Search Results

1 - 9 of 9 items :

  • Fundamentals of Mechanical Engineering x
Clear All
Automated evaluation of agricultural damage using UAV survey

References [1] Molnár, A., Stojcsics, D., Lovas, I., “Precision agricultural and game damage analysis application for unmanned aerial vehicles”, INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND INFORMATICS 1:(10) pp. 38-43. (2016) [2] Molnár, A., Stojcsics, D., “GPGPU accelerated large scale 3D object reconstruction application for fixed and rotary wing unmanned aerial vehicles”, INTERNATIONAL JOURNAL OF SYSTEMS APPLICATIONS - ENGINEERING & DEVELOPMENT 1:(10) pp. 189-194. (2016) [3] Harwin, S., Lucieer, A., “Assessing the Accuracy of

Open access
Application of Differential Games in Mechatronic Control System

References [1] Abu-Khalaf M., Huang J. and Lewis Frank. L. (2006): Nonlinear H 2 / H ∞ Constrained Feedback Control. – London: Springer. [2] Johnson Marcus A. (2011): Differential game-based control methods for uncertain continuous-time nonlinear systems . – Phd Thesis, University of Florida. [3] Starr A.W. and Ho Y.C. (1969): Nonzero-sum differential games . – Journal of Optimization Theory and Applications, vol.3, No.3, pp.184–206. [4] Willems Jan C. (1972): Dissipative dynamical systems part I: General theory . – Archive for

Open access
Decision Optimization of Machine Sets Taking Into Consideration Logical Tree Minimization of Design Guidelines

References Deptuła A. and Partyka M.A. (2010): Application of game graphs in optimization of dynamic system structures. - International Journal of Applied Mechanics and Engineering, vol.15, No.3, pp.647-656. Deptuła A. and Partyka M.A. (2012): Solving weight multivalent logic equations describing the design guidelines in discrete optimization of machine systems. - XLI Conference on Applications of Mathematics, Zakopane 2010, Institute of Mathematics PAN, Warsaw 2010. Filla R. and Palmberg J.O. (2003): Using

Open access
The analysis of the calculation process related to labyrinth sealing with extraction

References Anker J.E., Mayer J.F. and Casey M.V. (2012): Impact of rotor labyrinth seal leakage flow on the loss generation in an axial turbine engineering. - International Journal of Power and Energy Systems. - Procedings of the Institution of Mechanical Engineers, vol.219, Part A, pp.481-490. Bjorck A. and Dahlquist G. (1987): Numerical Methods (in Polish). - Warsaw: PWN. Gamal Eldin A.M. (2007): Leakage and rotordynamic effects of pocket damper seals and see-through labyrinth seals - Dissertation, Texas A

Open access
Application of Multi-Valued Weighting Logical Functions in the Analysis of a Degree of Importance of Construction Parameters on the Example of Hydraulic Valves

References Deptuła A. (2014): Optimization of machine systems using logic equations and graph-structures. - Dissertation- Department of Mechanical Engineering, Technical University of Opole. Deptuła A. (2011): Weighted logic equations design guidelines in discrete optimization of machine systems. - XL Conference on Applications of Mathematics, Zakopane 2011, Institute of mathematics PAN, Warsaw. Deptuła A. and Partyka M.A. (2010): Application of game graphs in optimization of dynamic system structures

Open access
Cooling of Exhaust Gases as a Possibility to increase Stealth Properties of Military Helicopters

References [1] Ansys: Modeling Turbulent Flows , Introductory FLUENT Training, 2006. [2] Grant, R., The Radar Game Understanding Stealth and Aircraft Survability , Mitchell Institute 2010. [3] Groninga, K., Development and implementation of the H-1 turned exhaust system , AHS, Texas 2005. [4] Fijałkowski, S., The Experiment – Based Analysis of the Infrared Emission by a Helicopter in Flight , IBTL Reports, Warsaw 2011. [5] Fijałkowski, S., Performance model of turbine engine exhaust cooler in extreme conditions helicopter

Open access
Inductive Decision Tree Analysis of the Validity Rank of Construction Parameters of Innovative Gear Pump after Tooth Root Undercutting

techniques and their application to diagnosis of acoustic condition of hydraulic machinery and equipment . – Archives of Civil and Mechanical Engineering, vol.13, No.3, pp.313-321. [13] Osiński P., Kollek W. and Wilczyński A. (2010): The use of a series of Renard in the design of hydraulic and pneumatic components . – Hydraulic and Pneumatic, No.6, pp.16-18. [14] Śliwiński P. (2014): Flow of liquid in flat gaps of the satellite motor working mechanism . – Polish Maritime Research, 2(82), vol.21, pp.50-57. [15] Deptuła A. (2015): Application of game

Open access
Using Gamification and Fear Appeal Instead of Password Strength Meters to Increase Password Entropy

Very Strong: Analyzing Password-Strength Meters 2014 , Conference ‘Network and Distributed System Security Symposium’, DOI: 10.14722/ndss.2014.23268 10.14722/ndss.2014.23268. [5] Das A., Bonneau J., Caesar M., Borisov N., Wang X., The tangled web of password reuse , Symposium on Network and Distributed System Security, 2014, Vol. 14, pp. 23–26. [6] Dell’Amico M., Michiardi P., Roudier Y., Password strength: An empirical analysis , Proceedings IEEE, INFOCOM, 2010, pp. 1–9. [7] Deterding S., Dixon D., Khaled R., Nacke L., From game design elements

Open access
Random Process Simulation Using Petri Nets


This paper introduces a Petri net designed for the simulation of the ancient game called Rock-Paper-Scissors or Roshambo. The network enables us to simulate the behavior of machine players and allows us to design and evaluate strategies against weighted random machine opponents. The paper also presents a theoretical calculus on winning chances. Simulations carried out using the software package Pipe (version 4.3.0) fully confirm the theoretical considerations.

Open access