Conveners
Session 6 - Poster Session B
- Radosław Roszczyk (Warsaw University of Technology)
- Bartek Chaber
Abstract. Fitting methods are based on optimization techniques. These methods find wide application in the process of designing new systems and devices as well as redesigning existing ones. In the publicly available literature, a significant number of matching methods can be found, including both proprietary and widely known and used algorithms, contained in commercial software such as...
Due to the continuously increasing number of re-
sources and data available in the cloud, the threats related to
the security of computer networks and IT systems are critical.
Threat detection systems based on deep neural networks and
anomaly detection are trained on data related to normal activity
so that the network can recognize unusual patterns and behaviors
in the event of an attack...
Abstract. The aim of the paper is to demonstrate the multidimensional benefits resulting from building a photovoltaic system in agricultural areas intended for asparagus cultivation. Energy, agronomic and economic analyzes will be conducted. For the purposes of extensive energy analyses, solar irradiation and energy production data from an existing solar power plant located in western...
This paper presents a study on evaluating the effectiveness of algorithms used for human fall detection. For this purpose, a personal fall detector based on a micro-controller and MEMS sensors was built. Detection algorithms described in scientific papers are discussed. The issue of artificial intelligence and its impact on the development of the fall detection issue was described. Three...
One of the primary challenges in the Internet of Things (IoT) is efficiently authenticating massively deployed devices without relying on user technical expertise. Traditional methods such as certificates and public-private key pairs are impractical on resource-constrained embedded devices due to their computational demands, while read-only unique identifiers incur high implementation costs,...
Nowadays, we are dealing with the development of industrial technologies that bring numerous benefits, but also new threats. Many technological industries are focusing on Industry 4.0, where digitization and process automation are key, and the emerging cyber threats are becoming an increasingly significant problem. As the industry develops, cyber threats evolve. In industry, this requires...
The paper contains outcomes of the Authors’research in the field of the procedure development for the signals acquired by the derivative EM field probes.
Today's Internet is based on interconnected computers and network devices, constituting a complex and highly dispersed infrastructure. The transmission uses an inter-operator network, which, among hundreds of intermediary devices, implements the assumptions of the BGP protocol. It is a very primitive protocol, over 35 years old, which does not work from the point of view of the realities and...
EFT/Burst disturbances are one of the most influential phenomena in sensitive devices. The selection of protection measures against them is determined by its nature. Due to the complexity of these disturbances, it is worth conducting a multi-level analysis, mainly frequency analysis of the disorder under study, before developing suppression methods.
This paper's authors focused on analyzing...
The paper proposes an ensemble composed of CNN networks for the detection of anomalies in ECG waveforms. The approach is composed of two stages: transformation of ECG signals into images and association of the images with the appropriate class of anomaly using the ensemble of CNN classifiers. The experiments have been performed on the publicly available database Complex Physiologic Signals...
The objective of the presented paper is concentrated on the estimation of short-circuit current in electrical power systems. The most methods of short circuit current evaluation presented in the literature are based on the analysis of numerical grid models. Numerical models comprise whole electrical systems and should be permanently bring up to date. Measurements of real system can append...
Generative machine learning models are of increased interest in recent years. While they are usage is expanding to multiple fields especially with goal of replacing time consuming repeatable tasks. However such models can be utilised for improving performance of models that are designed for classification tasks. We discuss application of Generative Adversarial Networks for image augmentation...
The paper presents a constructed model of a prosthetic hand controlled by an electromyographic (EMG) signal. The hand model, along with the forearm, was printed using a 3D printer from PETG material. An Arduino Uno microcontroller was chosen as the control system for the servomechanisms, which act as the execution system. A polyester braid is responsible for transferring the movement of the...
This paper investigates the use of morphological neural networks in medical image processing, demonstrating their ability to capture spatial structures. The goal of the paper is to investigate the potential of morphological neural networks to outperform traditional convolutional neural networks in tasks like segmentation, classification, and anomaly detection by utilizing morphological operations.
Abstract – The paper presents an effective algorithm for stabilizing periodic orbits immersed in a strange attractor of phase trajectories, which involves small changes in selected parameters of the hyper-chaotic system at each sampling time. The applied control concept consists in modifying selected system parameters in such a way as to minimize the distance of the trajectory from a fixed...