Applied sciences

Theoretical and Applied Informatics

Content

Theoretical and Applied Informatics | 2014 | vol. 26 | No 3-4 |

Download PDF Download RIS Download Bibtex

Abstract

This paper presents integration of ultrasonic and inertial approaches in indoor navigation system. Ultrasonic navigation systems allow to obtain good results whilst there are at least three beacon transmitters in the range of mobile receiver, but in many situations placement of large number of transmitters is not economically justified. In such situations navigation must be aided by other technique. This paper describes research on supporting ultrasonic system by inertial system based on Magnetic, Angular Rate and Gravity sensor. This can measure current orientation of the receiver and allows to estimate the length of the path by pedometer functionality.

Go to article

Authors and Affiliations

Krzysztof Tokarz
Piotr Czekalski
Wojciech Sieczkowski
Download PDF Download RIS Download Bibtex

Abstract

The chapter deals with the issue of the risk and security management process in public administration, according to the internal audit standards and their requirements. Main legal acts and standards were specified and shortly described. Specially the risk analysis process and security measures selection were emphasized. The possibility to use the software tools for the risk analysis and security measures selection support in public administration was presented. The experiment of OSCAD usage in public administration was shortly described and its results were presented. This experiment shows that the software primarily intended for IT Security Management can be used for risk management in different area as well, for example – in public administration. Some possibilities of further development of risk management supporting tools were proposed.

Go to article

Authors and Affiliations

Jacek Bagiński
Download PDF Download RIS Download Bibtex

Abstract

The article presents experiments in realistic modelling of facial expressions using volume morphing. The experiments use a variable number of points and face features. As the results are shown meshes deviations (between goal mesh and morphed shape). Experiments have shown that it is impossible to carry out a fully realistic morphing based on existing software. At the same time, even imperfect morphing allows you to show the expected emotional facial expression.

Go to article

Authors and Affiliations

Przemysław Kowalski
Download PDF Download RIS Download Bibtex

Abstract

In this work we provide a method for approximating the separable numerical range of a matrix. We also recall the connection between restricted numerical range and entanglement of a quantum state. We show the possibility to establish state separability using computed restricted numerical range. In particular we present a method to obtain separability criteria for arbitrary system partition with use of the separable numerical range.

Go to article

Authors and Affiliations

Piotr Gawron
Przemysław Sadowski
Download PDF Download RIS Download Bibtex

Abstract

The techniques of photogrammetric reconstruction were compared to the laser scanning in the article. The different conditions and constraints were introduced for reconstructed images, e.g. different materials, lighting condition, camera resolution, number of images in the sequence or using a-pripori calibration. The authors compare the results of surface reconstruction using software tools avaliable for photogrammetric reconstruction. The analysis is preformed for the selected objects with regard to laserscanned models or mathematical models.

Go to article

Authors and Affiliations

Krzysztof Skabek
Agnieszka Tomaka
Download PDF Download RIS Download Bibtex

Abstract

Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.

Go to article

Authors and Affiliations

Paweł Buchwald
Maciej Rostański
Krystian Mączka

Editorial office

Editor-in-Chief: Prof. dr hab. inż. Jerzy Klamka

Managing Editor:
dr hab. Jarosław Miszczak

Contact

The Theoretical and Applied Informatics ceased publication with the 2017 issue (Volume 29, Number 1-2).

Instructions for authors

The Theoretical and Applied Informatics ceased publication with the 2017 issue (Volume 29, Number 1-2).

This page uses 'cookies'. Learn more