Nauki Techniczne

Theoretical and Applied Informatics

Zawartość

Theoretical and Applied Informatics | 2014 | vol. 26 | No 3-4

Abstrakt

This paper presents integration of ultrasonic and inertial approaches in indoor navigation system. Ultrasonic navigation systems allow to obtain good results whilst there are at least three beacon transmitters in the range of mobile receiver, but in many situations placement of large number of transmitters is not economically justified. In such situations navigation must be aided by other technique. This paper describes research on supporting ultrasonic system by inertial system based on Magnetic, Angular Rate and Gravity sensor. This can measure current orientation of the receiver and allows to estimate the length of the path by pedometer functionality.

Przejdź do artykułu

Autorzy i Afiliacje

Krzysztof Tokarz
Piotr Czekalski
Wojciech Sieczkowski

Abstrakt

The chapter deals with the issue of the risk and security management process in public administration, according to the internal audit standards and their requirements. Main legal acts and standards were specified and shortly described. Specially the risk analysis process and security measures selection were emphasized. The possibility to use the software tools for the risk analysis and security measures selection support in public administration was presented. The experiment of OSCAD usage in public administration was shortly described and its results were presented. This experiment shows that the software primarily intended for IT Security Management can be used for risk management in different area as well, for example – in public administration. Some possibilities of further development of risk management supporting tools were proposed.

Przejdź do artykułu

Autorzy i Afiliacje

Jacek Bagiński

Abstrakt

The article presents experiments in realistic modelling of facial expressions using volume morphing. The experiments use a variable number of points and face features. As the results are shown meshes deviations (between goal mesh and morphed shape). Experiments have shown that it is impossible to carry out a fully realistic morphing based on existing software. At the same time, even imperfect morphing allows you to show the expected emotional facial expression.

Przejdź do artykułu

Autorzy i Afiliacje

Przemysław Kowalski

Abstrakt

In this work we provide a method for approximating the separable numerical range of a matrix. We also recall the connection between restricted numerical range and entanglement of a quantum state. We show the possibility to establish state separability using computed restricted numerical range. In particular we present a method to obtain separability criteria for arbitrary system partition with use of the separable numerical range.

Przejdź do artykułu

Autorzy i Afiliacje

Piotr Gawron
Przemysław Sadowski

Abstrakt

The techniques of photogrammetric reconstruction were compared to the laser scanning in the article. The different conditions and constraints were introduced for reconstructed images, e.g. different materials, lighting condition, camera resolution, number of images in the sequence or using a-pripori calibration. The authors compare the results of surface reconstruction using software tools avaliable for photogrammetric reconstruction. The analysis is preformed for the selected objects with regard to laserscanned models or mathematical models.

Przejdź do artykułu

Autorzy i Afiliacje

Krzysztof Skabek
Agnieszka Tomaka

Abstrakt

Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.

Przejdź do artykułu

Autorzy i Afiliacje

Paweł Buchwald
Maciej Rostański
Krystian Mączka

Instrukcja dla autorów

The Theoretical and Applied Informatics ceased publication with the 2017 issue (Volume 29, Number 1-2).

Ta strona wykorzystuje pliki 'cookies'. Więcej informacji