ISSN:
Publisher:
Ministry points: Help
Year | Points | List |
---|---|---|
Year 2024 | 5 | Journal not listed on ministry scored journal list 2024 |
Year | Points | List |
---|---|---|
2024 | 5 | Journal not listed on ministry scored journal list 2024 |
2023 | 5 | Not listed on the ministry scored journals list 2023 |
2022 | 5 | Not listed on the ministry scored journals list (2019-2022) |
2021 | 5 | Not listed on the ministry scored journals list (2019-2022) |
2020 | 5 | Not listed on the ministry scored journals list (2019-2022) |
2019 | 5 | Not listed on the ministry scored journals list (2019-2022) |
2018 | 10 | B |
2017 | 10 | B |
2016 | 10 | B |
2015 | 10 | B |
2014 | 5 | B |
2013 | 5 | B |
2012 | 5 | B |
2011 | 5 | B |
2010 | 6 | B |
Model:
Impact Factor:
Publishing policy:
- License
- COPYRIGHT
- Information on publishing policy
- https://it.p.lodz.pl/course/view.php?id=12 open in new tab
- Information on the conditions of self-archiving
- n/a
- Is self-archiving allowed by the journal?
- No
- Information on research data policy
- n/a
- Months of embargo
- no embargo
- Additional information
- Type of model Gratis Open Access (Bronze Open Access).
Papers published in journal
Filters
total: 13
Catalog Journals
Year 2015
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
Year 2014
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublicationIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
GROUP COMPOSER - System for Modeling Agents’ Team Building for Tasks
PublicationMulti-agent systems consist of many autonomous units, called agents, that can interact when trying to achieve their goals. The selection of interaction partners is called team formation. Three basic approaches can be considered to match multi-agent system resources to the problem at hand. To research the properties of different approaches, a software for modeling team formation in multi-agent systems has been created and is presented...
-
History-based dynamic weight voting for multi-agent systems
PublicationTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
Integrating web site services into application through user interface
PublicationThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Software Tools to Measure the Duplication of Information
PublicationData stored in average computer system usually is not unique, portions of stored data are duplicated. When duplicated data are stored in separate files containing source code of computer program of student homework, a possibility of cheating should be seriously considered. This paper presents software tools built, in order to detect re-use of pieces of code in supplied text files. Three aspects of information atching are considered:...
-
The Backbone Coloring Problem for Small Graphs
PublicationIn this paper we investigate the values of the backbone chromatic number, derived from a mathematical model for the problem of minimization of bandwidth in radio networks, for small connected graphs and connected backbones (up to 7 vertices). We study the relationship of this parameter with the structure of the graph and compare the results with the solutions obtained using the classical graph coloring algorithms (LF, IS), modified...
Year 2013
-
FIReWORK: FIR Filters Hardware Structures Auto-Generator
PublicationThe paper presents application called FIReWORK, that allows for automatic creation of the VHDL hardware structures of FIR filters. Automat- ically generated specialized hardware solutions dedicated to the FPGA and ASIC are commonly known as Intellectual Property Cores. The essential fu- ture of the application is easy initialization of FIR filter parameters in GUI, and then automatically design, calculate and generate the IP Core...
Year 2011
-
A Note on Shannon Capacity for Invariant and Evolving Channels
PublicationIn the paper we discuss the notion of Shannon capacity for invariant and evolving channels. We show how this notion is involved in information theory, graph theory and Ramsey theory.
Year 2009
-
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
Year 2007
-
Creating and application of maps of concepts for dl ontologies
PublicationW poprzednich pracach wprowadzono metodę reprezentacji wiedzy, zwaną Kartografią Wiedzy. Metoda ta pozwala na zapisanie, w formie tzw. map konceptów, zależności pomiędzy konceptami wyróżnionymi w terminologii, a następnie stopniowe (wraz ze wzrostem naszej wiedzy) przypisywanie indywidualnym obiektom tych konceptów. Efektywność budowy map konceptów jest kluczowym czynnikiem wpływającym na możliwość użycia metody. Niniejsza praca...
Year 2006
-
Effectiveness of bluetooth scatternet coexisting with ieee 802.11b
PublicationArtykuł dotyka problematyki wzajemnych interferencji sieci Bluetooth i IEEE 802.11b. W szczególności analizowano wpływ transmisji 802.11b na pracę pojedynczej pikosieci w danym scatternecie BT.
seen 827 times