Search results for: MV NETWORK CONFIGURATION - Bridge of Knowledge

Search

Search results for: MV NETWORK CONFIGURATION

Filters

total: 2383
filtered: 2039

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: MV NETWORK CONFIGURATION

  • Design and implementation of GEPON architecture in laboratory testbed

    Publication

    This paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...

  • QoS Resource Reservation Mechanisms for Switched Optical Networks

    Publication

    The paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...

    Full text to download in external service

  • On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience

    Publication
    • C. Esposito
    • A. Gouglidis
    • D. Hutchison
    • A. Gurtov
    • B. Helvik
    • P. Heegaard
    • G. Rizzo
    • J. Rak

    - Year 2018

    Network communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...

    Full text to download in external service

  • Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard

    With the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...

    Full text available to download

  • Konzepte zur Energieeffizienzsteigerung bei Internet-Zugangsgeräten

    Publication

    - Year 2008

    The key issue of this paper is the power management of Internet access devices. The paper commences with an outline on the energy consumption of today's IT devices. It is followed by a description of options to increase energy efficiency of computers. The paper proves that in practice network cards and other IT network components, such as modems, network access points, switches and routers have the maximum energy consumption -...

  • Ubiquity of client access in heterogeneous access environment

    With popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....

    Full text available to download

  • Performance improvement of NN based RTLS by customization of NN structure - heuristic approach

    Publication

    - Year 2015

    The purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...

    Full text to download in external service

  • Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms

    Providing a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...

    Full text available to download

  • Estimation and Prediction of Vertical Deformations of Random Surfaces, Applying the Total Least Squares Collocation Method

    Publication

    - SENSORS - Year 2020

    This paper proposes a method for determining the vertical deformations treated as random fields. It is assumed that the monitored surfaces are subject not only to deterministic deformations, but also to random fluctuations. Furthermore, the existence of random noise coming from surface’s vibrations is also assumed. Such noise disturbs the deformation’s functional models. Surface monitoring with the use of the geodetic levelling...

    Full text available to download

  • A Novel Iterative Decoding for Iterated Codes Using Classical and Convolutional Neural Networks

    Publication

    - Year 2024

    Forward error correction is crucial for communication, enabling error rate or required SNR reduction. Longer codes improve correction ratio. Iterated codes offer a solution for constructing long codeswith a simple coder and decoder. However, a basic iterative code decoder cannot fully exploit the code’s potential, as some error patterns within its correction capacity remain uncorrected.We propose two neural network-assisted decoders:...

    Full text to download in external service

  • Direct estimation of linear and nonlinear functionals of quantum state

    Publication
    • A. Ekert
    • C. M. Alves
    • D. K. Oi
    • M. Horodecki
    • P. Horodecki
    • L. C. Kwek

    - PHYSICAL REVIEW LETTERS - Year 2002

    We present a simple quantum network, based on the controlled-SWAP gate, that can extract certain properties of quantum states without recourse to quantum tomography. It can be used as a basic building block for direct quantum estimations of both linear and nonlinear functionals of any density operator. The network has many potential applications ranging from purity tests and eigenvalue estimations to direct characterization of...

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publication

    - Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska - Year 2020

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Full text available to download

  • An isogeometric finite element formulation for boundary and shell viscoelasticity based on a multiplicative surface deformation split

    This work presents a numerical formulation to model isotropic viscoelastic material behavior for membranes and thin shells. The surface and the shell theory are formulated within a curvilinear coordinate system,which allows the representation of general surfaces and deformations. The kinematics follow from Kirchhoff–Love theory and the discretization makes use of isogeometric shape functions. A multiplicative split of the surface...

    Full text available to download

  • Installation of GNSS receivers on a mobile railway platform – methodology and measurement aspects

    Publication

    Determining the course of a railway track axis using satellite methods relies on ensuring the precise assembly of GNSS receivers in dedicated measuring devices. Depending on the number of receivers, solutions that are based on placing the apparatus directly above the railway track axis (as well as in eccentric positions) are used to indirectly obtain data to form the basis of the desired results. This publication describes the...

    Full text available to download

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Virtual touchpad - video-based multimodal interface

    A new computer interface named Virtual-Touchpad (VTP) is presented. The Virtual-Touchpad provides a multimodal interface which enables controlling computer applications by hand gestures captured with a typical webcam. The video stream is processed in the software layer of the interface. Hitherto existing video-based interfaces analyzing frames of hand gestures are presented. Then, the hardware configuration and software features...

  • Call processing performance in multidomain IMS/NGN architecture

    Publication

    The Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...

  • Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model

    In this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...

    Full text to download in external service

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service

  • Position Estimation in Mixed Indoor-Outdoor Environment Using Signals of Opportunity and Deep Learning Approach

    To improve the user's localization estimation in indoor and outdoor environment a novel radiolocalization system using deep learning dedicated to work both in indoor and outdoor environment is proposed. It is based on the radio signatures using radio signals of opportunity from LTE an WiFi networks. The measurements of channel state estimators from LTE network and from WiFi network are taken by using the developed application....

    Full text available to download

  • An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks

    Publication

    Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...

    Full text available to download

  • Downlink Capacity-Coverage Trade-off Estimation Based on Measurement of WCDMA/FDD Interface Load

    The method of capacity-coverage trade-off determination by using of universal load characteristics and normalized coverage curves for the WCDMA/FDD radio interface has been presented. The practical applications of discussed method for UMTS radio network planning process and network exploitation has been mentioned.

  • Diamond-Phase (Sp3-C) Rich Boron-Doped Carbon Nanowalls (Sp2-C): A Physico-Chemical And Electrochemical Properties

    Publication

    The growth of B-CNW with different boron doping levels controlled by the [B]/[C] ratio in plasma, and the influence of boron on the obtained material’s structure, surface morphology, electrical properties and electrochemical parameters, such as -ΔE and k°, were investigated. The fabricated boron-doped carbon nanowalls exhibit activity towards ferricyanide redox couple, reaching the peak separation value of only 85 mV. The flatband...

    Full text available to download

  • Ship Resistance Prediction with Artificial Neural Networks

    Publication

    - Year 2015

    The paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...

    Full text available to download

  • Calculation of Induced Sheath Voltages in Power Cables – Single Circuit System versus Double Circuit System

    This paper presents comparison of values of induced sheath voltages in power cable metallic sheaths when one or two cables per phase are used. Calculation of voltages is performed for various phase sequences of the power cables. Three types of the sheaths bonding and earthing are considered. Shock hazard and voltage stress of non-metallic outer sheath of cables are evaluated. The proposed, optimal configuration of the power cable...

    Full text to download in external service

  • Some fundamental aspects of self-levitating sliding contact bearings and their practical implementations

    In this study, fundamental aspects and mechanisms of acoustic levitation together with governing equations are presented first. Then, the acoustic levitation phenomenon is considered as a new way to design air suspension systems capable of self-levitation. A particular emphasis is laid on journal bearings and their specific geometrical configuration. A practical feasibility of using acoustic levitation to separate contacting surfaces...

  • Novel Family of Single-Phase Modified Impedance-Source Buck-Boost Multilevel Inverters With Reduced Switch Count

    Publication

    - IEEE TRANSACTIONS ON POWER ELECTRONICS - Year 2016

    his paper describes novel single-phase solutions with increased inverter voltage levels derived by means of a nonstandard inverter configuration and impedance source networks. Operation principles based on special modulation techniques are presented. Detailed component design guidelines along with simulation and experimental verification are also provided. Possible application fields are discussed, as well as advantages and disadvantages....

    Full text to download in external service

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • The realization of ASON/GMPLS control plane

    Publication

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • Exploring Neural Networks for Musical Instrument Identification in Polyphonic Audio

    Publication

    - IEEE INTELLIGENT SYSTEMS - Year 2024

    The purpose of this paper is to introduce neural network-based methods that surpass state-of-the-art (SOTA) models, either by training faster or having simpler architecture, while maintaining comparable effectiveness in musical instrument identification in polyphonic music. Several approaches are presented, including two authors’ proposals, i.e., spiking neural networks (SNN) and a modular deep learning model named FMCNN (Fully...

    Full text to download in external service

  • Methods of data extraction from sub-bottom profiler's signal

    Data obtain during sounding Gdansk Bay with SES-2000 Standard parametric sub-bottom profiler has two types of information: envelope and pure signal. First is used to plot echograms in real time and contain envelope of echo. The second one is stored during sounding and can be processed after recording data. Comparison of results will be shown and discussed. First step in investigation was proper configuration of small measurement...

    Full text available to download

  • Multi-Channel Virtual Instrument for Measuring Temperature—A Case Study

    Publication

    - Electronics - Year 2023

    The article presents the hardware and software configuration of the developed multi-channel temperature measurement system as well as calibration procedures and measurement results verifying the properties of measurement channels. The system has been developed and dedicated primarily for measuring the temperature distribution in a laboratory model simulating underground power lines. With the adopted configuration of the analog...

    Full text available to download

  • Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks

    Publication

    - Year 2013

    The paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...

    Full text available to download

  • Computer-Supported Polysensory Integration Technology for Educationally Handicapped Pupils

    Publication

    In this paper, a multimedia system providing technology for hearing and visual attention stimulation is shortly presented. The system aims to support the development of educationally handicapped pupils. The system has been presented in the context of its configuration, architecture, and therapeutic exercise implementation issues. Results of pupils’ improvements after 8 weeks of training with the system are also provided. Training...

    Full text to download in external service

  • Konstrukcje i zastosowania współczesnych silników Stirlinga

    Publication

    W pracy omówione zostały przyczyny rosnącego zainteresowania komercyjnego wykorzystania silników Stirlinga. Scharakteryzowane zostały podstawowe typy silników Stirlinga ze względu na układ przestrzeni roboczej i cylindrów. W pracy przedstawione zostały przykłady współczesnych konstrukcji tych silników, dokonano również analizy aktualnych i planowanych zastosowań silników Stirlinga. Omówiono podstawowe zalety i wady wykorzystania...

    Full text available to download

  • The Transmission Protocol of Sensor Ad Hoc Networks

    Publication

    - Year 2015

    This paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

  • Deep neural networks for human pose estimation from a very low resolution depth image

    Publication

    The work presented in the paper is dedicated to determining and evaluating the most efficient neural network architecture applied as a multiple regression network localizing human body joints in 3D space based on a single low resolution depth image. The main challenge was to deal with a noisy and coarse representation of the human body, as observed by a depth sensor from a large distance, and to achieve high localization precision....

    Full text available to download

  • Future research directions in design of reliable communication systems

    Publication
    • J. Rak
    • M. Pickavet
    • K. S. Trivedi
    • J. A. Lopez
    • A. M. C. A. Koster
    • J. P. Sterbenz
    • E. Çetinkaya
    • T. Gomes
    • M. Gunkel
    • K. Walkowiak
    • D. Staessens

    - TELECOMMUNICATION SYSTEMS - Year 2015

    In this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...

    Full text available to download

  • Quality Parameters in IMS/NGN Networks

    Publication

    - Year 2019

    The Next Generation Network (NGN) architecture, including elements of the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of current and future information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design is necessary with respect to among others standardized call processing performance parameters, including expected...

    Full text to download in external service

  • A video monitoring system using ontology-driven identification of threats

    Publication

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Full text to download in external service

  • Wideband Signal Generation for Jamming Radio-Controlled Improvised Explosive Devices

    Publication

    - Year 2018

    This paper focuses on modelling operation of a wideband jamming signal generator, considering the effects present in real device which influence the shape of transmitted signal’s spectrum. Introduction is followed by a brief overview of AEGIS project, aim of which is to develop a mobile generator of electromagnetic curtain. Next, simulation model is described which includes the factors...

    Full text available to download

  • Module of priorities for public transport vehicles in the TRISTAR system

    Publication

    One of the most important elements of the intelligent traffic control systems is the ability to control movement in such a way as to privilege the selected users movement, in particular public transport vehicles. Implemented at the Tri-City the TRISTAR system will also have a module for prioritizing public transport vehicles. The article presents a characteristics of the priority action system: the way of communication with the...

  • Computer-aided Analysis of Induced Sheath Voltages in High Voltage Power Cable System

    This paper concerns the effect of configuration of high voltage power cables on induced voltages in their metallic sheaths. One, two or three cables per phase and phase sequence of the cables are considered. Computing of the voltages was performed for a normal operation and in case of earth fault. Various ways of the sheaths bonding are considered as well. Shock hazard and voltage stress of non-metallic outer sheath of cables are...

    Full text to download in external service

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publication
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Year 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Full text to download in external service

  • eFRADIR: An Enhanced FRAmework for DIsaster Resilience

    Publication
    • A. Pasic
    • R. Girao-Silva
    • F. Mogyorosi
    • B. Vass
    • T. Gomes
    • P. Babarczi
    • P. Revisnyei
    • J. Tapolcai
    • J. Rak

    - IEEE Access - Year 2021

    This paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...

    Full text available to download

  • Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks

    Publication

    - Year 2022

    Fifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...

    Full text to download in external service

  • Neural Architecture Search for Skin Lesion Classification

    Deep neural networks have achieved great success in many domains. However, successful deployment of such systems is determined by proper manual selection of the neural architecture. This is a tedious and time-consuming process that requires expert knowledge. Different tasks need very different architectures to obtain satisfactory results. The group of methods called the neural architecture search (NAS) helps to find effective architecture...

    Full text available to download

  • In Situ Verification of Numerical Model of Water Hammer in Slurries

    Publication

    This paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...

    Full text available to download