Filters
total: 231
filtered: 221
-
Catalog
Chosen catalog filters
Search results for: CLUSTER-BASED ROUTING PROTOCOL
-
Development of cooperation in localized cooperation networks: A comparative study of cluster organizations and technology parks
PublicationThe main aim of the paper is to analyze the level of development of cooperative relationships in localized cooperation networks – among enterprises associated in cluster organizations and park tenants. The author reports the findings from the quantitative study carried out in the selected cluster organizations and technology parks functioning in Poland. The basic method of data collection was a survey questionnaire. The research...
-
To meet or to connect? Face-to-face contacts vs ICT in cluster organisations
PublicationThe main purpose of the paper is to explore how cluster organisations (COs) take advantage of direct (F2F) and indirect (ICT) contacts in fulfilling their main roles. The paper addresses the research question: “How important are Information and Communication Technologies at each level of advancement of cluster cooperation?” The research was conducted in 2016 in four purposefully selected cluster organisations representing metal...
-
Flock behavior and control
PublicationIn this paper we present the results of the Flock Behaviour and Control workshop cluster during “Shapes of Logic Conference 2015”. During the event, students got familiar with the techniques of both visual and sound real-time data processing. The second topic presented for students was behaviourbased approach of design process, mainly based on the mathematical rules set up by Craig Raynolds on the swarm behaviour. The aim of the...
-
The Use of Information and Communication Technologies in Cluster Organizations
PublicationThe purpose of the paper is to explore how cluster organizations (COs) take advantage of Information and Communication Technologies (ICT). The paper addresses the research question: “How do cluster organizations take advantage of ICT in fulfilling their main roles?”. The research was carried out in the first half of 2016 in four purposefully selected cluster organizations. The main research strategy involved Grounded Theory; the...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Cluster organization as a form of non-technological innovation
PublicationThe paper aims to investigate the relationships that cluster enterprises develop with their environment through participation in cluster organization (CO). The authors report the findings from a qualitative study carried out in the Lubusz Metal Cluster. The main research strategy is case study. An in-depth individual interview was used to collect the data, and qualitative content analysis and coding for its analysis. The study...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublicationOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Relationships Between Geographical and Virtual Proximity in Cluster Organisations
PublicationThe purpose of the paper is to explore the relationships between geographical and virtual proximity in cluster organizations (COs). The authors report the findings of a qualitative study conducted in four COs in Poland. The basic technique for collecting and analyzing data was an in-depth individual interview and qualitative content analysis. The research has shown that the relationships between geographical and virtual proximity...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublicationProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Parallel implementation of a Sailing Assistance Application in a Cloud Environment
PublicationSailboat weather routing is a highly complex problem in terms of both the computational time and memory. The reason for this is a large search resulting in a multitude of possible routes and a variety of user preferences. Analysing all possible routes is only feasible for small sailing regions, low-resolution maps, or sailboat movements on a grid. Therefore, various heuristic approaches are often applied, which can find solutions...
-
Data Partitioning and Task Management in the Clustered Server Layer of the Volunteer-based Computation System
PublicationWhile the typical volunteer-based distributed computing system focus on the computing performance, the Comcute system was designed especially to keep alive in the emergency situations. This means that designers had to take into account not only performance, but the safety of calculations as well. Quadruple-layered architecture was proposed to separate the untrusted components from the core of the system. The main layer (W) consists...
-
An approach to improve the time efficiency of disjoint paths calculation
PublicationFailures of network elements can be appropriately dealt with by utilization of alternate disjoint paths to provide redirection of flows affected by failures of the respective working paths. Known approaches can be broadly divided by decision on backup paths installation into proactive and reactive mechanisms, as well as based on the scope of recovery actions into local and global rerouting. There are several important scenarios...
-
Proximity and the Cluster Organization
PublicationIncluding the category of proximity in theoretical considerations and empirical analyzes in cluster organizations is an attempt to integrate existing approaches to understand and explain the specificity of inter-organizational cooperation developed in geographical proximity. The importance of geographical proximity to create a competitive advantage is emphasized in all theories on the establishment and development of industrial...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Performance and Power-Aware Modeling of MPI Applications for Cluster Computing
PublicationThe paper presents modeling of performance and power consumption when running parallel applications on modern cluster-based systems. The model includes basic so-called blocks representing either computations or communication. The latter includes both point-to-point and collective communication. Real measurements were performed using MPI applications and routines run on three different clusters with both Infiniband and Gigabit Ethernet...
-
Simulation model for evaluation of packet sequence changed order of stream in DiffServ network
PublicationCurrent packet networks use a large variety of mechanisms which should support QoS (Quality of Service). One of those mechanisms is routing (calculating connection paths for incoming service requests). The most effective mechanism in QoS context is dynamic routing, which is based on the current network state described by the offered traffic matrix and link states. After switching between calculated available paths, connection...
-
Rating by detection: an artifact detection protocol for rating EEG quality with average event duration
PublicationQuantitative evaluation protocols are critical for the development of algorithms that remove artifacts from real EEG optimally. However, visually inspecting the real EEG to select the top-performing artifact removal pipeline is infeasible while hand-crafted EEG data allow assessing artifact removal configurations only in a simulated environment. This study proposes a novel, principled approach for quantitatively evaluating algorithmically...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublicationWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Clonal selection algorithm for vehicle routing
PublicationOver the years several successful computing techniques have been inspired by biological mechanisms. Studies of the mechanisms that allow the immune systems of vertebratesto adapt and learn have resulted in a class of algorithms called artificial immune systems. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents...
-
MATHEMATICAL MODELING OF FLOOD MANAGEMENT SYSTEM IN THE CITY OF GDAŃSK, ORUŃSKI STREAM CASE STUDY
PublicationAim of the study This study analyses the efficiency of flood protection in a small urban catchment, based on a system of small reservoirs. Material and methods To assess the flood routing and surge reduction, a mathematical model of the river catchment was implemented. This was a lumped hydrological model, based on the SCS-CN method. Channel routing was performed, using kinematic wave equation. The sub-catchments have been determined...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublicationA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Benzene-induced hydro(solvo)thermal synthesis of Cu2+ and Zn2+ coordination polymers based on 1,3-benzenedicarboxylate
PublicationHydro(solvo)thermal reactions of Cu(NO3)2·2.5H2O or Zn(NO3)2·6H2O with 1,3-H2bdc provided two structurally different coordination polymers; a 2D network “metallacalixarene” based on the paddlewheel-type cluster with the formula [Cu(1,3-bdc)·H2O]·H2O (1) and a 3D framework [Zn(1,3-bdc)] (2), respectively. The use of a base was unnecessary in this synthesis; however, the presence of benzene played a crucial role in the crystallization...
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
History-based dynamic weight voting for multi-agent systems
PublicationTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
Comparison of GC–MS and MEKC methods for caffeine determination in preworkout supplements
PublicationIn this study, GC–MS- and MEKC-based methods for determination of caffeine (CAF) in preworkout supplements were developed and validated. The proposed protocols utilized minimal sample preparation (simple dilution and syringe filtration). The developed methods achieved satisfactory validation parameters, i.e. good linearity (R2 0.9988 and R2 0.9985 for GC–MS- and MEKC-based method, respectively), satisfactory intraand interaccuracy...
-
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
PublicationThe paper presents an evaluation of all-reduce collective MPI algorithms for an environment based on a geographically-distributed compute cluster. The testbed was split into two sites: CI TASK in Gdansk University of Technology and ICM in University of Warsaw, located about 300 km from each other, both connected by a fast optical fiber Ethernet-based 100 Gbps network (900 km part of the PIONIER backbone). Each site hosted a set...
-
Identyfikacja regionalna i branżowa oraz poziom zaangażowania jako determinanty sukcesu inicjatywy klastrowej Interizon
PublicationCelem niniejszego artykułu jest analiza trzech wybranych składowych tożsamości grupowej w inicjatywie klastrowej Interizon: identyfikacji regionalnej, identyfikacji branżowej oraz zaangażowania w sprawy inicjatywy oraz ocena ich wpływu na dotychczasowe sukcesy inicjatywy. Autorki opierały się na wynikach badań zrealizowanych w 2014 roku wśród członków inicjatywy Interizon. Badania przeprowadzone były dwufazowo, w oparciu o obserwacje...
-
Evaluation of time-efficiency of disjoint paths calculation schemes
PublicationThe concept of alternate paths has been shown in the literature to provide fast response of a network to failures of its elements (nodes/links) affecting flows along the primary communication paths. Various approaches have been proposed to reduce the time necessary to redirect the respective flows onto the alternate paths. In this paper, we focus on another important objective, that so far has not received much attention, i.e.,...
-
Inverse Flood Routing Using Simplified Flow Equations
PublicationThe paper considers the problem of inverse flood routing in reservoir operation strategy. The aim of the work is to investigate the possibility of determining the hydrograph at the upstream end based on the hydrograph required at the downstream end using simplified open channel flow models. To accomplish this, the linear kinematic wave equation, the diffusive wave equation and the linear Muskingum equation are considered. To achieve...
-
Collision Risk-Informed Weather Routing for Sailboats
PublicationSelected COLREG rules, good seamanship and sheer common sense indicate that it is in a sailboat's interest to follow collision-free routes without relying on large power-driven ships to give way. Until now, however, no method has integrated a sailboat's weather routing with collision risk monitoring and collision avoidance. Therefore, a new deterministic approach to combine the above features within one method is introduced here....
-
Weather Hazard Avoidance in Modeling Safety of Motor-Driven Ship for Multicriteria Weather Routing
PublicationWeather routing methods find the most suitable ocean?s route for a vessel, taking into account changeable weather conditions and navigational constraints. In the multicriteria approach based on the evolutionary SPEA algorithm one is able to consider a few constrained criteria simultaneously. The approach applied for a ship with hybrid propulsions has already been presented by one of the authors on previous TransNav?2009. This time...
-
Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
PublicationMethods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...
-
Parallel immune system for graph coloring
PublicationThis paper presents a parallel artificial immune system designed forgraph coloring. The algorithm is based on the clonal selection principle. Each processor operates on its own pool of antibodies and amigration mechanism is used to allow processors to exchange information. Experimental results show that migration improves the performance of the algorithm. The experiments were performed using a high performance cluster on a set...
-
A distributed system for conducting chess games in parallel
PublicationThis paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...
-
The realization of ASON/GMPLS control plane
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
PROGRAMMABLE YANG - BASED INTERFACE IN CONTROL OF OPTICAL TRANSPORT NETWORK
PublicationSince over a decade we observe intensive effort of research institutions and industrial consortia on extending flexibility and automation of the transport network control also known under the term network programmability. Key aspect of each programming interface is ability to evolve but also sensitivity to future modifications. As indicated in the past work in the specific context of optical transport networks an important criterion...
-
An analytical hierarchy process for selection of the optimal procedure for resveratrol determination in wine samples
PublicationThe study shows the application of analytical hierarchy process (AHP) in ranking the analytical procedures, that are applied for resveratrol determination in wine samples. 19 different analytical methodologies are described by metrological, economic and environmental criteria, that are further divided into 10 subcriteria. Before AHP application, the amount of input data is decreased with cluster analysis. The first run of AHP is...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Knowledge management implementation in small and micro KIBS : A categorization
Publicationhe main goal of the paper is to provide a statistical categorization of small and micro knowledge-intensive business service (KIBS) companies, based on their knowledge management (KM) attitude. Since knowledge is the main production factor and output of these companies, it is essential to achieve a better understanding of how they manage this resource. A questionnaire-based survey was conducted on a sample of Polish small and micro...
-
Decisional DNA based intelligent knowledge model for flexible manufacturing system
PublicationModeling an effective mechanism for design and control strategies for the implementation of a flexible manufacturing system (FMS) has been a challenge. Consequently, to overcome this issue various techniques have applied in the past but most of these models are effective only for some specific situation or an element of FMS. In this study, the knowledge representation technique of Decisional DNA (DDNA) is applied to FMS to develop...
-
Badanie wybranych algorytmów rutingu QoS w sieciach MPLS
PublicationW pracy dokonano przeglądu wybranych, opublikowanych algorytmów rutingu QoS dla sieci MPLS. Zrealizowano program "Ruting QoS" w środowisku MATLAB, w którym zaimplementowano trzy algorytmy: Profile-Based Routing, Kowalika-Colliera oraz Erbasa-Mathara. Przedstawiono i omówiono sieci, które zostały użyte do badań. Przebadano zaimplementowane algorytmy w przykładowych sieciach. Porównano badane algorytmy pod względem: procentu obsłużonych...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Chromium‑based metal organic framework for pipette tip micro‑solid phase extraction: an effective approach for determination of methyl and propyl parabens in wastewater and shampoo samples
PublicationAbstract Background A chromium-based metal organic framework was synthesized and employed as an efficient sorbent for pipette tip micro-solid phase extraction and preconcentration of parabens from wastewater and shampoo samples up to sub-ppb level before their spectrophotometric analysis. Results Factors affecting preconcentration including volume and type of solvent, amount of sorbent, number of extraction, and volume and pH of...
-
Innovation by proxy – clusters as ecosystems facilitating open innovation
PublicationOpen innovation is a concept, whose attributes can be perceived as naturally complementing the proximity-based offer of clusters. The purpose of this paper is to investigate the potential role of clusters as intermediaries of open innovation for cluster members. A literature review and an exploratory study were performed, involving in-depth interviews with experts in the field of innovation and clusters in Poland. This article...
-
Acceleration of decision making in sound event recognition employing supercomputing cluster
PublicationParallel processing of audio data streams is introduced to shorten the decision making time in hazardous sound event recognition. A supercomputing cluster environment with a framework dedicated to processing multimedia data streams in real time is used. The sound event recognition algorithms employed are based on detecting foreground events, calculating their features in short time frames, and classifying the events with Support...