AUTOMATYKA
Permanent URI for this communityhttps://repo.agh.edu.pl/handle/AGH/102759
Tytuł archiwalny!
- Adres wydawniczy: Kraków : Wydawnictwa AGH, 1997-2019
- ISSN: 1429-3447 e-ISSN: 2353-0952
- Zmiana tytułu w 2012: Automatyka / Automatics
Automatyka/Automatics is a continuation of a non-periodic series Zeszyty Naukowe AGH - Automatyka started in 1966, which included 67 volumes till 1994. Since 1997 the journal is published in a semiannual cycle.
Browse
733 results
Filters
Advanced Search
Filter by
Settings
Search Results
Now showing 1 - 10 of 733
Item type:Article, Access status: Open Access , Kronika i informacje(Wydawnictwa AGH, 2016) Mitkowski, WojciechItem type:Article, Access status: Open Access , Modelling of Unmanned Aerial Vehicle - Tricopter(Wydawnictwa AGH, 2016) Źrebiec, JakubThis paper presents detailed models of small aerial unmanned vehicle's subsystems like propeller, BLDC motor or Li–poly batery. Furthermore, more accurate dynamic model of Tricopter is described. This, multi–system model can be used to synthesize pecise controller which may have the advantage in hazardous situations.Item type:Article, Access status: Open Access , Kronika i informacje(Wydawnictwa AGH, 2016) Mitkowski, WojciechItem type:Article, Access status: Open Access , On D-decomposition of periodically sampled systems(Wydawnictwa AGH, 2017) Jańczak, JustynaThe problem of the stability of non-uniformly sampled systems is considered. For this purpose, the D-decomposition method for determining the stability region in parameter space is investigated. Moreover, basic information about non-uniform sampling are presented, with an emphasis on periodic sampling. Based on the obtained simulation results, some comparisons of systems with different sampling patterns are considered.Item type:Article, Access status: Open Access , Supervising control system for oriented PV using weather forecasts(Wydawnictwa AGH, 2017) Ciurej, MaciejThis paper is devoted to the problem of controlling an oriented PV using weather forecasts. The described solution presents the use of fuzzy logic fundamentals in order to increase the efficiency of a PV system. It differs from most related papers in the fact that it uses fuzzy logic in order to process weather condition numeric values as input data. All of necessary steps to reproduce the proposed solution have been included.Item type:Article, Access status: Open Access , The use of EMG signal in human-machine interface(Wydawnictwa AGH, 2015) Winiarski, DawidIn this paper, the analysis and processing algorithms of EMG signals have been presented. The main purpose of the research was to verify the usefulness of EMG signals in controlling a bionic prosthesis or exoskeleton. The physiological nature of the EMG signal has been introduced. An original measurement system has been presented. Analysis of the time and frequency domains of the signal has been conducted to extract vital information that the signal carries. Methods of using the EMG signal as a control signal for devices that operate in a human-machine interface have been proposed. The result shows that a processed EMG signal can be used as a basis for a simple control system.Item type:Article, Access status: Open Access , Online environment for data acquisition from car sensors(Wydawnictwa AGH, 2019) Kowalik, Bartosz; Szpyrka, MarcinModern cars are equipped with plenty of electronic devices called electronic control units (ECUs). They collect diagnostic data from a car’s components to control their work, assess the quality of their work, and detect defects. Regardless of the development of onboard computers, only a small amount of information is passed on to the driver. This paper describes how to build a data-collecting environment for real-data acquisition from a car. The system (whose components include an Android- -based smartphone and Torque PRO application) is able to send data via the Internet to a chosen server in real time. The collected data can be further analyzed both online and offline.Item type:Article, Access status: Open Access , Wspomnienie o doktorze inżynierze Piotrze Tabakowskim(Wydawnictwa AGH, 2015) Turnau, AndrzejItem type:Article, Access status: Open Access , Design, construction and control of a spherical rolling robot with internal two-wheel cart(Wydawnictwa AGH, 2015) Firlej, SzymonThis elaboration presents a spherical rolling robot with a 2-wheel cart. The custom design of the hardware and control software is presented to demonstrate the solution. The robot was started to realize an autonomous task. The embedded robot control system is based on a 32-bit microcontroller and uses a Bluetooth module for wireless communication. The simplified model has been proposed and its parameters identified. The results obtained at the simulation and experimental stages are shown and compared. Finally, the robot’s motion was recorded and analyzed with the support of image signal processing techniques.Item type:Article, Access status: Open Access , Asymmetric cryptography and trapdoor one-way functions(Wydawnictwa AGH, 2016) Krzyworzeka, NataliaThe asymmetric-key (public-key) encryption scheme is considered to be the most important discovery in the history of cryptography. It is based on the use of two complementary keys generated according to a chosen trapdoor one-way function (TOWF). Since its first implementation, asymmetric encryption has revolutionized our way of communicating as well as the safety of information transfer, and it is now widely used around the world for various purposes, especially in the field of online transaction security. The safety of the asymmetric-key scheme relies on the assumption that any known cryptographic attack using an efficient problem-solving algorithm will not be able to succeed in applying the inverse (decryption) function onto the cryptogram in a polynomial time without additional knowledge (secret information). The most-challenging aspect of creating a new asymmetric cryptographic algorithm is selecting a one-way function for encryption purposes and finding a trapdoor in its inverse. In this paper, the concept of public-key cryptography will be explained using the RSA algorithm as an example. In addition, the review of the most-important functions that are considered to be trapdoor one- -way functions will be conducted.
