![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
BiLSTM Deep Learning Model for Heart Problems Detection
Deep learning architectures find applications where analysis of complex data inputs is demanding and regular neural networks may have problems. There are many types of deep learning models, however the most im...
-
Chapter and Conference Paper
Algorithm for Solving Optimal Placement of Routers in Mines
In this paper we present a model of optimization in a form of an algorithm which solves optimal placement of routers in N chambers with ...
-
Chapter and Conference Paper
Semantic Segmentation Neural Network in Automatic Weapon Detection
The goal of this paper is to introduce a semantic segmentation neural network designed for the detection of firearms. The proposed network applies a fully convolutional architecture, incorporating features suc...
-
Chapter and Conference Paper
Architecture Monitoring and Reliability Estimation Based on DIP Technology
All civil infrastructure units demand regular inspection to avoid functional and structural damages. Periodic examinations are in accordance with classification society’s standards which contain both non-destr...
-
Chapter and Conference Paper
Multimodal Image Fusion Method Based on Multiscale Image Matting
Multimodal image fusion combines the complementary information of multimodality images into a single image that preserves the information of all the source images. This paper proposes a multimodal image fusion...
-
Chapter and Conference Paper
Federated Learning Model with Augmentation and Samples Exchange Mechanism
The use of intelligent solutions often comes down to the use of already trained classifiers, which is caused by one of their biggest drawbacks. It is the accuracy or effectiveness of artificial intelligence me...
-
Chapter and Conference Paper
SURF Algorithm with Convolutional Neural Network as Face Recognition Technique
Recent developments in technology need the methods to become more efficient in various conditions. We can see this situation is much visible in multimedia and verification, where biometrics are used to recogni...
-
Chapter and Conference Paper
Data Augmentation Using Principal Component Resampling for Image Recognition by Deep Learning
Image recognition by deep learning usually requires many sample images to train. In case of a small number of images available for training, data augmentation techniques should be applied. Here we propose a no...
-
Chapter and Conference Paper
Multi-agent Architecture for Internet of Medical Things
The technological advancements in recent years has enabled the creation of the Internet of Medical Things, i.e. solutions where medical devices can communicate with each other and exchange data. The guiding id...
-
Chapter and Conference Paper
Authorship Identification Using Random Projections
The paper describes the results of experiments in applying the Random Projection (RP) method for authorship identification of online texts. We propose using RP for feature dimensionality reduction to low-dimen...
-
Chapter and Conference Paper
Iterative Design and Implementation of Rapid Gradient Descent Method
Solvers of nonlinear systems of equations are important in software engineering. There are various methods which use gradient approach to find the solution in accordance to gradient descent. This paper presen...
-
Chapter and Conference Paper
Gamification of Eye Exercises for Evaluating Eye Fatigue
Extensive use of computer and mobile devices places large burden on our eyes. To tackle the symptoms of digital eye strain and improve eyesight, the use of eye exercises are suggested. However, few people do e...
-
Chapter and Conference Paper
Parallel Processing of Computed Tomography Images
Medical research is not only expensive but also time-consuming, what can be seen in the queues, and then after the waiting time for the analysis of the effects obtained from tests. In the case of computed tomo...
-
Chapter and Conference Paper
Accident Prevention System During Immersion in Virtual Reality
More and more development under the sign of reality modification brought glasses that do not require connection to the phone, and all calculations can be performed on a connected computer. An additional advant...
-
Chapter and Conference Paper
Environment Scene Classification Based on Images Using Bag-of-Words
We analyse the environment scene classification methods based on the Bag of Words (BoW) model. The BoW model encodes images by a bag of visual features, which is a sparse histogram over a dictionary of visual ...
-
Chapter and Conference Paper
Block Matching Based Obstacle Avoidance for Unmanned Aerial Vehicle
Unmanned aerial vehicles (UAVs) are becoming very popular now. They have a variety of applications: search and rescue missions, crop inspection, 3D map**, surveillance and military applications. However, man...
-
Chapter and Conference Paper
Exploiting OSC Models by Using Neural Networks with an Innovative Pruning Algorithm
In this paper we have investigated the relationship between the current and the active layer thickness of an organic solar cell (OSC) in order to improve its efficiency by means of a back propagation neural ne...
-
Chapter and Conference Paper
The Impact of the Cost Function on the Operation of the Intelligent Agent in 2D Games
A large part of the technology development depends on the needs of users. Apart from the hardware requirements for programs used by large companies or smaller groups, the wide applications and hardware load ar...
-
Chapter and Conference Paper
Performance Evaluation of DBN Learning on Intel Multi- and Manycore Architectures
In our previous papers [12, 13], we proposed the parallel realization of the Deep Belief Network (DBN). This research confirmed the potential usefulness of the first generation of the Intel MIC architecture for i...
-
Chapter and Conference Paper
Ontology Usage for Database Conversion in Practical Solution for Military Systems - Case Study
Nowadays IT systems are used for quick share lot of data. These data are collected in databases which are working in a special rules. These rules describe how data are stored the structure of database and how ...