Conveners
Session 6 - Poster Session B
- Radosław Roszczyk (Warsaw University of Technology)
- Bartek Chaber
-
Dr Milena Kurzawa (Poznan University of Technology)13/09/2024, 09:00Poster
Abstract. Fitting methods are based on optimization techniques. These methods find wide application in the process of designing new systems and devices as well as redesigning existing ones. In the publicly available literature, a significant number of matching methods can be found, including both proprietary and widely known and used algorithms, contained in commercial software such as...
Go to contribution page -
Bartosz Sawicki (Warsaw University of Technology)13/09/2024, 09:00Poster
Due to the continuously increasing number of re-
Go to contribution page
sources and data available in the cloud, the threats related to
the security of computer networks and IT systems are critical.
Threat detection systems based on deep neural networks and
anomaly detection are trained on data related to normal activity
so that the network can recognize unusual patterns and behaviors
in the event of an attack... -
Dr Łukasz Putz (Poznan University of Technology)13/09/2024, 09:00Poster
Abstract. The aim of the paper is to demonstrate the multidimensional benefits resulting from building a photovoltaic system in agricultural areas intended for asparagus cultivation. Energy, agronomic and economic analyzes will be conducted. For the purposes of extensive energy analyses, solar irradiation and energy production data from an existing solar power plant located in western...
Go to contribution page -
Bogdan Dziadak (Warsaw University of Technology)13/09/2024, 09:20Poster
This paper presents a study on evaluating the effectiveness of algorithms used for human fall detection. For this purpose, a personal fall detector based on a micro-controller and MEMS sensors was built. Detection algorithms described in scientific papers are discussed. The issue of artificial intelligence and its impact on the development of the fall detection issue was described. Three...
Go to contribution page -
Lukasz Makowski (Warsaw University of Technology)13/09/2024, 09:20Poster
One of the primary challenges in the Internet of Things (IoT) is efficiently authenticating massively deployed devices without relying on user technical expertise. Traditional methods such as certificates and public-private key pairs are impractical on resource-constrained embedded devices due to their computational demands, while read-only unique identifiers incur high implementation costs,...
Go to contribution page -
Dr Janusz Pochmara (Poznan University of Technology), Aleksandra Świetlicka (Poznan University of Technology), Dr Krzysztof Kolanowski (Poznan University of Technology)13/09/2024, 09:20Poster
Nowadays, we are dealing with the development of industrial technologies that bring numerous benefits, but also new threats. Many technological industries are focusing on Industry 4.0, where digitization and process automation are key, and the emerging cyber threats are becoming an increasingly significant problem. As the industry develops, cyber threats evolve. In industry, this requires...
Go to contribution page -
Mr Adam Jóśko (Warsaw University Of Technology)13/09/2024, 09:20Poster
The paper contains outcomes of the Authors’research in the field of the procedure development for the signals acquired by the derivative EM field probes.
Go to contribution page -
Artur Krupa (Institute of Information Technology)13/09/2024, 09:40Poster
Today's Internet is based on interconnected computers and network devices, constituting a complex and highly dispersed infrastructure. The transmission uses an inter-operator network, which, among hundreds of intermediary devices, implements the assumptions of the BGP protocol. It is a very primitive protocol, over 35 years old, which does not work from the point of view of the realities and...
Go to contribution page -
Piotr Zych (Warsaw University of Technology)13/09/2024, 09:40Poster
EFT/Burst disturbances are one of the most influential phenomena in sensitive devices. The selection of protection measures against them is determined by its nature. Due to the complexity of these disturbances, it is worth conducting a multi-level analysis, mainly frequency analysis of the disorder under study, before developing suppression methods.
Go to contribution page
This paper's authors focused on analyzing... -
Izabella Antoniuk13/09/2024, 09:40Poster
In this paper a comprehensive methodology for procedural generation of cave-like areas is introduced. The method focuses on creating interchangeable tiles that can be used in applications such as computer games. When this field is considered, any algorithm needs to both, follow the user specifications and be able to produce satisfactory and modifiable content at an interactive rate. Solution...
Go to contribution page -
Stanislaw Osowski (Warsaw University of Technology)13/09/2024, 10:00Poster
The paper proposes an ensemble composed of CNN networks for the detection of anomalies in ECG waveforms. The approach is composed of two stages: transformation of ECG signals into images and association of the images with the appropriate class of anomaly using the ensemble of CNN classifiers. The experiments have been performed on the publicly available database Complex Physiologic Signals...
Go to contribution page -
Andrzej Toboła (Warsaw University of Technology)13/09/2024, 10:00Poster
The objective of the presented paper is concentrated on the estimation of short-circuit current in electrical power systems. The most methods of short circuit current evaluation presented in the literature are based on the analysis of numerical grid models. Numerical models comprise whole electrical systems and should be permanently bring up to date. Measurements of real system can append...
Go to contribution page -
Prof. Michał Kruk (Institute of Information Technology, Warsaw University of Life Sciences – SGGW, Warsaw, Polan)13/09/2024, 10:00Poster
Generative machine learning models are of increased interest in recent years. While they are usage is expanding to multiple fields especially with goal of replacing time consuming repeatable tasks. However such models can be utilised for improving performance of models that are designed for classification tasks. We discuss application of Generative Adversarial Networks for image augmentation...
Go to contribution page -
Dr Andrzej Majkowski (Politechnika Warszawska, Wydział Elektryczny, IETISIP)13/09/2024, 10:00Poster
The paper presents a constructed model of a prosthetic hand controlled by an electromyographic (EMG) signal. The hand model, along with the forearm, was printed using a 3D printer from PETG material. An Arduino Uno microcontroller was chosen as the control system for the servomechanisms, which act as the execution system. A polyester braid is responsible for transferring the movement of the...
Go to contribution page -
Marek Wdowiak (Warsaw University of Technology)13/09/2024, 10:00Poster
This paper investigates the use of morphological neural networks in medical image processing, demonstrating their ability to capture spatial structures. The goal of the paper is to investigate the potential of morphological neural networks to outperform traditional convolutional neural networks in tasks like segmentation, classification, and anomaly detection by utilizing morphological operations.
Go to contribution page -
Radoslaw Basinski (Institute of Theory of Electrical Engineering, Measurement and Information Systems, Warsaw University of Technology)13/09/2024, 10:00Poster
Abstract – The paper presents an effective algorithm for stabilizing periodic orbits immersed in a strange attractor of phase trajectories, which involves small changes in selected parameters of the hyper-chaotic system at each sampling time. The applied control concept consists in modifying selected system parameters in such a way as to minimize the distance of the trajectory from a fixed...
Go to contribution page