Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "reliable" wg kryterium: Wszystkie pola


Tytuł:
Miarodajna metoda badania cytochemicznego aktywności arylsulfatazy w komórkach krwi i szpiku
Dostovernyjj metod citokhimicheskogo issledovanija aktivnosti arilsulfatazy v kletkakh krovi i kostnogo mozga
A reliable cytochemical method for detecting arylsulfatase activity in blood and bone marrow cells
Autorzy:
Szmigielski, S.
Michalewska, D.
Powiązania:
https://bibliotekanauki.pl/articles/2189287.pdf
Data publikacji:
1974
Wydawca:
Polskie Towarzystwo Diagnostyki Laboratoryjnej
Źródło:
Diagnostyka Laboratoryjna; 1974, 10, 1; 39-46
0867-4043
Pojawia się w:
Diagnostyka Laboratoryjna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Niezawodnościowe i diagnostyczne aspekty systemu eksploatacji maszyny papierniczej
Reliable and diagnostic aspects of paper machine maintenance system
Autorzy:
Zieliński, T.
Powiązania:
https://bibliotekanauki.pl/articles/327358.pdf
Data publikacji:
2004
Wydawca:
Polska Akademia Nauk. Polskie Towarzystwo Diagnostyki Technicznej PAN
Tematy:
niezawodność
diagnostyka
systemy eksploatacji maszyn papierniczych
reliability
diagnostics
paper machine maintenance system
Opis:
Jak pokazuje praktyka eksploatacyjna, w procesie produkcji papieru ważną rolę odgrywają systemy eksploatacji technicznej i technologicznej maszyny papierniczej. Wynika to z faktu, że największy procentowy udział w nieplanowanych postojach maszyn papierniczych stanowią postoje z przyczyn technologicznych i mechanicznych oraz że prawidłowa eksploatacja tych obiektów jest warunkiem osiągnięcia korzyści ekonomicznych nie tylko w aspekcie niezawodnościowym (zwiększona dyspozycyjność maszyn) i większej wydajności produkcji, ale także lepszej jakości wyrobu finalnego (papieru). Prezentowany artykuł naświetla całościowo w/w problematykę.
As one can see from an industrial maintenance practice, there is a very important role of technical and technological maintenance system in the paper production process. It results from the fact, that the most percentage share in the random breakdowns of paper machines make technological and mechanical breakdowns, as well as, that correct exploitation of these ones comes to the economical profits both in the reliable aspect (increased paper machine disposability) and productivity, and also better final product quality (paper). The paper elucidates, in the whole, these subject-matters.
Źródło:
Diagnostyka; 2004, 30, T. 2; 207-212
1641-6414
2449-5220
Pojawia się w:
Diagnostyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stochastic DEMATEL for structural modeling of a complex problematique for realizing safe, secure and reliable society
Autorzy:
Tamura, H.
Akazawa, K.
Powiązania:
https://bibliotekanauki.pl/articles/309469.pdf
Data publikacji:
2005
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
safe
secure and reliable society
structural modelling
stochastic DEMATEL
stochastic composite importance
Opis:
In this paper we propose a revised Decision Making Trial and Evaluation Laboratory (DEMATEL), called stochastic DEMATEL, to extract structural model of a complex problematique and to represent the priority of each factor taking into account the uncertainty of structure. In the stochastic DEMATEL, the uncertainty of structure is expressed as a stochastic model. From numerical experiments and experimental analyses, the following results are obtained: when the structure is uncertain, stochastic DEMATEL could extract the features of structure by the degree of dispatching influences and the degree of central role; stochastic composite importance could express the uncertainty of priority and decide the priority taking into account the attitude of the decision maker; pessimistic, neutral or optimistic.
Źródło:
Journal of Telecommunications and Information Technology; 2005, 4; 139-146
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Structural modeling and systems analysis of uneasy factors for realizing safe, secure and reliable society
Autorzy:
Tamura, H.
Akazawa, K.
Powiązania:
https://bibliotekanauki.pl/articles/309006.pdf
Data publikacji:
2005
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
safe
secure and reliable society
DEMATEL
structural modelling
systems analysis
Opis:
In this paper we try to extract various uneasy factors in our life. Then, we try to construct structural models among these factors using Decision Making Trial and Evaluation Laboratory (DEMATEL). For the purpose of analyzing priority among these factors we revised the DEMATEL and found effective factors to be resolved in order to realize future safe, secure and reliable (SSR) society.
Źródło:
Journal of Telecommunications and Information Technology; 2005, 3; 64-72
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new algorithm for calculating the most reliable pair of disjoint paths in a network
Autorzy:
Gomes, T.
Craveirinha, J.
Violante, A.
Powiązania:
https://bibliotekanauki.pl/articles/308916.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
reliability
OR in telecommunications
routing
Opis:
In various types telecommunication networks, namely mobile ad hoc networks, WDM networks and MPLS networks, there is the necessity of calculating disjoint paths for given node to node connections in order to increase the reliability of the services supported by these networks. This leads to the problem of calculating a pair of disjoint paths (or a set of disjoint paths) which optimises some measure of performance in those networks. In this paper we present an algorithm, designated as OptDP, for obtaining the most reliable pair of disjoint paths based on the loopless version of MPS, a very efficient k-shortest path algorithm, and on Dijkstra algorithm. Since to the best of our knowledge there is no other proposal of an algorithm capable of solving exactly the same problem we perform a comparison with the application to this problem of the DPSP algorithm which calculates a set of disjoint paths with high reliability. Also a comparison with a simplified version (designated as NopDP) of the proposed algorithm, which stops after a maximal number F of candidate pairs of paths have been found, is presented. The comparison also includes the percentage of cases in which both algorithms were not capable of finding the optimal pair.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 4; 31-38
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Decision support for extracting and dissolving consumers uneasiness over foods using stochastic DEMATEL
Autorzy:
Tamura, H.
Okanishi, H.
Akazawa, K.
Powiązania:
https://bibliotekanauki.pl/articles/309056.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
safe
secure and reliable society
structural modelling
decision support
stochastic DEMATEL
stochastic composite importance
Opis:
In this paper we try to extract consumers' uneasy factors on foods such as carcinogenic substance, bovine spongiform encephalopathy (BSE) problem, genetic recombination, etc., and try to construct structural models among these uneasy factors using stochastic DEMATEL. Stochastic DEMATEL is developed as a revised DEMATEL (Decision Making Trial and Evaluation Laboratory) to extract structural models of a complex problematique composed of many factors under uncertainty. For structural modeling of uneasy factors on foods we look at the binary relation such that "How much would it help to dissolve uneasy factor j by dissolving uneasy factor i?" Finally, we try to find the priority of dissolving each factor among all the uneasy factors based on the information of stochastic composite importance. This would contribute for decision support to dissolve uneasy feeling and to get sense of security on foods.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 4; 91-95
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Iris Finder - program for reliable iris localisation in images taken under visible light
Autorzy:
Sankowski, W.
Grabowski, K.
Zubert, M.
Napieralska, M.
Powiązania:
https://bibliotekanauki.pl/articles/333153.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
lokalizacja tęczówki
rozpoznawanie tęczówki
biometria
iris localization
iris recognition
biometry
Opis:
In this paper the Iris Finder program is presented for the first time. It is software for reliable iris localisation in images taken under visible light. The program is intended for researches on a system for automatic persons identification based on iris pattern. Performance of the software was verified on two databases. For the first database the program correctly localises iris for all 141 images. For the second database the iris was incorrectly localised only for 4 images from the entire database containing 1205 units.
Źródło:
Journal of Medical Informatics & Technologies; 2006, 10; 125-132
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optymalizacja struktury niezawodnościowej czujki temperatury w systemie bezpieczeństwa
Optimalisation of structure of reliable temperature sensor in a security system
Autorzy:
Paś, J.
Dąbrowski, T.
Powiązania:
https://bibliotekanauki.pl/articles/327860.pdf
Data publikacji:
2006
Wydawca:
Polska Akademia Nauk. Polskie Towarzystwo Diagnostyki Technicznej PAN
Tematy:
system bezpieczeństwa
czujka temperatury
symulacja komputerowa
security system
temperature sensor
computer simulation
Opis:
Każdy system bezpieczeństwa zainstalowany w obiekcie powinien posiadać podsystem sygnalizacji pożaru. Aby taki podsystem mógł wykonywać swoje zadania z określonym prawdopodobieństwem zdatności powinien posiadać optymalną strukturę wewnętrzną. W artykule zaproponowano, na podstawie symulacji komputerowej, określoną strukturę czujki temperatury, która wchodzi w skład systemu ochrony obiektu. Dla optymalnej struktury czujki temperatury zaproponowano rozwiązanie układowe gwarantujące wymaganą czułość oraz prawdopodobieństwo zdatności.
Each security system installed in an object should have a sub-system of fire security. Such a system should have an optimal internal structure so that it could perform its operation with a defined probability of avoioding damage. On the basis of computer simulation, the article proposes optimal structure of temperature sensor, which is part of a secured object. For an optimal structure of a temperature sensor, a project was proposed increasing sensibility and probability of avoiding damage.
Źródło:
Diagnostyka; 2006, 4(40); 93-100
1641-6414
2449-5220
Pojawia się w:
Diagnostyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A reliable synthesis of discrete-time Η∞ control. Part I: basic theorems and J-lossless conjugators
Autorzy:
Suchomski, P. J.
Powiązania:
https://bibliotekanauki.pl/articles/969759.pdf
Data publikacji:
2007
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
linear systems
discrete-time systems
Riccati equations
Η∞ methods
lossless systems
perturbation analysis
numerical methods
Opis:
The paper gives a basis for solving many problems of numerically reliable synthesis of sub-optimal discrete-time control in Η∞. The approach is based on J-lossless factorisations of the delta-domain chain-scattering descriptions of continuous-time plants being controlled. Relevant properties of poles and zeros of chain-scattering models are given. Necessary and sufficient conditions for the existence of stabilising J-lossless conjugators are presented and discussed. Some aspects of numerical conditioning of synthesis of such conjugators are considered. A numerical example illustrating synthesis of stabilising right J-lossless conjugators is also included.
Źródło:
Control and Cybernetics; 2007, 36, 1; 97-141
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczne i niezawodne metody akwizycji i archiwizacji danych telemetrycznych na przykładzie Systemu Wydobywczego BOT KWB "Bełchatów" SA
Safe and reliable methods of acquiring and archiving telemetring data on example Mining System in BOT KWB Bełchatów SA
Autorzy:
Kołodziejczak, M.
Powiązania:
https://bibliotekanauki.pl/articles/350673.pdf
Data publikacji:
2007
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
system automatyki
akwizycja danych
archiwizacja danych
bezpieczeństwo danych
wizualizacja
automation system
acquiring data
storing data
safe archiving data
visualization
Opis:
W artykule omówiono mechanizmy akwizycji i archiwizacji danych w systemach telemetrycznych na przykładzie Systemu Wydobywczego pracującego w BOT KWB "Bełchatów" SA. W opracowaniu przedstawiono rozwiązania zastosowane w warstwie komunikacyjnej systemu, wykorzystujące rezerwowe kanały łączności, zapewniające niezawodne przesyłanie informacji z poszczególnych maszyn i przenośników odkrywki do obiektowej i centralnej bazy danych. Omówiono także przetwarzanie, wizualizację i udostępnianie tych informacji dyspozytorom, inżynierom systemu oraz służbom eksploatacyjnym. Zaprezentowano również mechanizmy i rozwiązania techniczne, które gwarantują wysokie bezpieczeństwo przechowywania danych w Systemie Wydobywczym, zarówno w przypadku awarii dowolnego elementu systemu, jak i w sytuacji utraty łączności wewnątrz jego struktury.
The paper contains a description of acquiring and archiving data in telemetry system on example Mining System in BOT KWB "Bełchatów" SA. This article describes solutions which are used in communications layers of system, using redundant communication channel, which guarantee reliability transmitting signals from machines and conveyors in strip mine to field and central databases. There is also a description of data processing, visualization and making this data available to dispatchers, engineers and maintenance services. This paper presents also mechanisms and technical solutions, which guarantee safe storing data in Mining System, in case of any element failure in the system or losing communications inside system.
Źródło:
Górnictwo i Geoinżynieria; 2007, 31, 2; 381-385
1732-6702
Pojawia się w:
Górnictwo i Geoinżynieria
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of the industrial automation standards and methodologies for reliable and continuous European food traceability system
Autorzy:
Szewczyk, R.
Rzeplińska, K.
Winiarski, W.
Powiązania:
https://bibliotekanauki.pl/articles/384242.pdf
Data publikacji:
2008
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
food traceability
telemetry
Opis:
Recent traceability requirements create necessity of organization of the food production process in the completely new way. This way of production organization is typical rather for large industry, than for traditional way of work at the rural areas. This fact generates tensions as well as resistance of the farmers, especially farmers working in traditional way. This paper presents new ideas of industrial application of automation standards and methodologies for reliable, robust and user-friendly food traceability system. Due to the high level of automation and application of industrial IT solutions together with multimodal data transmission, presented traceability system can be implemented in traditional food production farms and operated intuitively by personnel without specialized training. As a result application of presented system will signifi-cantly reduce tensions and resistance connected with implementation of new technologies in tradi-tional food production farms.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2008, 2, 3; 55-57
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is the information contained in coin designs fully reliable?
Czy informacje zawarte w stemplach monet są w pełni wiarygodne?
Autorzy:
Suchodolski, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/16530164.pdf
Data publikacji:
2008
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
design
thaler
dinar
denar
imitation
immobilization
Opis:
It is widely believed that the data contained in coin designs are fully reliable. In fact, the metrical data, i.e. information about the issuer, place and time of mintage are not always accurate. This can be the case of modern or even almost contemporary coins. Dates on coins happened not to be updated under Russian partition, German occupations during the WW II and Russian occupation in Polish People Republic. Unmatched record are thalers with an image and name of the Empress Maria Theresa (d. 1780) minted in large quantities in different countries with the same design for two hundred years. Although a similar situation could have existed in the early Middle Ages, we are lacking written sources to confirm that. The very coins are thus the only source. There are two main reasons why designs, these certificates of coins, happened to be false: first, because foreign coin designs were imitated; second, because own coin designs were not changed and thus underwent immobilization. In the first case, coins with the best reputation were imitated: Roman, Byzantine, Anglo-Saxon and Cologne coins, but also gold Arabic dinars. The best known examples of immobilized coins are Carolingian and Saxon pennies and pfennings with the names of the King Otto III and the Empress Adelheid. The latter were minted in large quantities for more than half a century. Therefore they were imitated both in Saxony and Poland, where also Anglo-Saxon, Bavarian and Czech patterns were copied. The best way to identify the real issuer, place and time of issuing of various imitations is to examine the die-links between these imitations and coins with ascertained designs. Nevertheless, sometimes new information contained in the designs of coins, and not taken from outside or from the past, is false. Good example are the twelfth / thirteenth century regional issues of a number of dukes in Poland who did not possess the right of minting. Therefore they issued coins with the names and images of their late fathers or even earlier ancestor. Errors in identifying coins may, however, arise not only from entrusting the false certificates, but also because of the improper interpretation of the designs. It is assumed, for example, that the legends explain the images from the field. In fact, words and images were separate elements that did not have to match. Falsifying legends occurred more frequently than one might expect in different times and on various territories. The driving force behind such actions was mainly economic, and sometimes also political. Accidents also played role. Therefore one must first thoroughly examine a coin, before he makes an attempt to interpret it as a historical source. Slightly extended version of this text in Polish was to appear in the publication of materials from the conference Money and Banking in Great Poland held in Poznań on 20-21 November 2008 (35 figures).
Źródło:
Wiadomości Numizmatyczne; 2008, 52, 2(186); 117-138
0043-5155
Pojawia się w:
Wiadomości Numizmatyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Calculation of reliable transcript levels of annotated genes on the basis of multiple probe-sets in Affymetrix microarrays
Autorzy:
Jaksik, Roman
Polańska, Joanna
Herok, Robert
Rzeszowska-Wolny, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1040584.pdf
Data publikacji:
2009
Wydawca:
Polskie Towarzystwo Biochemiczne
Tematy:
multiple probe-sets
Affymetrix microarrays
transcript profiles
outlier detection
NucleoDix computer program
Opis:
Microarray methods have become a basic tool in studies of global gene expression and changes in transcript levels. Affymetrix microarrays from the HGU133 series contain multiple probe-sets complementary to the same gene (4742 genes are represented by more than one probe-set in a microarray HGU133A). Individual probe-sets annotated to the same gene often show different hybridization signals and even opposite trends, which may result from some of them matching transcripts of more than one gene and from the existence of different splice-variant transcripts. Existing methods that redefine probe-sets and develop custom probe-set definitions use mathematical tools such as Matlab or the R statistical environment with the Bioconductor package (Gentleman et al., 2004, Genome Biol. 5: 280) and thus are directed to researchers with a good knowledge of bioinformatics. We propose here a new approach based on the principle that a probe-set which hybridizes to more than one transcript can be recognized because it produces a signal significantly different from others assigned to the particular gene, allowing it to be detected as an outlier in the group and eliminated from subsequent analyses. A simple freeware application has been developed (available at www.bioinformatics.aei.polsl.pl) that detects and removes outlying probe-sets and calculates average signal values for individual genes using the latest annotation database provided by Affymetrix. We illustrate this procedure using microarray data from our experiments aiming to study changes of transcription profile induced by ionizing radiation in human cells.
Źródło:
Acta Biochimica Polonica; 2009, 56, 2; 271-277
0001-527X
Pojawia się w:
Acta Biochimica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Contribution to reliability analysis of highly reliable items
Autorzy:
Valis, D.
Vintr, Z.
Koucky, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069674.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
highly reliable item
reliability analysis
field data assessment
Opis:
In recent years the intensive efforts in developing and producing electronic devices have more and more critical inference in many areas of human activity. Engineering is one of the areas which have been also importantly affected. The paper deals with dependability namely reliability analysis procedure of a highly reliable item. The data on manufacturing and operating of a few hundred thousands pieces of electronic item are available and they are statistically a very important collection/set. However, concerning some items the manufacturing procedure was not checked and controlled accurately. The procedure described in the paper is based on the thorough data analysis aiming at the operating and manufacturing of these electronic elements. The results indicate some behaviour differences between correctly and incorrectly made elements. It was proved by the analysis that dependability and safety of these elements was affected to a certain degree. Although there is a quite big set of data the issue regarding the statistical comparability is very important.
Źródło:
Journal of Polish Safety and Reliability Association; 2009, 2; 367-372
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Direct unavailability calculations of highly reliable systems
Autorzy:
Briš, R.
Powiązania:
https://bibliotekanauki.pl/articles/2069684.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
highly reliable system
unavailability
acyclic graph
Opis:
The paper presents a new analytical algorithm which is able to carry out direct and exact reliability quantification of highly reliable systems with maintenance (both preventive and corrective). A directed acyclic graph is used as a system representation. The algorithm allows take into account highly reliable and maintained input components. All considered models are implemented into the new algorithm. The algorithm is based on a special new procedure which permits only summarization between two or more non-negative numbers that can be very different. If the summarization of very small positive numbers transformed into the machine code is performed effectively no error is committed at the operation. Reliability quantification is demonstrated on a real system from practice and on its highly reliable modifications. The selected system is frequently used system - high pressure injection system occurring in many late references.
Źródło:
Journal of Polish Safety and Reliability Association; 2009, 1; 67--76
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies