The article discusses the challenges of real-time data processing and analyzes various methods used to solve them, with a focus on image processing. It points out the limitations of existing methods and argues for the need to use more effective and modern technologies, proposing parallel-hierarchical networks as a promising solution. The article provides a detailed description of the structural-functional model of this type of network, which involves cyclically transforming the input data matrix using a "common part" criterion and an array evolution operator until a set of individual elements is formed. The proposed model is expected to improve real-time image recognition and can potentially be applied to other fields by using the "common part" criterion.
KEYWORDS: Standards development, Network security, Data transmission, Computer security, Wireless communications, Local area networks, Switches, Data modeling, Data communications, Computer networks
In this work analysis of wireless network security for data transmission performance was performed. To carry out was chosen most currently popular wireless standards IEEE 802.11 family. Among the protocols used to secure local wireless networks, the most common protocols were selected. Four different test groups were tested, which tested the impact of wireless network security on: transfer depending on the network standard and frequency band for communication using TCP and UDP protocols, throughput depending on the size of the MTU parameter for communication using the TCP protocol, delay for communication using UDP protocol, delay depending on the type of data for communication using the UDP protocol. The best compromise between stability and network performance, and its protection is the standard IEEE 802.11n protected by WPA2 AES Enterprise version.
This paper focuses on researching and visualizing the differences of the quality of network connections between several network applications using popular scheduling algorithms. The aim of this work is to examine and compare the impact of application of scheduling algorithms for FIFO, DWRR, WFQ, PQ packets in IPv4 and IPv6 networks on the quality of data transmission. Using Riverbed Modeler Academic Edition version 17.5 software there was developed 10 research scenarios with different scheduling algorithms and IP protocols implemented on routers. Scenarios based on IP protocols in the fourth and sixth versions with implemented FIFO, PQ, DWRR and WFQ scheduling algorithms has been developed. Each scenario includes the operation of real-time VoIP and video conferencing applications as well as HTTP, FTP and e-mail applications. The research showed that there are significant differences in the quality of packet transmission of the tested applications using different configurations of the scheduling algorithms and network protocols.
There are research results of artificial neural networks usage for solving a hardly formalized objective – detection of a DDoS attacks on the computer network information resource in this article. An analysis of existing methods, technologies and tools for detecting DDoS attacks and protecting from them is carried out. Several feed forward neural networks are simulated. The architecture of the neural network which provides high-precision detection is presented.
An improved mathematical model of artificial neuron with active generation of action potentials was developed, and the behavior of an artificial network consisting of thousands of described neurons was investigated. The passive part of the neuron consists of soma and asymmetric dendritic branches that provide multi-stability. The active component of the neuron is described with the help of a simplified non-linear neuron model with mechanisms for the spiking generation. The presented model reproduces all types of electrical generations of known biological neurons, e.g. neocortical. The model combines the biological similarity of the Hodgkin-Huxley type dynamics and the computational efficiency of integrative-spiking neurons. It is shown that switching between different modes of generation is possible under the condition of structural three-stability of the neuron in common. A neural network consisting of multi-stable neurons is capable of generating synchronous regular spikes if all neurons in the network are in a similar electrical state. In the case where a part of the neurons at non-similar stable condition, the network generates asynchronous regular spikes, without adding any synaptic plasticity mechanisms or modulating stimulation processes. The obtained model can be used for studying the features of real-time data processing by artificial neural networks, which can be used for such modern tasks as recognition and classification of biophysical signal patterns or for the development of elements of artificial intelligence.
Algorithm of Ramer–Douglas–Peucker for piecewise approximation was used for image multilevel segmentation. The cumulative histogram was chosen as a function for approximation. The developed algorithm was applied to the satellite map images to divide clouds of different intensity. The map images of clouds with different intensity were clustered to obtaine cloudiness values and classification.
KEYWORDS: Social networks, Resistance, Computer simulations, Reliability, Information operations, Distribution, Information security, Error analysis, Data modeling, Data processing
In the work, the developed computer model of the distribution of information influences during information operations and information wars in virtual social networks with different information dissemination strategies considered. The series of experiments were conducted to compare the effectiveness of different information dissemination strategies.
KEYWORDS: Combustion, RGB color model, Image processing, Image analysis, Data analysis, Image classification, Process control, Oxides, Control systems, Cameras
The paper presents comparison image classification method for RGB channels images of combustion biomass and pulverized coal. Presented research is related with 30% weight fraction of the biomass. The object of the study were time series reflecting changes in time of selected flame geometric parameters, in the co-firing pulverized coal and biomass. Defined stable and unstable combustion process stated based on expert. The research was used nine variants of the cofiring process, involving different heat power settings and the air flow rate. The results showed that the red and blue channels should be simultaneously allows to recognize particular state of the combustion process. The obtained results confirm the possibility of RGB image analysis in flame tests when co-firing pulverized coal and biomass.
In this article, we discuss an extensive class of channel codes called turbo codes. These error correction methods will achieve very good results in terms of error rates, which may be close to the bandwidth limit of the Shannon channel. The article begins with a brief discussion on the coding of the turbo, and then describes the form of the iterative decoder most often used to decode the turbo codes. This article proposes a new optimal modification of the log-MAP-log decoding algorithm. This method (PL-log-MAP) is based on a partial linear approximation of the correction function in the Jacobean logarithm. Using the proposed approximation, the complex functions of ln (.) I exp (.) In the log-MAP algorithm can be estimated with high accuracy and lower computational complexity. The effectiveness of the proposed approximation is tested and demonstrated by applying it to the digital communication system for transmission images in MatLab. It seems that the performance of the PL-log-MAP algorithm has the closest efficiency to the original log-MAP solution.
For solving the problem of rate mode of multistage hot deformation optimization in order to reduce the impact of the stages number on the structure of a nonlinear programming problem, it is suggested to search the solution in the form of multistage rate change with the equal duration of stages and with rate change by the path, set by polynomial and exponential functions.
KEYWORDS: Convolution, Calculus, Process modeling, Mathematical modeling, Materials processing, Microelectromechanical systems, Chemical elements, Particles, Analog electronics, Analytical research
Paper considers the modeling of materials superplasticity state, based on damage summation theory, applying Abel integral equation. Two different conditions, regarding damage accumulation function, necessary for achieving the superplasticity state of the material are formulated, corresponding laws of strain rate change, accompanied by achieving of arbitrarily large non-fracture strains are obtained.
KEYWORDS: 3D modeling, Visualization, Systems modeling, Computing systems, Mathematical modeling, Solid modeling, Visual process modeling, Computer aided design, 3D applications, Binary data
The method of increasing the realism of forming graphic scenes due to adaptive editing is proposed. The user is given the opportunity to change the image of a three-dimensional object using the functions of perturbation. At the same time, a higher degree of smoothness of the form is achieved compared to the use of splines. The use of excitation functions makes it possible to achieve an acceptable level of detail, which allows you to manage the realism of the formation of graphic scenes.
The work presents the problems related to securing the wireless network. The main purpose of the work was the issue related to the possibilities of using the IPSec protocol to secure the wireless network, which were closely related to the encryption protocol. A wireless network was designed for research purposes, enabling the configuration of the IPSec protocol in the client-to-server mode. This allowed to conduct several tests in which the network was compared with the default configuration available through the wizard to the network protected by the IPSec protocol. Analysis of the results obtained was based on a comparison of the network with default settings with the VPN network. The tests checked the impact of configuration on performance, quality, time and consumption of hardware resources. All the studies carried out confirm the fact that the use of the IPSec protocol has not only a good impact on increasing the level of network security, but also significantly affects the bandwidth performance and bandwidth.
The work is aimed at examining the impact of quality of service parameters on multimedia transmissions. For testing purposes, a test network topology has been designed and built, allowing for the transmission of multimedia data, and shaping traffic using quality of service (QoS). The analysis of the results obtained is based on a comparison of selected parameters particularly relevant for multimedia transmissions received from the simulations. The simulation of network traffic was carried out in the student version of the Riverbed software. The following parameters were compared: delays, jitter, rejected packets and packets sent and received for FIFO, PQ, WFQ, WRR queuing methods for FTP, Video and VoIP traffic.
The stability of flame is an important condition for efficient co-firing of pulverized coal and biomass and stability of whole process. Defined two class of combustion: stable and unstable for nine variants with different power, secondary air value parameters and fixed amount biomass. Considering dynamic changes between successive frames of such video streams the optical flow algorithms could be applied for diagnostic purposes. This paper presents a comparison of the (knearest neighbors and support vector machine) classification method for several video stream based on flow vectors obtained using the Dual TV-L1 algorithm.
The object of the study were time series reflecting changes in time of selected flame geometric parameters, in the cofiring pulverized coal and biomass. These parameters were: contour length, area size, X and Y coordinates of the geometric center of gravity. Time series were analyzed using seven popular methods for estimating the fractal dimension. The research was conducted for nine variants of the co-firing process, involving different heat power settings and the air flow rate and 30 biomass content. The results showed that the applied fractal dimensions parameters can be a feature that allows to recognize particular variants of the combustion process. Furthermore, the fractal dimension evaluated by the "madogram" method estimation gives good results for most variants providing good separability of the observations. The obtained results confirm the possibilities of using fractal analysis in flame studies in the co-firing of pulverized coal and biomass.
Nowadays research of psychomotor actions has taken a special place in education, sports, medicine, psychology etc. Development of computer system for psychomotor testing could help solve many operational problems in psychoneurology and psychophysiology and also determine the individual characteristics of fine motor skills. This is particularly relevant issue when it comes to children, students, athletes for definition of personal and professional features. The article presents the dynamics of a developing psychomotor skills and application in the training process of means. The results of testing indicated their significant impact on psychomotor skills development.
This paper presents comparison image classification method of combustion biomass and pulverized coal. Presented research is related with 20% weight fraction of the biomass. Defined two class of combustion: stable and unstable for nine variants with different power, secondary air value parameters and fixed amount biomass. Used k-nearest neighbors algorithm classification to test, validation and classify flame image which correspond with the state of the combustion process.
In present work comparison combined image classification method of co-firing biomass and pulverized coal are proposed. The images were captured by vision monitoring system with camera and a borescope. Presented research is related with 20% weight fraction of the biomass. Defined two class of combustion: stable and unstable for nine variants with different power, secondary air value parameters and fixed amount biomass. Used combined classification of algorithm (MLP, SVM, k-NN, LDA, QDA) to classify flame image which correspond with the state of the combustion process.
The method for evaluation of uncertainty in control by measurement systems with logical conditions under impact of parametric perturbations was proposed. The method is based on the linearization relay and logical transformations. Relay ones were linearized by harmonic method. Logical ones were linearized by arithmetic decomposition of logical function. Efficiency of method proved by comparison of results in simulation system.
This paper presents comparison image classification method of combustion biomass and pulverized coal. Presented research is related with 10% and 20% weight fraction of the biomass. Defined two class of combustion: stable and unstable for nine variants with different power, secondary air value parameters and fixed amount biomass. Used artificial neural networks and support vector machine to classify flame image which correspond with the state of the. combustion process.
This paper presents comparison image classification method of co-firing biomass and pulverized coal. Defined two class of combustion: stable and unstable for three variants with different power value parameters and fixed amount biomass. Used support vector machine to classify flame image which correspond with the state of the combustion process.
This paper presents comparison image classification method of co-firing biomass and pulverized coal. Defined two class
of combustion: stable and unstable for three variants with different power value parameters and fixed amount biomass.
Used Principal component analysis for determine the most important features that affect the state of the combustion
process.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.