FIVE YEARS 192)

H-INDEX

8
(FIVE YEARS 1)

Published By Index Copernicus International

2391-6761, 2083-0157

Author(s):  
Magdalena Michalska

The article provides an overview of selected applications of deep neural networks in the diagnosis of skin lesions from human dermatoscopic images, including many dermatological diseases, including very dangerous malignant melanoma. The lesion segmentation process, features selection and classification was described. Application examples of binary and multiclass classification are given. The described algorithms have been widely used in the diagnosis of skin lesions. The effectiveness, specificity, and accuracy of classifiers were compared and analysed based on available datasets.


Author(s):  
Paweł Kowalski ◽  
Piotr Tojza

The article proposes an efficient line detection method using a 2D convolution filter. The proposed method was compared with the Hough transform, the most popular method of straight lines detection. The developed method is suitable for local detection of straight lines with a slope from -45˚ to 45˚.  Also, it can be used for curve detection which shape is approximated with the short straight sections. The new method is characterized by a constant computational cost regardless of the number of set pixels. The convolution is performed using the logical conjunction and sum operations. Moreover, design of the developed filter and the method of filtration allows for parallelization. Due to constant computation cost, the new method is suitable for implementation in the hardware structure of real-time image processing systems.


Author(s):  
Serhii Zabolotnii ◽  
Artem Honcharov ◽  
Sergii Mogilei

The paper regards a specific class of optimization criteria that possess features of probability. Therefore, constructing objective function of optimization problem, the importance is attached to probability indices that show the probability of some criterial event or events to occur. Factor analysis has been taken for the main method of constructing objective function. Algorithm for constructing objective function of optimization is done for criterion of minimization risk level in multimodal transportations that demanded demonstration data. The application of factor analysis in classical problem solution was shown to give the problem a more distinct analytical interpretation in solving it.


Author(s):  
Przemysław Falkowski-Gilski

Today, thanks to mobile devices, satellite communication is available to anyone and everywhere. Gaining information on one’s position using GNSS (Global Navigation Satellite Systems), particularly in unknown urban environments, had become an everyday activity. With the widespread of mobile devices, particularly smartphones, each person can obtain information considering his or her location anytime and everywhere. This paper is focused on a study, considering the quality of satellite communication in case of selected mobile terminals. It describes a measurement campaign carried out in varying urban environments, including a set of Android-powered smartphones coming from different manufacturers. Based on this, respective conclusions and remarks are given, which can aid consumers as well as device manufacturers and application developers.


Author(s):  
Tomasz Bobruk

The article presents an analysis of the methods of chromatic dispersion compensation in the existing, already built fiber optic telecommunications lines, based on ITU G.652 A and B fibers with the constantly growing demand for bit rates in DWDM systems. Due to the enormous investment costs, it is impossible to replace the cables used with NZDSF, hence the chapter analyzes methods of improving the bandwidth without replacing all cables. Typical models of the optimization of chromatic dispersion in the existing lines are presented.


Author(s):  
Bartłomiej Stefańczak

W artykule przedstawiono projekt czteroprzewodowego trójpoziomowego przekształtnika AC/DC. Sterowanie przekształtnika zrealizowano z wykorzystaniem regulatorów proporcjonalno-rezonansowych opartych na sterowaniu zorientowanym napięciowo (VOC). Zaimplementowana topologia przekształtnika AC/DC pozwala na sterowanie każdą z faz z osobna. Przekłada się to możliwość niezależnej kontroli mocy czynnej i biernej w każdej z faz. Ponadto szyna DC przekształtnika AC/DC połączona jest równolegle z magazynem energii poprzez izolowaną przetwornicę DC/DC oraz odnawialne źródło energii. Badania przeprowadzono z wykorzystaniem zaprojektowanego przekształtnika, sterownika DSP oraz platformy Matlab/SIMULNIK, którą wykorzystano do automatycznej generacji kodu. Otrzymane wyniki wskazują, że sterowanie niezależne każdą z faz jest możliwe jednakże, praca z dużymi asymetriami mocy na każdej z faz prowadzi do dużej pulsacji prądu na szynie DC. Jest to zjawisko zagrażające poprawności działania magazynu energii. W skutek tego poziom asymetrii między fazami powinien być ograniczony do poziomu akceptowalnego przez magazyn energii.


Author(s):  
Bohdan Nikolaienko ◽  
Serhii Vasylenko

With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.


Author(s):  
Volodymyr Barannik ◽  
Natalia Barannik ◽  
Oleksandr Slobodyanyuk

It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.


Author(s):  
Jarosław Tatarczak

This work presents measurement results of pollutants generated during 3D printing. The measure of pollutants is the concentration of particulate matter with a diameter of up to 2.5 μm (PM2,5). Materials acrylonitrile-butadiene-styrene (ABS), polyactide (PLA) for a 3D printer and low-cost particulate matter concentration sensors PMS3003, PMS7003 were used in the research. Research results show that  low-cost sensors can be useful for monitoring pollution during 3D printing in offices, laboratories or private homes.


Author(s):  
Tomasz Rymarczyk ◽  
Jan Sikora

Dwie metody aproksymacji osobliwości funkcji Greena zaproponowano w tej pracy. Bazując na tych aproksymacjach dokonano wnikliwej analizy błędów. Jako kryterium wybrano dokładność i prostotę zaproponowanych aproksymacji. Prostotę dlatego, że takie podejście będzie proponowane w zagadnieniach tomograficznych. Tak więc czas odgrywa zasadniczą rolę. Wybrano aproksymację, która może być stosowana dla szerokiego zakresu argumentów.


Sign in / Sign up

Export Citation Format

Share Document