Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Edge Detection of SAR Images Based on Shearlet

    Synthetic aperture radar (SAR) has the characteristics of all-weather imaging and is widely used in various fields. However, owe to coherent imaging mechanism, speckle appears in SAR images, which seriously af...

    Zengguo Sun, Guodong Zhao, Weirong Chen in Proceedings of the 7th China High Resoluti… (2022)

  2. No Access

    Chapter and Conference Paper

    Conceptual Framework for Modeling Complex Urban Systems—From Theoretical Assumptions to Empirical Basis

    Growth of simulation methods in social sciences lead to a turn in the way we think about experimental approach in humanities. Simulation experiments inside artificial urban environments are one of the emerging...

    Marcin Wozniak in Advances in Social Simulation (2021)

  3. No Access

    Chapter and Conference Paper

    Teleoperation Control System for Controlling Prototype of a Loader Crane

    The paper presents the results of two different control systems for controlling a loader crane in the Master - Slave configuration: 1st configuration is feedforward and feedback, 2nd configuration is feedback....

    Marcin Woźniak, Paweł Herbin in Innovations Induced by Research in Technic… (2020)

  4. No Access

    Chapter and Conference Paper

    Authorship Identification Using Random Projections

    The paper describes the results of experiments in applying the Random Projection (RP) method for authorship identification of online texts. We propose using RP for feature dimensionality reduction to low-dimen...

    Robertas Damaševičius in Artificial Intelligence and Algorithms in … (2019)

  5. No Access

    Chapter and Conference Paper

    Parallel Processing of Computed Tomography Images

    Medical research is not only expensive but also time-consuming, what can be seen in the queues, and then after the waiting time for the analysis of the effects obtained from tests. In the case of computed tomo...

    Dawid Połap, Marcin Woźniak in Information Systems Architecture and Techn… (2019)

  6. No Access

    Chapter and Conference Paper

    Accident Prevention System During Immersion in Virtual Reality

    More and more development under the sign of reality modification brought glasses that do not require connection to the phone, and all calculations can be performed on a connected computer. An additional advant...

    Dawid Połap, Karolina Kęsik, Marcin Woźniak in Multimedia and Network Information Systems (2019)

  7. No Access

    Chapter and Conference Paper

    Environment Scene Classification Based on Images Using Bag-of-Words

    We analyse the environment scene classification methods based on the Bag of Words (BoW) model. The BoW model encodes images by a bag of visual features, which is a sparse histogram over a dictionary of visual ...

    Taurius Petraitis, Rytis Maskeliūnas, Robertas Damaševičius in Computational Intelligence (2019)

  8. No Access

    Chapter and Conference Paper

    Ontology Usage for Database Conversion in Practical Solution for Military Systems - Case Study

    Nowadays IT systems are used for quick share lot of data. These data are collected in databases which are working in a special rules. These rules describe how data are stored the structure of database and how ...

    Marcin Woźniak, Michał Terlecki in Uncertainty and Imprecision in Decision Ma… (2018)

  9. No Access

    Chapter and Conference Paper

    QoS Mechanism for Low Speed Radio Networks - Case Study

    A quick access to information is very important nowadays. Many systems exchange their data via radio links. These radio links are characterized by low bitrates and high bit error rate. In such situation, stand...

    Robert Palka, Wojciech Makowski in Image Processing and Communications Challe… (2017)

  10. No Access

    Chapter and Conference Paper

    Application of Rough Sets in k Nearest Neighbours Algorithm for Classification of Incomplete Samples

    Algorithm k-nn is often used for classification, but distance measures used in this algorithm are usually designed to work with real and known data. In real application the input values are imperfect—imprecise, u...

    Robert K. Nowicki, Bartosz A. Nowak in Knowledge, Information and Creativity Supp… (2016)

  11. No Access

    Chapter and Conference Paper

    An Application of Firefly Algorithm to Position Traffic in NoSQL Database Systems

    In this paper, an application of Computational Intelligence methods in positioning and optimization of traffic in NoSQL database system modeled with exponentially distributed service and vacation is discussed....

    Marcin Woźniak, Marcin Gabryel in Knowledge, Information and Creativity Supp… (2016)