By Topic

The 10th International Conference on Digital Technologies 2014

9-11 July 2014

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1724 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1567 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Conference workshops

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1419 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Introduction

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Smart phone users: Are they green users?

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Smart phones by now have overwhelmed the mobile phone market, to the point that it becomes increasingly difficult to find an “old-type”, classical, feature phone. Although they offer a wealth of features and services to their users, they are far more power hungry, requiring to be charged almost daily! At the same time many interesting questions arise, in regards to their users: Are t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristics for improving the solution of p-median location problem with Erlenkotter approach

    Publication Year: 2014, Page(s):7 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    This paper deals with the problem of designing the optimal structure of a public service system. The problem can be often formulated as a p-median location problem. Solving the p-median location problem in the public service system design is NP-hard problem. Real instances of the problem are characterized by big number of possible service center locations, which can take the value of several hundr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic network-based approach to infrastructure safety assessment with human factor consideration

    Publication Year: 2014, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    The combinations of low probability events (hardware and software faults, anomalous nature events, human operator errors) cause the infrastructure accidents and disruptions. There are different approaches for evaluation of human operator's reliability. Multi-factor analysis is the essential step for obtaining the trustworthiness estimations of infrastructure's safety. The application of Bayesian B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic reliability modelling — Applications in gas industry

    Publication Year: 2014, Page(s):18 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    One of the main problems in reliability assessment of a complex dynamic system is to take into account dependencies of the system structure resulting from changes of its physical parameters. The aim of this paper is to provide the mathematical model of actual natural gas compression station which is situated in the Czech Republic. The Czech Republic represents one of the European transit countries... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent advances in mesh-based modeling of individual cells in biological fluids

    Publication Year: 2014, Page(s):25 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    The problem of modeling blood flow can be approached on different levels of accuracy. We investigate a model consisting of two major components: the fluid representing blood plasma and the elastic objects representing all types of cells in blood, e.g. red blood cells. The elastic objects are immersed in the fluid and they interact with each other. Our research is focused on spring-network models o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WebRTC quality assessment: Dangers of black-box testing

    Publication Year: 2014, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB)

    We expect that WebRTC will experience high adoption rate as a peer-to-peer realtime communication standard for browsers. WebRTC allows direct media and data transport between browsers without having to go through a web server. In this study, we use a black-box testing technique to evaluate, via PESQ, the voice quality of WebRTC sessions under varying network delay and jitter. Network emulators are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of primary computer and information literacy among pupils attending elementary school

    Publication Year: 2014, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    The goal of this conference paper is to give information about the problematics of primary computer and information literacy among pupils attending elementary school. Furthermore the paper describes a process of making and evaluating of an accomplished survey which aim was to analyze a present state of primary computer and information literacy by a form of questionnaire. Literacy as a concept is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-aided analysis of induced sheath voltages in high voltage power cable system

    Publication Year: 2014, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    This paper concerns the effect of configuration of high voltage power cables on induced voltages in their metallic sheaths. One, two or three cables per phase and phase sequence of the cables are considered. Computing of the voltages was performed for a normal operation and in case of earth fault. Various ways of the sheaths bonding are considered as well. Shock hazard and voltage stress of non-me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of power systems considering conventional and alternative sources of energy

    Publication Year: 2014, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Several methods, tools and measures have been developed which highlight the questions about the power systems reliability each from its particular viewpoint. The objective is to review the selected methods in the field of electric power system reliability keeping in mind the complexity of the system and its features. Their review is performed in sense of applicability to conventional sources of en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel selection in home 802.11 standard networks

    Publication Year: 2014, Page(s):57 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    WiFi is one of the most popular wireless standard today. However its popularity is killing itself. The number of local networks dramatically arises and as results one can achieve much worse parameters then expected if taking into accounts the devices and different 802.11 standards specifications. One of the main reasons is interference. The authors test two real networks and make an optimisation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety-related instrumentation and control systems and a problem of the hidden faults

    Publication Year: 2014, Page(s):64 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    This paper is dedicated to a problem of the hidden faults associated with development of the computer systems in form of their transformation into safety-related instrumentation and control systems. The hidden faults do not allow ensuring functional safety by construction of fault tolerant digital component without consideration of their checkability. Increase of checkability by imitation of accid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things

    Publication Year: 2014, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    With an estimated 50 billion internet-enabled devices deployed by 2020, the arrival of the Internet of Things (IoT) or Internet of Everything (IoE) raises many questions regarding the suitability and adaptability of current computer security standards to provide privacy, data integrity and end entity authentication between communicating peers. In this paper we present a new protocol which combines... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reliability measures assessment for the air conditioning system with rental equipment working in heavy weather conditions: Lz-transform approach

    Publication Year: 2014, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    In this paper we present the model for estimation reliability measures of reserved of air-conditioning systems for hotels, apartments, offices or cooling rooms that have a specific regime of temperature/humidity conditions, which described as stochastic process. In this reservation mode the demand of the required temperature and humidity condition is provided by aging cooling generator (air-condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of voice operated service for Žilina local transport timetable

    Publication Year: 2014, Page(s):78 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Spoken Dialogue Systems (SDSs) are computer based systems developed for providing voice services by using automatic speech recognition and text-to-speech technologies. In this paper, a design, development and implementation of a new application to the existing Slovak SDS called IRKR_UNIZA is introduced. The new service provides information about urban transport (local bus timetables) in Ži... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of custom-made implants using industrial computed tomography

    Publication Year: 2014, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    Verification of custom-made implants manufactured using the additive manufacturing technologies is the key task to be fulfilled prior to the clinical application of an implant. It consists of parameters verification within individual steps, from a software design, through manufacturing, surface finishing, up to finalisation of a medical product. The use of additive technologies facilitates the man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable multi-GPU cloud raytracing with OpenGL

    Publication Year: 2014, Page(s):87 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1689 KB) | HTML iconHTML

    Using skyboxes with pre-generated cube-map textures is a popular approach to visualize distant details in computer games and other semi-realistic outdoor area simulations. This approach is so common that graphics hardware has direct suport for cube-mapping. One of the challenges with using skyboxes is the creation of realisticlly looking sky cube-map textures. In this paper we present cloud trace ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical decision support system for evaluation of risk of mortality of patients undergoing colorectal surgery

    Publication Year: 2014, Page(s):96 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Medical survival censored data of 524 patients were evaluated in order to: (1) compare two types of surgical techniques and (2) develop the integrated survival model, who can adjust for other patients characteristics. Evaluated data come from patients who underwent colectomy in the University Hospital in Ostrava. There are used two basic surgical techniques for the colectomy: either classical (ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.