Decentralized Control of Traffic Signals with Priority for Ambulances Marcin LEWANDOWSKI, Bartłomiej PŁACZEK, Marcin BERNAŚ pp. 9-17 Abstract...
In this paper delays and average travel times of vehicles are analyzed for various decentralized traffic control algorithms that can provide priority for ambulances. Decentralized control strategy is scalable and can be used in road networks where traffic lights are controlled autonomously for multiple intersections of different types. The experiments were performed in a realistic simulation model of complex road network, which is typical for European cities. It was shown that utilization of detailed traffic data from vehicular sensor network significantly improves the performance of signal control algorithms. After proper selection of algorithm parameters, the decentralized control strategy not only provides a quick transition of ambulances, but also has minimal effect on the delay of non-priority
vehicles. Research for mesh road network organization has been performed in previous work. |
 |
 |
Estimation of Information Entropy Based on its Visualization Marcin CHOLEWA, Małgorzata PAŁYS pp. 18-25 Abstract...
This paper describes the method which allows an estimation of information entropy in the meaning of Shannon. The method is suitable to an estimation which sample has a higher value of information entropy. Several algorithms have been used to estimate entropy, assuming that they do it faster. Each algorithm has calculated this value for several text samples. Then analysis has verified which comparisons of the two samples were correct. It has been found that the probabilistic algorithm is the fastest and most effective in returning the estimated value of entropy. |
 |
 |
Hybrid Verification Method Based on Finger-Knuckle Analysis and Keystroke Dynamics Tomasz Emanuel WESOŁOWSKI, Hossein SAFAVERDI, Rafał DOROZ, Krzysztof WRÓBEL pp. 26-36 Abstract...
The increasing number of personal data leaks becomes one of the most important security issues
hence the need to develop modern computer user verification methods. In the article, a potential of biometric methods fusion for continuous user verification was assessed. A hybrid approach for user verification based on fusion of keystroke dynamics and knuckle images analysis was presented.
Verification is performed by a classification module where an ensemble classifier was used to verify the identity of a user. A proposed classifier works on a database which comprises of knuckle images and keyboard events for keystroke dynamics. The proposed approach was tested experimentally. The obtained results confirm that the proposed hybrid approach performs better than methods based on single biometric feature hence the introduced method can be used for increasing a protection level of computer resources against forgers and impostors. The paper presents results of preliminary research conducted to assess the potential of biometric methods fusion. |
 |
 |
Gaussian Pyramid Reduction Metod for the Extraction of Pathological Structures of the Aorta Ewelina SOBOTNICKA, Aleksander SOBOTNICKI, Janusz JEŻEWSKI pp. 37-44 Abstract...
An analysis of the biomedical image in one scale may result in the loss of information contained in the image during an analysis in a different scale. This issue can be solved by an analysis performed simultaneously in all scales, which can be done through the application of the pyramid reduction method. The pyramid makes it possible to obtain images at various levels of detail, including significant information. The paper discusses the method of processing biomedical images of the aorta with the use of the pyramid reduction method, as well as the way in which the results can be used in the segmentation process. The Gaussian pyramid reduction method was used for pyramid representation, whereas the segmentation process was performed with the split and merge method. |
 |
 |