The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the process of cosmic ray penetrating the Earth's atmosphere new particles forming a cascade called the extensive air shower (EAS) are produced. The objective of our paper is to estimate chosen parameters and detailed visualization of the EAS based on the data received from simulations of physical processes describing this phenomenon. The simulation of the EAS is conducted using the CORSICA program...
A single-server queueing system of MX/G/1 type with unlimited buffer size is considered. Whenever the system becomes empty, the server takes a single compulsory vacation that is independent of the arrival process. The service of the first customer after the vacation is preceded by a random setup time. We distinguish two cases of the evolution of the system: when the setup time begins after the vacation...
This article discusses the first successful phase of our work on the construction of a complete modular research station for EEG signal acquisition and analysis performed in real-time mode and in a way that meets our needs. Our intentions were presented in [1].
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by signatures, that are specific defined elements of the network traffic possible to identify and by anomalies being some deviation form of the network behaviour assumed as normal. Recently, some attempts have been made to implement artificial intelligence method for detection of attacks. Many such implementations...
The development of computer technology is reflected, among others, in the development of modern didactics. Current pedagogy and media education, as a fast developing discipline of general pedagogy, is a topic of a number of studies. Applying the modern multimedia aids at various stages and in various types of education is considered as an indispensable element of modern didactics, due to new opportunities...
This paper identifies and examines an impact of students' and teachers' activities on possibility of using and adapting e-learning platform in postgraduate studies. The paper aims at experimental survey of students' satisfaction level, their opinions concerning implementing e-learning at work as well as correlation students' activity, teachers' activity and e-learning results. Our hypotheses are tested...
The recent process of digitalizing archives has increased the importance of choosing the best compression method and evaluating the quality of the compressed materials. Our paper focuses on monochrome photographs. We suggest a new image quality index partly based on Human Visual System. We think that, despite its simplicity, it is equal to Mean Subjective Rank. In addition, we intend to ascertain...
The aim of this paper is to discuss a fusion of the two most popular low-level image features - colour and shape - in the aspect of content-based image retrieval. By combining them we can achieve much higher accuracy in various areas, e.g. pattern recognition, object representation, image retrieval. To achieve such a goal two general strategies (sequential and parallel) for joining elementary queries...
The article presents current challenges in stamp detection problem. It is a crucial topic these days since more and more traditional paper documents are being scanned in order to be archived, sent through the net or just printed. Moreover, an electronic version of paper document stored on a hard drive can be taken as forensic evidence of possible crime. The main purpose of the method presented in...
Efficient data management and distribution in a multicomputer is a subject of much research. Distributed file systems are the most common solution of this problem, however, recent works are focused on more general data distribution protocols. Scalable, Distributed Data Structures (SDDS) are another promising approach to this issue. In this paper we discuss the efficiency of an implementation of SDDS...
Acquisition of image series using the digital camera gives a possibility to obtain high resolution/quality animation, much better than while using the digital camcorder. However, there are several problems to deal with when producing animation using such approach. Especially, if motion involves changes in observer position and spatial orientation, the resulting animation may turn out to look choppy...
A description which summarizes entire and usually big set of data is called its model. The problem investigated in the paper consists in verification of models of data coming from a simulation experiment of selecting candidates for operators of mobile robot (more strictly building reliable predictive model of the data). The models are validated using train-and-test method and verified with the help...
Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the database system and data repositories for modern business...
The aim of the article is to expand the results of the theory of Linear Quadratic Control (the state of the system is described with the help of stochastic linear equation while the quality coefficient is of a quadratic form) in the case of random horizon independent of the states of the system. As for the question under consideration the control system horizon is an independent variable with a discreet...
The article includes the analysis of the course whose aim is to present the potentialities of the system of virtual education Moodle[1], which is the basis for constructing e-Student platform owned by State Higher Vocational School in Krosno. The article presents the use of e-learning in the course ‘Computer science in tourism’ conducted at the Department of Tourism and Recreation in State Higher...
The resource-constrained project scheduling problem (RCPSP) has received the attention of many researchers because it can be applied in a wide variety of real production and construction projects. This paper presents a genetic algorithm (GA) solving the RCPSP with the objective function of minimizing makespan. Standard genetic algorithm has to be adapted for project scheduling with precedence constraints...
The Cauchy problem for a semilinear parabolic equation is considered. Under the conditions u(x, t) = X(x)T1(t) + T2(t), ∂u/∂x ≠ = 0, it is shown that the problem is equivalent to the system of two ordinary differential equations for which exact difference scheme (EDS) with special Steklov averaging and difference schemes with arbitrary order of accuracy (ADS) are constructed on the moving mesh. The...
Mixed reality techniques are presented. Implementation and application of CAMSHIFT algorithm is discussed to some extent. In the initial stage of the research the technology of real object's edge detection and geometrical figures' representation in the virtual scene has been worked out.
In the paper we deal with the movement problems solved in various ways. We tryto point to the interconnection of mathematics and physics with real life. We also try to propose the common solution of the same problem in both subjects. Solving of these problems differ in mathematics and physics, though only slightly, and the unification of the solutions would simplify the understanding of the fact that...
In this paper we propose a new approach to organizing parallel computing to find a sequence of all solutions to a problem. We split the sequence into subsequences and then execute concurrently the processes to find these subsequences. We propose a new simple algorithm for the set partition problem and apply the above technique for this algorithm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.