Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Algimantas Valinevicius is active.

Publication


Featured researches published by Algimantas Valinevicius.


Sensors | 2016

Dynamic Vehicle Detection via the Use of Magnetic Field Sensors.

Vytautas Markevicius; Dangirutis Navikas; Mindaugas Zilys; Darius Andriukaitis; Algimantas Valinevicius; M. Cepenas

The vehicle detection process plays the key role in determining the success of intelligent transport management system solutions. The measurement of distortions of the Earth’s magnetic field using magnetic field sensors served as the basis for designing a solution aimed at vehicle detection. In accordance with the results obtained from research into process modeling and experimentally testing all the relevant hypotheses an algorithm for vehicle detection using the state criteria was proposed. Aiming to evaluate all of the possibilities, as well as pros and cons of the use of anisotropic magnetoresistance (AMR) sensors in the transport flow control process, we have performed a series of experiments with various vehicles (or different series) from several car manufacturers. A comparison of 12 selected methods, based on either the process of determining the peak signal values and their concurrence in time whilst calculating the delay, or by measuring the cross-correlation of these signals, was carried out. It was established that the relative error can be minimized via the Z component cross-correlation and Kz criterion cross-correlation methods. The average relative error of vehicle speed determination in the best case did not exceed 1.5% when the distance between sensors was set to 2 m.


information technology interfaces | 2006

Analysis of communication channels of the dwelling control system

D. Eidukas; Algimantas Valinevicius; Sarunas Kilius; Rimantas Kavaliunas; Rimantas Plestys; Gytis Vilutis

The dwelling control system enables an inhabitant to monitor, control and obtain information on the statuses of power, heat, water supply and other equipment located in the house. The system allows taking care of a dwelling remotely, improving security of a dwelling and reduce costs and time required for dwelling maintenance. For control different controllers able to transfer information and receive commands by short messages (SMS), mobile phone with WAP, Internet and etc. frequently are used. When selecting communication channel it is also important to assess its reliability and message transmission time, since that determines the efficiency of the dwelling security


information technology interfaces | 2005

Intelligent building information network loading and efficiency evaluation

D. Eidukas; Algimantas Valinevicius; Sarunas Kilius; Rimantas Kavaliunas; Rimantas Plestys; Gytis Vilutis

As the result of the increase of households, which have a computer, the number of Internet users increased too. Greater throughput and permanent connection of a computer to the Internet enables the users to get more and more qualified services. The development of new Internet services and the use of the Internet to transmit important messages raise quite high requirements to the quality and reliability of the connection. As there is a high increase of Internet users, it is very important to predict the load of network during the network development. Some problems appear when there is a need to find the transfer rate of services that reaches the users through local network because networks throughput is divided to the users dynamically and the number of connected users, at the same time, always changes.


information technology interfaces | 2004

Optimizing strategic control of integrated security systems

Mindaugas Zilys; Algimantas Valinevicius; D. Eidukas

The motivation to write this work was induced by the need to evaluate the parameters of security systems, to analyze in detail the processes, which occur in security system evaluation and suggest the possible ways of their optimization. The concept, which is formulated, enables strategic control of integrated security systems (ISS) considering from the influence-reaction parameter point. Reaction strategy algorithm selection allows minimizing reaction time to danger influence and maximizing efficiency of security system. Modern computer technologies allow real time strategies simulation and ISS reaction control. The analysis of the event streams experimental data and integrated security systems net model simulation algorithms enable the further development and perfection of the security system


information technology interfaces | 2004

Information flow model of integrated security system

Algimantas Valinevicius; Mindaugas Zilys; D. Eidukas

The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems


Sensors | 2017

Vehicle Speed and Length Estimation Using Data from Two Anisotropic Magneto-Resistive (AMR) Sensors

Vytautas Markevicius; Dangirutis Navikas; Adam Idzkowski; Algimantas Valinevicius; Mindaugas Zilys; Darius Andriukaitis

Methods for estimating a car’s length are presented in this paper, as well as the results achieved by using a self-designed system equipped with two anisotropic magneto-resistive (AMR) sensors, which were placed on a road lane. The purpose of the research was to compare the lengths of mid-size cars, i.e., family cars (hatchbacks), saloons (sedans), station wagons and SUVs. Four methods were used in the research: a simple threshold based method, a threshold method based on moving average and standard deviation, a two-extreme-peak detection method and a method based on the amplitude and time normalization using linear extrapolation (or interpolation). The results were achieved by analyzing changes in the magnitude and in the absolute z-component of the magnetic field as well. The tests, which were performed in four different Earth directions, show differences in the values of estimated lengths. The magnitude-based results in the case when cars drove from the South to the North direction were even up to 1.2 m higher than the other results achieved using the threshold methods. Smaller differences in lengths were observed when the distances were measured between two extreme peaks in the car magnetic signatures. The results were summarized in tables and the errors of estimated lengths were presented. The maximal errors, related to real lengths, were up to 22%.


2009 Second International Conference on Advances in Circuits, Electronics and Micro-electronics | 2009

Traffic Image Processing Systems

Tadas Surgailis; Algimantas Valinevicius; Mindaugas Zilys

This paper is about image processing systems and its ability to use in traffic surveillance and analysis. Growing car number is cause of bigger traffic jams and city pollution. With intelligent vision systems we can control traffic and reduce this problem. These systems have tremendous perspective. This paper presents the fundamental principles of traffic image processing system in moving object detection and extraction.


information technology interfaces | 2008

Crossroads load modelling

K. Balsys; Algimantas Valinevicius; Mindaugas Zilys

The main purpose of this article is to evaluate the impact of newly emerging big leisure and shopping centers with spacious parking in the cities to the traffic flows. The experiment was performed for this purpose. The results of this experiment were used for forecasting the traffic flows. After performing the traffic flow forecasting, the results were used in the development of the crossroad model. By applying the developed crossroad model we could perform the modelling and identify the impact of the released different traffic flows from parking to the transport flows in crossroads.


international conference on methods and models in automation and robotics | 2016

Computer vision system for defects detection in PET preform

Andrius Laucka; Darius Andriukaitis; Algimantas Valinevicius; Dangirutis Navikas

The computer vision systems are mainly devoted for production monitoring in quality inspection systems. It is the fastest growing and most popular non-invasive product defects detection method. The productivity of electronic components growth and their prices decline creates favorable conditions for the development of image processing systems for industrial production. The food industry is one of the main industries. Production volumes grow along with human population growth. Containers for food industry are made in very large quantities and demand on quality inspection system plays important role. An automated computer vision system was developed for the control of PET preparation quality. The implementation of the designed system was presented in this article. The system used for image processing algorithms to inspect the lateral and upper parts of the workpiece. The system is designed according to its operating parameters. Reached throughput is 10,000 workpieces per hour.


information technology interfaces | 2008

Electronic traffic jam detection in parking facilities

Arunas Marma; Mindaugas Zilys; Algimantas Valinevicius

This paper explores the possibility of traffic jam control and detection systems modelling. The traffic jam detection model was developed This paper proposes jam forecasting and detection method using the neural network and fast Fourier transform. In this method, time series data of traffic flow events considered as a combination of frequency are transformed into several frequency data.

Collaboration


Dive into the Algimantas Valinevicius's collaboration.

Top Co-Authors

Avatar

D. Eidukas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Darius Andriukaitis

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Dangirutis Navikas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Vytautas Markevicius

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mindaugas Zilys

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

K. Balsys

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

M. Cepenas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

P. Balaišis

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

A. Marma

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

E. Keras

Kaunas University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge