Filters
total: 2728
filtered: 2055
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: MISSION-CRITICAL NETWORKS
-
Ce site dilution effects in the antiferromagnetic heavy fermion CeIn3
PublicationLa-doped intermetallic single crystals of Ce1−xLaxIn3 were synthesized via an In self-flux method throughout the entire range (x = 0–1). The prototypical heavy-fermion compound CeIn3 shows an antiferromagnetic phase transition at 10.1 K and becomes superconducting near a critical pressure where TN is completely suppressed. As the La concentration increases, Ce moments are diluted, and the lattice constant increases linearly, satisfying Vegard’s...
-
Bounds on isolated scattering number
PublicationThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Bounds on isolated scattering number
PublicationThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Machine Learning Applied to Aspirated and Non-Aspirated Allophone Classification—An Approach Based on Audio "Fingerprinting"
PublicationThe purpose of this study is to involve both Convolutional Neural Networks and a typical learning algorithm in the allophone classification process. A list of words including aspirated and non-aspirated allophones pronounced by native and non-native English speakers is recorded and then edited and analyzed. Allophones extracted from English speakers’ recordings are presented in the form of two-dimensional spectrogram images and...
-
The Magnetic Fluid Seals Research Results vs. Kelvin-Helmholtz (K-H) instability and Preliminary Conclusions
PublicationIn the article a magnetic-fluid seals durability research and the tests results are presented. The tests were made with three magnetic fluids using various magnets quantity in magnetic assemblies. If values obtained in the repeated test deviated by more than 10 % from results of the first test an additional control test was made for final characteristics. The characteristics are: critical pressure, critical motion velocity and...
-
Flexomagnetic response of buckled piezomagnetic composite nanoplates
PublicationIn this paper, the equation governing the buckling of a magnetic composite plate under the influence of an in-plane one-dimensional magnetic field, assuming the concept of flexomagnetic and considering the resulting flexural force and moment, is investigated for the first time by different analytical boundary conditions. To determine the equation governing the stability of the plate, the nonlocal strain gradient theory has been...
-
A Data Driven Model for Predicting RNA-Protein Interactions based on Gradient Boosting Machine
PublicationRNA protein interactions (RPI) play a pivotal role in the regulation of various biological processes. Experimental validation of RPI has been time-consuming, paving the way for computational prediction methods. The major limiting factor of these methods has been the accuracy and confidence of the predictions, and our in-house experiments show that they fail to accurately predict RPI involving short RNA sequences such as TERRA RNA....
-
Experience-Based Cognition for Driving Behavioral Fingerprint Extraction
PublicationABSTRACT With the rapid progress of information technologies, cars have been made increasingly intelligent. This allows cars to act as cognitive agents, i.e., to acquire knowledge and understanding of the driving habits and behavioral characteristics of drivers (i.e., driving behavioral fingerprint) through experience. Such knowledge can be then reused to facilitate the interaction between a car and its driver, and to develop better and...
-
Factors that strengthen and weaken the identity of the cluster structures
PublicationThe main aim of this paper is the application of "identity" to the issues related to "clustering process" and particularly - to the cooperation in the clusters and the cluster initiatives. The authors distinguish these factors that have the greatest influence on the formation and maintenance of identity in mentioned networks of cooperation.
-
Identyfikacja instrumentu muzycznego z nagrania fonicznego za pomocą sztucznych sieci neuronowych
PublicationCelem rozprawy jest zbadanie algorytmów do identyfikacji instrumentów występujących w sygnale polifonicznym z wykorzystaniem sztucznych sieci neuronowych. W części teoretycznej przywołano podstawy przetwarzania sygnałów fonicznych w kontekście ekstrakcji parametrów sygnałów wykorzystywanych w treningu sieci neuronowych. Dodatkowo dokonano analizy rozwoju metod uczenia maszynowego z uwzględnieniem podziału na sieci neuronowe pierwszej,...
-
System for automatic singing voice recognition
PublicationW artykule przedstawiono system automatycznego rozpoznawania jakości i typu głosu śpiewaczego. Przedstawiono bazę danych oraz zaimplementowane parametry. Algorytmem decyzyjnym jest algorytm sztucznych sieci neuronowych. Wytrenowany system decyzyjny osiąga skuteczność ok. 90% w obydwu kategoriach rozpoznawania. Dodatkowo wykazano przy pomocy metod statystycznych, że wyniki działania systemu automatycznej oceny jakości technicznej...
-
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Expert systems in assessing the construction process safety taking account of the risk of disturbances
PublicationThe objective of the paper is to present the issue of safety manage-ment during the construction process. Threats in the form of disturb-ances may occur in the preparatory phase, during the execution of the construction project and also during its operational use. The arti-cle presents the concept of applying the methodology based, among others, on Learning Bayesian Networks, Artificial Neural Networks and Support Vector Machine,...
-
Weak forms of shadowing in topological dynamics
PublicationWe consider continuous maps of compact metric spaces. It is proved that every pseudotrajectory with sufficiently small errors contains a subsequence of positive density that is point-wise close to a subsequence of an exact trajectory with the same indices. Also, we study homeomor- phisms such that any pseudotrajectory can be shadowed by a finite number of exact orbits. In terms of numerical methods this property (we call it multishadowing)...
-
Machine Learning in Multi-Agent Systems using Associative Arrays
PublicationIn this paper, a new machine learning algorithm for multi-agent systems is introduced. The algorithm is based on associative arrays, thus it becomes less complex and more efficient substitute of artificial neural networks and Bayesian networks, which is confirmed by performance measurements. Implementation of machine learning algorithm in multi-agent system for aided design of selected control systems allowed to improve the performance...
-
Dedukcja zachowań węzłów sieci ad hoc na podstawie potwierdzeń końcowych: ocena dokładności
PublicationPrzebadano precyzję algorytmu dedukcji rzeczywistych spolegliwości węzłów sieci MANET w oparciu o potwierdzenia end-to-end i bez użycia mechanizmu watchdog. W przeprowadzonych eksperymentach numerycznych wskazano charakterystyki topologiczne wpływające na tę precyzję.
-
LTE as a Trunking - Dispatch System
PublicationIn the paper solutions of trunking-dispatch systems based on the LTE system are presented. The solution in the form of separate LTE/TDD trunking system is discussed, and the concept of the LTE/FDD trunking system operating in the infrastructure of public, mobile networks is characterised.
-
Security Mechanisms in the Comcute System
PublicationThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Trends in Locally Balanced Energy Systems without the Use of Fossil Fuels: A Review
PublicationIn recent years, the idea of the operation of energy systems (power systems, heating systems) has changed significantly. This paper is an overview of locally balanced energy systems without the use of fossil fuels. The paper justifies the concept of local energy balancing in a new energy system that does not use fossil fuels (coal, natural gas, and crude oil), based on European Union guidelines and formal documents as well as the...
-
Neural network simulator's application to reference performance determination of turbine blading in the heat-flow diagnostics.
PublicationIn the paper, the possibility of application of artificial neural networks to perform the fluid flow calculations through both damaged and undamaged turbine blading was investigated. Preliminary results are presented and show the potentiality of further development of the method for the purpose of heat-flow diagnostics.
-
Novel Adaptive Method for Data Streams Allocation Based on the Estimate of Radio Channel Parameters in Heterogeneous WBAN Network
PublicationThe new adaptive method for data streams allocation in heterogeneous Wireless Body Area Networks and meas-urement equipment is presented. The results obtained using the developed method compared with the selected algorithms likely to be used in those networks. The pro-posed adaptive data streams allocation method based on radio channel parameters makes it even twice as efficient to use in terms of resources usage in a WBAN heterogeneous...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublicationRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublicationIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Breast MRI segmentation by deep learning: key gaps and challenges
PublicationBreast MRI segmentation plays a vital role in early diagnosis and treatment planning of breast anomalies. Convolutional neural networks with deep learning have indicated promise in automating this process, but significant gaps and challenges remain to address. This PubMed-based review provides a comprehensive literature overview of the latest deep learning models used for breast segmentation. The article categorizes the literature...
-
Simulation Model for Application of the SDN Concept in IMS/NGN Network Transport Stratum
PublicationThe paper presents a simulation model allowing examination of cooperation between two currently used telecommunication networks concepts: IP Multimedia Subsystem/Next Generation Network (IMS/NGN) and Software-Defined Networking (SDN). Application of the SDN architecture elements in IMS/NGN networks will enable unified control and management of transport resources for various transport technologies and equipment manufacturers. However,...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Path Loss Analysis for the IoT Applications in the Urban and Indoor Environments
PublicationThe Internet of Things (IoT) networks concept implies their presence in a various and untypical locations, usually with a disturbed radio signals propagation. In the presented paper an investigation of an additional path loss observed in an underground environment was described. The proposed measurement locations correspond to the operation areas of rapidly growing narrowband IoT (NBIoT) networks, the ones using the Long Term Evolution...
-
The elasto-plastic numerical study of crack initiation in notched PMMA specimens under uniaxial loading conditions – Tension and torsion
PublicationThis paper presents the results of FEM numerical calculations aimed at describing the plastic strain and stress fields under critical loading conditions: tensile force or torsional moment. The calculations were carried out with reference to the results of experimental tensile and torsional tests of flat PMMA specimens weakened with V-notches of different root radii: 0.5, 2 and 10 mm. The procedure for conducting nonlinear numerical...
-
Multi-stage magnetic-fluid seals for operating in water - life test procedure, test stand and research results. Part II Results of life tests of multi-stage magnetic - fluid seal operating in water
PublicationThe edge criteria for magnetic-fluid seals durability research were described in previous article [24] and now the tests results are presented. The tests were made with three magnetic fluids using various magnets quantity in magnetic assemblies. If values obtained in the repeated test deviated by more than 10 % from results of the first test an additional control test was made for final characteristics. The characteristics are:...
-
Mapping knowledge risks: towards a better understanding of knowledge management
PublicationThis conceptual paper aims to identify, present, and analyze potential knowledge risks organizations might face. With the growing complexity of organizational environments and the plethora of new knowledge risks emerging, this critical but under-researched field of knowledge management (KM) deserves closer attention. The study is based on a critical analysis of the extant literature devoted to knowledge risks, discusses potential...
-
Overview of the three multicriteria approaches applied to a global assessment of analytical methods
PublicationCritical and global evaluation of analytical methods should be one of the primary goals in analytical chemistry. A holistic approach, however, requires a look at the varied features: commonly discussed validation criteria, often underrated practical and economic aspects, and typically overlooked compliance with the principles of green analytical chemistry. Carrying out such an assessment in a critical and transparent way is extremely...
-
Model oceny dojrzałości przedsiębiorstw do zastosowania zwinnych metodyk zarządzania projektami IT
PublicationDysertacja koncentruje się na budowie modelu, który ocenia gotowość przedsiębiorstw do wdrożenia zwinnych metodyk zarządzania projektami IT. Analizuje istniejące metody oceny dojrzałości projektowej i wprowadza własny model, biorąc pod uwagę krytyczne czynniki sukcesu i skuteczność zwinnych metod. Rozprawa zawiera badania literaturowe, empiryczne studium przypadku oraz weryfikację i rekomendacje modelu, dostarczając wglądu w praktyczne...
-
Deep CNN based decision support system for detection and assessing the stage of diabetic retinopathy
PublicationThe diabetic retinopathy is a disease caused by long-standing diabetes. Lack of effective treatment can lead to vision impairment and even irreversible blindness. The disease can be diagnosed by examining digital color fundus photographs of retina. In this paper we propose deep learning approach to automated diabetic retinopathy screening. Deep convolutional neural networks (CNN) - the most popular kind of deep learning algorithms...
-
Badawczo-rozwojowe laboratorium sieci optycznych wykorzystujące sprzęt ADVA Optical Networking
PublicationPrzedstawiono uwarunkowania i kierunki zmian w sieciach optycznych, a następnie wskazano na potrzebę posiadania laboratorium, w którym możliwe byłoby prowadzenie prac badawczo-rozwojowych oraz kształcenie. Przedstawiono koncepcję takiej sieci opartej na sprzęcie ADVA Optical Networking zrealizowaną w Katedrze Sieci Teleinformacyjnych Wydziału ETI PG. Opisano możliwości sprzętowo-funkcjonalne tego laboratorium oraz prowadzone prace...
-
Temperature influences on shear stability of a nanosize plate with piezoelectricity effect
PublicationPurpose The purpose of this paper is to predict the mechanical behavior of a piezoelectric nanoplate under shear stability by taking electric voltage into account in thermal environment. Design/methodology/approach Simplified first-order shear deformation theory has been used as a displacement field. Modified couple stress theory has been applied for considering small-size effects. An analytical solution has been taken into account...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Performance Analysis of Interaction between Smart Glasses and Smart Objects Using Image-Based Object Identification
PublicationWe propose the use of smart glasses to collaborate with smart objects in the Internet of Things environment. Particularly we are focusing on new interaction methods and the analysis of acceptable reaction times in the process of object recognition using smart glasses. We evaluated the proposed method using user studies and experiments with three different smart glasses: Google Glass, Epson Moverio, and the developed eGlasses platform....
-
Next Generation Digital
PublicationThe paper outlines the major objectives of the MENAID research project, eimed at novel architectures of digital documents. Such documents will enable reduction of information overflow and strain, a major threat to the growth of a digital society. They will be forward compatible, technology neutral and lightweight, allowing workers of network organizations to use personal devices of any type.
-
Trade in value added of countries involved in TTIP: EU-USA comparison
PublicationThe aim of this paper is to present key facts concerning trade in the value added of those countries participating in the Transatlantic Trade and Investment Partnership (TTIP). In particular, we describe how involvement in global production networks (GPN) varies across EU countries with respect to the United States.
-
Numerical Analysis of a Steel Frame Building with Soft-storey Failure under Ground Motion Excitation
PublicationThe aim of this paper is to show the results of a numerical analysis focused on the behaviour of multi-storey steel frame building that suffers from a soft-storey failure under ground motion excitation. A numerical model of the structure was created in FEM computer software and was exposed to an impact that would have been generated after a soft-storey failure due to falling of the upper floors. During the analysis, the whole structure...
-
Navier number and transition to turbulence
PublicationThe motivation behind this article is to explain a role of the Navier number (Na -dimensionless slip-length) in prediction of closures for laminar to turbulent transition undergoing via eddies detachment from the slip layer in nano-cannals. Additionally the role of the Navier number Na in universal modeling of phenomenon of enhanced mass flow rate reported in micro- and nano-channels has been explained. The Na number should be...
-
City walk: a didactic innovative experiment in architectural education
PublicationWalking is an activity that involves studying physical space and requires careful observation to be immersed in the surrounding reality. City walks are popular ways of encountering an urban space, spatial relation, its history, and recognising the problems and needs of space users, as well as future development of the city. City walks also may be educationally p owerful: the exploration of certain...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Carburization Behavior of High-Grade Pellets After Direct Reduction in Pure Hydrogen
PublicationCarburization is a critical aspect in the iron and steel industry as it significantly affects the mechanical and chemical properties of the final product. This study provides a comprehensive analysis of the carburization potential of high-grade quality iron ore pellets after direct reduction in pure hydrogen. The results show that the porosity of the pellets has a significant impact on the efficiency and success of the direct reduction...
-
Wirtualne sieci 5G, NGN i następne. Radioinformatyczna metamorfoza sieci komórkowych
PublicationPrzedstawiono problematykę ewolucyjnej, a w zasadzie rewolucyjnej, metamorfozy komórkowych systemów radiokomunikacyjnych w kontekście architektury sieci 5G, zasad jej działania oraz nowych możliwości implementacyjnych usług sieci NGN. Artykuł dotyczy w szczególności istoty działania sieci 5G, łączącej w sobie cechy sieci radiokomunikacyjnych poprzednich generacji, zwłaszcza 4G, oraz nowe właściwości charakterystyczne dla 5G. Dotyczą...
-
Technological substitution in Asia
PublicationThis book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublicationDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...