The research was aimed at analysing the factors that affect the accuracy of merging point clouds when scanning over longer distances. Research takes into account the limited possibilities of target placement occurring while scanning opposite benches of quarries or open-pit mines, embankments from opposite banks of rivers etc. In all these cases, there is an obstacle/void between the scanner and measured object that prevents the optimal location of targets and enlarging scanning distances. The accuracy factors for cloud merging are: the placement of targets relative to the scanner and measured object, the target type and instrument range. Tests demonstrated that for scanning of objects with lower accuracy requirements, over long distances, it is optimal to choose flat targets for registration. For objects with higher accuracy requirements, scanned from shorter distances, it is worth selecting spherical targets. Targets and scanned object should be on the same side of the void.
The issue of waste management in terms of environmental protection is one of the important problems facing humanity, especially in the large agglomeration areas, and in the rural area, the interests are more limited.
The present paper presents theoretical aspects regarding the implementation of an integrated waste management system in the rural area.
The aim of the paper is to assess the values of shear (delaminating) stress in the composition plane between the concrete (RC) deck slab and wood girder from concrete shrinkage, and shrinkage and swelling of wood, as well as difference in temperature between the wood web and concrete slab.
Marian Pompiliu Cristescu, Julian Andreev Vasilev, Miglena Velichkova Stoyanova and Ana-Maria Ramona Stancu
This paper presents how to use the Capability Maturity Model Integration (CMMI) in software engineering modeling processes. Any variation of CMMI, depending on the scope of application, can also be used to assess the process maturity of an organization. Regarding the Software Reliability Engineering (SRE) process, the activities in the SRE process have been briefly described, noting that the application of SRE in all software-based products leads to good control over the development process.
The beginning of the twenty-first century represents the beginning of the Fourth Industrial Revolution, which, unlike its predecessors, is characterized by great digitalization, higher connections between physical things and the virtual world, the development of genetics, artificial intelligence, hyper connectivity. These characteristics have generated many changes in the way work is performed. In order to meet these challenges, employees must increase their flexibility in the way they perceive work time, wages, tasks, workspace and so on. And, in an era of technology and digitalization, employees must keep their skills and knowledge, related to new technology, up to date. Several other aspects related to employability will be discussed in this article.
The authors developed the definition of construction defect and fault and construction defect management based on Polish and foreign publications. In order to assist identification of faults and their analysis in the process of home collection, the authors applied the Case Based Reasoning (CBR) method. In the paper, the authors used Case Based Reasoning (CBR) to support acceptance of apartments. The CBR method allows to determine the magnitude of global similarity for the problem under consideration between the new and old case from the Case Base, using weighted sums of local similarities using criteria weights as coefficients. As a result of CBR-based solutions, an Employer’s representative receives information about the type of construction defects that can be expected, their location and significance, occurrence frequency, and estimated repair cost.
The latest military actions carried out at global level have highlighted, besides the number, the quality and diversity of the participants in the multinational operations and the differences, not at all negligible, regarding the capabilities of these actors to participate in military actions characterized by a high technical level and technologically, but not only. One of the areas that generated a real lack of standardization, with obvious impact on the operational compatibility of the various participants was that of communications and informatics and, implicitly, of the insurmountable differences between different information subsystems as parts of the information systems of the multinational operations. From this perspective, it became evident that the performance of each participant in the military actions of a multinational character was and we consider that it will be permanently conferred by their technical ability to cope with the information avalanche and to integrate into the information system of the mission.
The paper proposes the exploration, identification and development of a Java solution for extracting the sentiment related to the cryptocurrencies phenomenon, from the content of the posts of certain popular social networks.
Detecting the positive, neutral or negative character of the sentiment is adopted as a relevant method of establishing the nature of the human perception on the topical issue defined by cryptocurrencies.
The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).
The objective of this paper is to design and implement a logic circuit prober to display truth tables of a three input combinational logic circuit. The truth table is to be as “1” and “0” on an ordinary 60 MHz oscilloscope. This paper meets this objective by using Lissajous Patterns to plot a “0” or a “1” on the oscilloscope screen. To plot a “0” on the oscilloscope screen, two sinusoidal signals in quadrature are supplied to the two inputs of the oscilloscope with the scope set to X-Y mode. To plot a “1” on the oscilloscope, only the signal to the Y input is allowed to reach the oscilloscope screen. To display all the 32 patterns required to obtain a three input truth table, two staircase waveforms are employed. The staircase waveforms, one eight-step and the other four-step, are added to the two sinusoidal signals to shift the patterns along the X and Y directions to produce all the 32 patterns.