Filters
total: 2248
filtered: 1878
-
Catalog
- Publications 1878 available results
- Journals 107 available results
- Conferences 103 available results
- Publishing Houses 1 available results
- People 53 available results
- Projects 4 available results
- e-Learning Courses 12 available results
- Events 3 available results
- Open Research Data 87 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: NETWORK
-
An SDN-based technique for reducing handoff times in WiFi networks
Publication -
Modeling of Wireless Traffic Load in Next Generation Wireless Networks
Publication -
Forecasting demand for products in distribution networks using R software
Publication -
Proposal of improvement to fairness mechanism of Resilient Packet Ring networks
Publication.
-
Application of neural networks for description of pressure distribution in slide bearing.
PublicationBadano rozkład ciśnienia hydrodynamicznego w łożysku ślizgowym dla wybranych wariantów łożyska. Wykazano, że zastosowanie sieci neuronowych umożliwia opis rozkładu ciśnienia hydrodynamicznego z uwzględnieniem zmian geometrycznych (bezwymiarowa długość - L) i mechanicznych (mimośrodowość względem H) łożyska.
-
Identification of slide bearing main parameters using neural networks.
PublicationWykazano, że sieci neuronowe jak najbardziej nadają się do identyfikacji głównych parametrów geometrycznych i ruchowych hydrodynamicznych łożysk ślizgowych.
-
Estimation the rhythmic salience of sound with association rules and neural networks
PublicationW referacie przedstawiono eksperymenty mające na celu automatyczne wyszukiwanie wartości rytmicznych we frazie muzycznej. W tym celu wykorzystano metody data mining i sztuczne sieci neuronowe.
-
Water hammer analysis in pipe networks by the method of characteristics (MOC).
PublicationZastosowano w pracy metodę charakterystyk do analizy zjawiska uderzenia hydraulicznego w sieci wodociągowej pierścieniowej.
-
A practical approach to restoration in survivable IP/WDM mesh networks
PublicationW pracy omówiono warstwową architekturę: IP na optycznej sieci transportowej (OTN). Węzły mają zintegrowaną funkcjonalność: rulerów IP i przełącznic optycznych (OXC). Dopuszcza się możliwość konwersji długości fal na ścieżkach optycznych. Autor rozważa zagadnienie znalezienia ścieżek optycznych o możliwie najniższym koszcie przy spełnieniu ograniczeń przepustowości, wymaganych strumieni zapotrzebowań i zabezpieczonych z góry na...
-
The structural face of competition, cooperation and coopetition inside business networks
Publication -
The impact of institutions on innovation networks: empirical evidence from Poland
PublicationInnovation networks may accelerate and improve the innovation process, while institutional pathologies may hamper it. This study employs the Kruskal-Wallis H test and regression analysis to determine if the relationship between institutions and innovation networks does exist among the investigated variables. The purpose of the study was to find out whether cooperation with special local institutions influences the innovative behaviour...
-
Distributed reputation system for multihop mobile ad hoc networks
PublicationZaproponowano system reputacyjny dla bezprzewodowej sieci rozległej ad hoc, pozwalający stacjm sieci zachować tzw. anonimowość pakietową oraz odróżniać zachowania niekoperacyjne od efektów przeciążenia sieci. Zastosowano generację miar reputacyjnych przy wykorzystaniu mechanizmu lokalnego nasłuchiwania (watchdog). Przeprowadzono symulacyjne badania odporności tego systemu na obecność stacji niewspółpracujących.
-
Fast Service Recovery under Shared Protection in WDM Networks
PublicationNiniejszy artykuł dotyczy zagadnienia doboru tras przeżywalnych dla ruchu statycznego w zorientowanych połączeniowo sieciach WDM, przy wykorzystaniu idei współdzielonych ścieżek zabezpieczających. Pierwsza część jest poświęcona warunkom koniecznym oraz charakterystykom typowej metody współdzielenia zasobów ścieżek zabezpieczających, ze szczególnym uwzględnieniem uzyskiwanej średniej długości ścieżek zabezpieczających oraz wartości...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Hydraulic transients analysis in pipe networks by the method of characteristics (MOC)
PublicationW pracy przedstawiono wyniki badań eksperymentalnych i analizy numerycznej zjawiska przepływów nieustalonych w przewodach pojedynczych oraz symulacji numerycznych w sieci pierścieniowej. Model matematyczny stanowi układ dwóch równań różniczkowych cząstkowych typu hiperbolicznego, które rozwiązano za pomocą metody charakterystyk. Badania eksperymentalne przeprowadzono na modelu w skali laboratoryjnej. Uzyskano dobrą zgodność obliczeń...
-
Localization in wireless sensor networks using switched parasitic antennas
PublicationA switched parasitic monopole antenna for 2.4 GHz ISM applications is design and investigated in this paper. One of the most promising applications for such switched-beam antennas is localization in wireless sensor networks (WSN). It is demonstrated that the use of this antenna improves accuracy of localization algorithms and allows for reduction of the number of reference nodes in localization system.
-
Joint optimization of anycast and unicast flows in survivable optical networks
PublicationZnane z literatury dotychczasowe prace związane z ochroną ruchu przed awarią elementów sieci dotyczą transmisji typu unicast (jeden-do-jednego). Niniejszy artykuł jest pierwszym prezentującym rozwiązanie jednoczesnej ochrony transmisji anycast (jeden-do-jednego-z-wielu) oraz transmisji unicast. Proponowane podejście wykorzystuje model ochrony ścieżki (ang. path protection). Zagadnienie zostało sformułowane w postaci odpowiedniego...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Measurement of Coherence Bandwidth in UHF Radio Channels for Narrowband Networks
PublicationThis paper presents results of investigation on the coherence bandwidth of narrowband radio channels in 430MHz band. The coherence bandwidth values were estimated froma power delay profile obtained by recording CDMA2000 forward channel signals during real-fieldmeasurements in various environments:mediumcity, flat terrain, and hilly terrain in northern Poland.The results of measurements are compared with characteristic parameters...
-
Exploring the role of social networks among entrepreneurial Polish immigrants
PublicationThe paper reports on the explanatory case study among seven Polish enterprising migrants from Aberdeen Scotland. The aim of the paper is to examine role of social support structure and social networks for enterprising Poles. It also attempts to extend of Waldinger et al (2000) ethnic business development model in the context of entrepreneurial strategies taken from by immigrants from their country of origin, claiming that transition...
-
Bio-Based Polyurethane Networks Derived from Liquefied Sawdust
PublicationThe utilization of forestry waste resources in the production of polyurethane resins is a promising green alternative to the use of unsustainable resources. Liquefaction of wood-based biomass gives polyols with properties depending on the reagents used. In this article, the liquefaction of forestry wastes, including sawdust, in solvents such as glycerol and polyethylene glycol was investigated. The liquefaction process was carried...
-
System Loss Model for Body Area Networks in Room Scenarios
PublicationThis paper presents an analysis of system loss in Body Area Networks for room scenarios, based on a wideband measurement campaign at 5.8 GHz. The measurements were performed with a fixed antenna transmitting vertically and horizontally polarised signals, while the user wears dualpolarised antennas. The average system losses in co- and crosspolarised channels are 41.4 and 42.6 dB for vertically polarised transmitted signals and...
-
Buck-Boost Inverters with Symmetrical Passive Four-terminal Networks
PublicationAlternating Voltage Inverters (Converters) supplied by low-voltage sources DC (ex. fuel cell, photovoltaic cell) are most frequently realized on the basis of the three fundamental topologies: a) PWM voltage inverter with boost-converter" system, b) PWM voltage inverter with transformed converter DC/DC in the ,,boost-converter" system, c) PWM current converter. However none of these solutions is claimed to be the best and dominant...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Generation-recombination and 1/f noise in carbon nanotube networks
PublicationThe low-frequency noise is of special interest for carbon nanotubes devices, which are building blocks for a variety of sensors, including radio frequency and terahertz detectors. We studied noise in as-fabricated and aged carbon nanotube networks (CNNs) field-effect transistors. Contrary to the majority of previous publications, as-fabricated devices demonstrated the superposition of generation-recombination (GR) and 1/f noise...
-
USING ARTIFICIAL NEURAL NETWORKS FOR PREDICTING SHIP FUEL CONSUMPTION
PublicationIn marine vessel operations, fuel costs are major operating costs which affect the overall profitability of the maritime transport industry. The effective enhancement of using ship fuel will increase ship operation efficiency. Since ship fuel consumption depends on different factors, such as weather, cruising condition, cargo load, and engine condition, it is difficult to assess the fuel consumption pattern for various types...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
Application of the neural networks for developing new parametrization of the Tersoff potential for carbon
PublicationPenta-graphene (PG) is a 2D carbon allotrope composed of a layer of pentagons having sp2- and sp3-bonded carbon atoms. A study carried out in 2018 has shown that the parameterization of the Tersoff potential proposed in 2005 by Ehrhart and Able (T05 potential) performs better than other potentials available for carbon, being able to reproduce structural and mechanical properties of the PG. In this work, we tried to improve the...
-
Local variance factors in deformation analysis of non-homogenous monitoring networks
PublicationThis paper proposes a modification of the classical deformation analysis algorithm for non-homogeneous (e.g. linear-angular) monitoring networks. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal monitoring network. The obtained results confirm the usefulness of the proposed solution.
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublicationThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublicationSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublicationThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
Selected Technical Issues of Deep Neural Networks for Image Classification Purposes
PublicationIn recent years, deep learning and especially Deep Neural Networks (DNN) have obtained amazing performance on a variety of problems, in particular in classification or pattern recognition. Among many kinds of DNNs, the Convolutional Neural Networks (CNN) are most commonly used. However, due to their complexity, there are many problems related but not limited to optimizing network parameters, avoiding overfitting and ensuring good...
-
Efficient uncertainty quantification using sequential sampling-based neural networks
PublicationUncertainty quantification (UQ) of an engineered system involves the identification of uncertainties, modeling of the uncertainties, and the forward propagation of the uncertainties through a system analysis model. In this work, a novel surrogate-based forward propagation algorithm for UQ is proposed. The proposed algorithm is a new and unique extension of the recent efficient global optimization using neural network (NN)-based...
-
Constrained aerodynamic shape optimization using neural networks and sequential sampling
PublicationAerodynamic shape optimization (ASO) involves computational fluid dynamics (CFD)-based search for an optimal aerodynamic shape such as airfoils and wings. Gradient-based optimization (GBO) with adjoints can be used efficiently to solve ASO problems with many design variables, but problems with many constraints can still be challenging. The recently created efficient global optimization algorithm with neural network (NN)-based prediction...
-
Bees Detection on Images: Study of Different Color Models for Neural Networks
PublicationThis paper presents an approach to bee detection in video streams using a neural network classifier. We describe the motivation for our research and the methodology of data acquisition. The main contribution to this work is a comparison of different color models used as an input format for a feedforward convolutional architecture applied to bee detection. The detection process has is based on a neural binary classifier that classifies...
-
Applying artificial neural networks for modelling ship speed and fuel consumption
PublicationThis paper deals with modelling ship speed and fuel consumption using artificial neural network (ANN) techniques. These tools allowed us to develop ANN models that can be used for predicting both the fuel consumption and the travel time to the destination for commanded outputs (the ship driveline shaft speed and the propeller pitch) selected by the ship operator. In these cases, due to variable environmental conditions, making...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks
PublicationThe rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....
-
A new approach to design of weather disruption-tolerant wireless mesh networks
PublicationWireless Mesh Networks, offering transmission rates of 1–10 Gb/s per a millimeter-wave link (utilizing the 71–86 GHz band) seem to be a promising alternative to fiber optic backbone metropolitan area networks because of significantly lower costs of deployment and maintenance. However, despite providing high transmission rates in good weather conditions, high-frequency wireless links are very susceptible to weather disruptions....
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Robust estimation of deformation from observation differences for free control networks
PublicationDeformation measurements have a repeatable nature. This means that deformation measurements are performed often with the same equipment, methods, geometric conditions and in a similar environment in epochs 1 and 2 (e.g., a fully automated, continuous control measurements). It is, therefore, reasonable to assume that the results of deformation measurements can be distorted by both random errors and by some non-random errors, which...
-
Recognition of Emotions in Speech Using Convolutional Neural Networks on Different Datasets
PublicationArtificial Neural Network (ANN) models, specifically Convolutional Neural Networks (CNN), were applied to extract emotions based on spectrograms and mel-spectrograms. This study uses spectrograms and mel-spectrograms to investigate which feature extraction method better represents emotions and how big the differences in efficiency are in this context. The conducted studies demonstrated that mel-spectrograms are a better-suited...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
A Novel Iterative Decoding for Iterated Codes Using Classical and Convolutional Neural Networks
PublicationForward error correction is crucial for communication, enabling error rate or required SNR reduction. Longer codes improve correction ratio. Iterated codes offer a solution for constructing long codeswith a simple coder and decoder. However, a basic iterative code decoder cannot fully exploit the code’s potential, as some error patterns within its correction capacity remain uncorrected.We propose two neural network-assisted decoders:...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Improving voltage levels in low-voltage networks with distributed generation – case study
PublicationThe use of distributed generation in low-voltage networks may cause the voltage variation in them, within the wide range. In unfavourable circumstances, the voltage may reach unacceptable values. The paper presents the effect of distributed generation on voltage levels in a selected low-voltage rural distribution network in Poland. An analysis of possible methods for improving voltage levels in this network is conducted. The most...