Search results for: information-centric network - Bridge of Knowledge

Search

Search results for: information-centric network

Filters

total: 25173
filtered: 3429

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: information-centric network

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Smart Services for Improving eCommerce

    Publication

    - Year 2020

    The level of customer support provided by the existing eCom-merce solutions assumes that the person using the functionality of theshop has sufficient knowledge to decide on the purchase transaction. Alow conversion rate indicates that customers are more likely to seekknowledge about the particular product than finalize the transaction.This is facilitated by the continuous development of customers’ digi-tal...

  • Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks

    Publication

    - IEEE Access - Year 2022

    Object detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...

    Full text available to download

  • Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing

    Developing signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....

    Full text available to download

  • High precision and accuracy using low cost GNSS receivers and supporting technologies

    Publication

    - Year 2017

    This chapter focuses on methods and techniques of positioning, based on the highly accurate and precise Global Navigation Satellite System (GNSS), which are available at a relatively low price. In this context, a comparison of different positioning methods provided by the free and open source software (FOSS) package called RTKLIB is given. Other aspects related to price reduction are also considered, including availability and...

  • Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model

    In this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...

    Full text to download in external service

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service

  • Intraday price reaction to filing bankruptcy and restructuring proceedings – the evidence from Poland

    Publication

    - Year 2021

    This chapter presents the results of research on the price reaction of shares listed on the Warsaw Stock Exchange to filing bankruptcy and/or restructuring applications. Event study was adopted as the research method, and it was performed at 10, 5, and 1-minute intervals. It was found that the reaction is rapid, as it takes 1–2 minutes after the information on bankruptcy and restructuring applications was made public. Significantly...

    Full text available to download

  • Position Estimation in Mixed Indoor-Outdoor Environment Using Signals of Opportunity and Deep Learning Approach

    To improve the user's localization estimation in indoor and outdoor environment a novel radiolocalization system using deep learning dedicated to work both in indoor and outdoor environment is proposed. It is based on the radio signatures using radio signals of opportunity from LTE an WiFi networks. The measurements of channel state estimators from LTE network and from WiFi network are taken by using the developed application....

    Full text available to download

  • An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks

    Publication

    Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...

    Full text available to download

  • Downlink Capacity-Coverage Trade-off Estimation Based on Measurement of WCDMA/FDD Interface Load

    The method of capacity-coverage trade-off determination by using of universal load characteristics and normalized coverage curves for the WCDMA/FDD radio interface has been presented. The practical applications of discussed method for UMTS radio network planning process and network exploitation has been mentioned.

  • Embedded device for indoor positioning of mobile terminals in ISM 2.4 GHz frequency band integrated with ESPAR antenna

    Publication
    • T. Dryjański

    - Year 2018

    In the era of multifunctional mobile phones, wireless positioning is one of the most important branches of telecommunications development. This functionality is possible thanks to global positioning systems such as GPS, whose services are available to every average user. Global systems, however, suffer from their low accuracy in confined environments such as forests and building interiors. A popular...

    Full text available to download

  • Ship Resistance Prediction with Artificial Neural Networks

    Publication

    - Year 2015

    The paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...

    Full text available to download

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • The realization of ASON/GMPLS control plane

    Publication

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks

    Publication

    - Year 2013

    The paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...

    Full text available to download

  • The Transmission Protocol of Sensor Ad Hoc Networks

    Publication

    - Year 2015

    This paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

  • Deep neural networks for human pose estimation from a very low resolution depth image

    Publication

    The work presented in the paper is dedicated to determining and evaluating the most efficient neural network architecture applied as a multiple regression network localizing human body joints in 3D space based on a single low resolution depth image. The main challenge was to deal with a noisy and coarse representation of the human body, as observed by a depth sensor from a large distance, and to achieve high localization precision....

    Full text available to download

  • Future research directions in design of reliable communication systems

    Publication
    • J. Rak
    • M. Pickavet
    • K. S. Trivedi
    • J. A. Lopez
    • A. M. C. A. Koster
    • J. P. Sterbenz
    • E. Çetinkaya
    • T. Gomes
    • M. Gunkel
    • K. Walkowiak
    • D. Staessens

    - TELECOMMUNICATION SYSTEMS - Year 2015

    In this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...

    Full text available to download

  • Massive surveillance data processing with supercomputing cluster

    In recent years, increasingly complex algorithms for automated analysis of surveillance data are being developed. The rapid growth in the number of monitoring installations and higher expectations of the quality parameters of the captured data result in an enormous computational cost of analyzing the massive volume of data. In this paper a new model of online processing of surveillance data streams is proposed, which assumes the...

    Full text available to download

  • MiMSeg - an algorithm for automated detection of tumor tissue on NMR apparent diffusion coefficient maps.

    Publication
    • F. Binczyk
    • B. Stjelties
    • C. Weber
    • M. Goetz
    • K. Meier-Hein
    • H. Meinzer
    • B. Bobek-Billewicz
    • R. Tarnawski
    • J. Polanska

    - INFORMATION SCIENCES - Year 2017

    Full text to download in external service

  • Acceleration of decision making in sound event recognition employing supercomputing cluster

    Publication

    Parallel processing of audio data streams is introduced to shorten the decision making time in hazardous sound event recognition. A supercomputing cluster environment with a framework dedicated to processing multimedia data streams in real time is used. The sound event recognition algorithms employed are based on detecting foreground events, calculating their features in short time frames, and classifying the events with Support...

    Full text to download in external service

  • Medical Image Segmentation Using Deep Semantic-based Methods: A Review of Techniques, Applications and Emerging Trends

    Publication

    - Information Fusion - Year 2022

    Semantic-based segmentation (Semseg) methods play an essential part in medical imaging analysis to improve the diagnostic process. In Semseg technique, every pixel of an image is classified into an instance, where each class is corresponded by an instance. In particular, the semantic segmentation can be used by many medical experts in the domain of radiology, ophthalmologists, dermatologist, and image-guided radiotherapy. The authors...

    Full text to download in external service

  • Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks

    Publication

    - ENTROPY - Year 2023

    The rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....

    Full text available to download

  • Morphology changes in Fe-Cr porous alloys upon high-temperature oxidation quantified by X-ray tomographic microscopy

    Publication

    - MATERIALS & DESIGN - Year 2022

    The effect of high-temperature oxidation at 850 C (10 h, 30 h, 100 h) and 900 C (10 h) on porous (30 % porosity) ferritic stainless steel (Fe22Cr) has been investigated using synchrotron tomographic microscopy, which allowed for visualisation, separation and quantitative analysis of the metallic core, closed pores, open pores and oxide scale phase. The same regions within the samples were investigated before and after oxidation...

    Full text available to download

  • Channel State Estimation in LTE-Based Heterogenous Networks Using Deep Learning

    Following the continuous development of the information technology, the concept of dense urban networks has evolved as well. The powerful tools, like machine learning, break new ground in smart network and interface design. In this paper the concept of using deep learning for estimating the radio channel parameters of the LTE (Long Term Evolution) radio interface is presented. It was proved that the deep learning approach provides...

    Full text available to download

  • Discriminatory expressions, the young and social networks: The effect of gender

    Publication
    • D. Dueñas-Cid
    • P. Pontón-Merino
    • Á. Belzunegui-Eraso
    • I. Pastor-Gosálbez

    - Comunicar Latin American Scientific Journal of communication and Education - Year 2016

    In the framework of the «Project I: CUD» (Internet: Creatively Unveiling Discrimination), carried out in the United Kingdom, Italy, Belgium, Romania and Spain, we conducted a study into the expressions of discrimination used by young people on social network sites. To do so we designed a methodological strategy for detecting discriminatory content in 493 Facebook profiles and used this strategy to collect 363 examples for further...

    Full text available to download

  • Fast geometry scaling of miniaturized microwave couplers with power split correction

    Redesigning a microwave circuit for various operating conditions is a practically important yet challenging problem. The purpose of this article is development and presentation of a technique for fast geometry scaling of miniaturized microwave couplers with respect to operating frequency. Our approach exploits an inverse surrogate model constructed using several reference designs that are optimized for a set of operating frequencies...

    Full text to download in external service

  • Power System Dynamics. Stability and Control. 3rd edition

    Publication

    - Year 2020

    Comprehensive, state-of-the-art review of information on the electric power system dynamics and stability. It places the emphasis first on understanding the underlying physical principles before proceeding to more complex models and algorithms. The book explores the influence of classical sources of energy, wind farms and virtual power plants, power plants inertia and control strategy on power system stability. The book cover...

    Full text to download in external service

  • Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models

    Deep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...

    Full text to download in external service

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Full text available to download

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publication
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Year 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Full text to download in external service

  • Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks

    Publication

    - Year 2022

    Fifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...

    Full text to download in external service

  • eFRADIR: An Enhanced FRAmework for DIsaster Resilience

    Publication
    • A. Pasic
    • R. Girao-Silva
    • F. Mogyorosi
    • B. Vass
    • T. Gomes
    • P. Babarczi
    • P. Revisnyei
    • J. Tapolcai
    • J. Rak

    - IEEE Access - Year 2021

    This paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...

    Full text available to download

  • Neural Architecture Search for Skin Lesion Classification

    Deep neural networks have achieved great success in many domains. However, successful deployment of such systems is determined by proper manual selection of the neural architecture. This is a tedious and time-consuming process that requires expert knowledge. Different tasks need very different architectures to obtain satisfactory results. The group of methods called the neural architecture search (NAS) helps to find effective architecture...

    Full text available to download

  • Społeczno-gospodarcza aktywizacja małych miast w powiecie braniewskim = SOCIO-ECONOMIC ACTIVATION OF TOWNS IN BRANIEWO DISTRICT

    Publication

    - Year 2014

    Streszczenie Okres ponad 20. lat działalności lokalnych samorządów w Polsce okazał się niewystarczający dla przeprowadzenia w małych miastach niezbędnych zmian społecznych, gospodarczych i przestrzennych. W tym czasie z trudem wzrastał poziom obywatelskiej świadomości, lokalnego partnerstwa i aktywności w życiu publicznym. Społeczności miały możliwość angażowania się w miejscowe działania i współdecydowania o sprawach rozwoju gospodarczego,...

  • The Analysis and Solutions to the Problems of IPv6 Configuration Migration of Small Networks

    The paper analyzes the problems of IPv4 to IPv6 migration processes and indicates the areas in which migration can be done without expensive replacement of hardware, software and organizational changes. This paper presents the migration tools developed for the SOHO network administrators. The tools provide theoretical knowledge and practical advices on migrating to IPv6 and enable automation of the migration process. The article...

    Full text to download in external service

  • Extending touch-less interaction with smart glasses by implementing EMG module

    In this paper we propose to use temporal muscle contraction to perform certain actions. Method: The set of muscle contractions corresponding to one of three actions including “single-click”, “double-click” “click-n-hold” and “non-action” were recorded. After recording certain amount of signals, the set of five parameters was calculated. These parameters served as an input matrix for the neural network. Two-layer feedforward neural...

    Full text to download in external service

  • Analysis of Denoising Autoencoder Properties Through Misspelling Correction Task

    Publication

    The paper analyzes some properties of denoising autoencoders using the problem of misspellings correction as an exemplary task. We evaluate the capacity of the network in its classical feed-forward form. We also propose a modification to the output layer of the net, which we called multi-softmax. Experiments show that the model trained with this output layer outperforms traditional network both in learning time and accuracy. We...

    Full text available to download

  • In Situ Verification of Numerical Model of Water Hammer in Slurries

    Publication

    This paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...

    Full text available to download

  • Improving voltage levels in low-voltage networks with distributed generation – case study

    Publication

    - Year 2018

    The use of distributed generation in low-voltage networks may cause the voltage variation in them, within the wide range. In unfavourable circumstances, the voltage may reach unacceptable values. The paper presents the effect of distributed generation on voltage levels in a selected low-voltage rural distribution network in Poland. An analysis of possible methods for improving voltage levels in this network is conducted. The most...

    Full text to download in external service

  • SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS

    Publication

    The shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...

    Full text available to download

  • Operation, Administration, Maintenance in Carrier Grade Ethernet

    Publication

    - Year 2010

    OAM (Operation, Administration and Maintenance) plays a crucial role in carrier networks. OAM functionality ensures that network operators and service providers can maintain the quality of the services they offer. One of its major tasks is the detection of anomalies in the network before they become a problem. This enables network operators and service providers to deliver services that come up to a predetermined level of quality...

  • Activity coordination of capacitor banks and power transformer controllers in order to reduce power losses in the MV grid

    Publication

    One of the main issues related to the optimization of the MV (middle voltage) network is to reduce losses of active and reactive power. Lower losses of active and reactive power give not only economic advantage, but also improvement of energy quality. The object of regulation that can be used for these purposes are transformer with On-Load Tap Changer and capacitor's banks. This paper presents results of analysis of the possibility...

  • Evaluation of compression realization in diesel engine based on performance indicator changes

    Publication

    In the article a method of evaluation of a diesel engine during the realization of processes of working cycle on the example of compression is described. The method is based on the use of the quantity called performance indicator in the description of the engine's work, which contains the information on the energy values, which may be disposed using the engine and the time at which it can be delivered. Theoretical information has...

    Full text available to download

  • The Large Customer Reactive Power Control Possibilities

    Publication

    n this paper the authors wish to draw attention to the rationale for, and the possibility of, the use of local reactive power sources by the Transmission Node Master Controller (TNMC). Large Customers (LC) are one of the possible reactive power sources. The paper presents the issues related to the need for coordination between the control systems installed in the LC network, and coordination between control systems of the LC as...

    Full text available to download

  • A Test-Bed Analysis of Simultaneous PMIPv6 Handover in 802.11 WLANs Environment

    Publication

    - Year 2013

    Providing mobility in access networks is a challenge that we have to deal with. Due to networks’ convergence and migration to all-IP networks, mobility management at the network layer is required. However, there is a need for cooperation mechanisms between the network layer and lower layers to support multimedia services and make handover more efficient. This paper presents experimental research on simultaneous handover performance...

    Full text to download in external service

  • Uprawnienie do uzyskania od administratora informacji o odbiorcach lub o kategoriach odbiorców a cele prawa dostępu do danych. Glosa do wyroku TS z dnia 12 stycznia 2023 r., C-154/21 (RW przeciwko Österreichische Post AG)

    Publication

    Given the complexity of modern data processing, individuals often do not know to whom controllers provide the information collected about them. In the commented judgment, the Court ruled that the controller is bound by the data subjects’ request to access information about the identity of the specific recipients of their data and has limited ability to provide them with information about the categories of recipients. This interpretation...

    Full text to download in external service