The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present fast evaluating and differentiating algorithms for the Hermite interpolating polynomials with the knots of multiplicity 2, which are generated dynamically in a field K = (K,+,⋅) by the recurrent formula of the formX^i = αx^i-1+β (i=1,2,..,n-1; x^0=γ).As in the case of Lagrange-Newton interpolating algorithms, the running time of these algorithms is C(n) + O(n) base operations from the field...
In this paper the authors present problems which can appear when a sparse square matrix(without any special structure) is factorized to a product of matrices W and Z. The fill-in problemis considered, and the manners of its solving – by permuting both rows and columns with amodified Markowitz scheme among others. The results of numerical experiments for sparsematrices of various sizes are presented...
The learning creation interface constituting one of the most important elements incorporated inthe Adaptive System LISE has been discussed in the present paper. The technologies associatedwith the use of JSF and EJB, Swing as well as GUI Builder have been selected for the testing.JDBO and JDO packages have been used in order to compare various technologies ofconnection with the database. The tests...
A drawback of watershed transformation is over-segmentation. It consists in creating moreclasses than there are objects present in the image. Over-segmentation partially results from thefact that the transformation extracts almost all edges present in the image, even those which arevery weak. To alleviate this problem images are preprocessed: blurring (or selectively blurring)filter is applied before...
This paper presents comparisons and evaluations of registration methods of intra-oralradiograph images. Several automatic and manual algorithms were examined. Three similarityfunctions for automatic registration are described and evaluated. In addition, the results of twomanual registration tests are compared for both 3 and 10 control points marked interactively by theoperator.
The aim of this work is distributed genetic algorithm implementation (so called islandalgorithm) to accelerate the optimum searching process in space of solutions. The distributedgenetic algorithm has also smaller chances to fall in local optimum. This conception depends onmutual cooperation of the clients who perform separate work of genetic algorithms on localmachines. As a tool for implementation...
Producers of legal software most frequently offer legal texts explorers with no possibilities ofinterpreting legal acts. Therefore, one of the aims of this work is to create and research a toolwhich could help actively to avoid the user’s necessity to interpret the legal text. Another aim ofthe work is selection of a suitable legal base, and analysis of possibilities of realization of expertsystem...
Scalable Distributed Data Structures consist of two components dynamically spread across amulticomputer: records belonging to a file and a mechanism controlling record placement in thefile space. Record (data) faults may lead to invalid computations at most, while record placementfaults may bring whole file to crash. In this paper, extended SDDS RP* (Range Partitioning)architecture tolerant to the...
In the paper we present a new approach based on application of neural networks to detect SQLattacks. SQL attacks are those attacks that take advantage of using SQL statements to beperformed. The problem of detection of this class of attacks is transformed to time seriesprediction problem. SQL queries are used as a source of events in a protected environment. Todifferentiate between normal SQL queries...
This paper presents the results of research on the way the network security is affected by thecurrent state of TCP-IP protocol suite behaviour. A number of examples of possible issues arepresented. When discussing classes of such issues, it is pointed out that security is affected by theexistence of not only incorrect implementations, but also differences in implementations that canbe used for various...
In the article we show an attack on the cryptographic protocol of electronic auction withextended requirements [1]. The found attack consists of authentication breach and secret retrieval.It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns somesecret information. We have discovered this flaw using OFMC an automatic tool of cryptographicprotocol verification. After...
Analysis of the real brain’s neural activity can be performed in many different ways like forexample electroencephalography. Sometimes the value of neural membrane potential is collectedeven from particular cells, using electrodes in neurophysiological experiments. However, thisinvasive method can be performed only on animals and in most cases leads to death of theexperiment’s subject. Computer modelling...
Elementary particle physics experiments, searching for very rare processes require the efficientanalysis and selection algorithms able to separate signal from the overwhelming background. Inthe last ten years a number of powerful kernel-based learning machines, like Support VectorMachines (SVM), have been developed. SVM approach to signal and background separation isbased on building a separating...
The article is devoted to the parallel implementation of an algorithm for finding triplesgenerating equal sums of the squares. Based on a known single thread algorithm, the parallelalgorithm is built. The obtained improvement of the time performance is verified on a multi-coreserver.
The paper presents parallel version of TRQR code, intended for ion source plasma simulation.The code is written using particle decomposition approach, and enables plasma potential, chargedensity, ion extraction current, etc. calculations. Parallelisation was done using widely acceptedMPI platform. Additionally, the code has been rewritten and optimised in order to achieve betterefficiency. The strong-...
The paper describes the problem of cepstral speech analysis in the process of automated voicedisorder probability estimation. The author proposes to derive two of the most diagnosticallysignificant voice features: quality of harmonic structure and degree of subharmonic from cepstrumof speech signal. Traditionally, these attributes are estimated auricularly or by spectrum (orspectrogram) observation,...
This paper concerns the issue of wavelet analysis of signals by continuous and discrete wavelettransforms (CWT – Continous Wavelet Transform, DWT – Discrete Wavelet Transform). Themain goal of our work was to develop a program which, through the CWT and the DWT analyses,would obtain graph of time-scale changes and would transform it into the spectrum, that is a graphof frequency changes. In this program...
The aim of this research work is application of digital image analysis for working out themethod, which will allow to evaluate irregularity rate of two-phase flow across various geometryof tube bundle in aspect of the shell – and – tube heat exchanger optimization. Visualization ofliquid flow in the shell – side enables analysis of flow parameters by the used image processingand analysis methods.Images...
The paper provides a classification of shape representation and description techniques and areview of some of the most important techniques. We examine shape description techniques on thereconstructed boundaries of brain structures (white matter) in the magnetic-resonance (MR)images using the Fourier descriptors for various frequency components in order to characterizebrain structures.
In this paper, global models of dynamic complex systems using the neural networks isdiscussed. The description of a complex system is given by a description of each system elementand structure. As a model the multilayer neural networks with the tapped delay line (TDL), whichhave the same structure as a complex system, are accepted. Two approaches, a global model and aglobal model with the quality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.