Filters
total: 1325
filtered: 1107
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: Networks
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Service-based Resilience for Embedded IoT Networks
PublicationEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Robustness in Compressed Neural Networks for Object Detection
PublicationModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
Annual signals observed in regional GPS networks
PublicationAbstract: This paper describes analyses concerning annual signals in GPS-derived coordinates. The data was processed in the Military University of Technology Local Analysis Centre with Bernese 5.0 software. We used observations from 129 permanent GPS stations which belong to the Polish Active Geodetic Network (ASG-EUPOS), for the period of GPS weeks 1465-1729, corresponding to about 5 years. The annual signals have been estimated...
-
Primary role identification in dynamic social networks
PublicationIdentyfikacja ról w sieci społecznej jest jednym z podstawowych zagadnień analizy takich sieci. W artykule przedstawiamy nowe podejście do tego zagadnienia. Pokazujemy w jaki sposób można dokonać identyfikacji ról poprzez wykorzystanie zaproponowanego modelu zachowań aktorów. Model taki tworzą podgrafy wzorcowe oraz diagramy stanów okreslające sekwencje aktywności w zachowaniu aktorów. Na bazie wyznaczonych modeli zachowań oraz...
-
Delamination Identification Using Global Convolution Networks
Publication -
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Applying artificial intelligence for cellular networks optimization
Publication -
RSVP-TE as a reservation protocol for optical networks
PublicationIn this paper, we consider the reservation of optical resources problem. We implement extensions for RSVP-TE (Resource ReSerVation Protocol with Traffic Engineering Extension) to achieve the new functionality for optical resources reservation. Based on ASON/GMPLS architecture we examine an open source implementation KOM RSVP-Engine and extend its functionality according to ITU-T and IETF recommendations. The transport plane consists...
-
Cluster-Dependent Feature Selection for the RBF Networks
Publication -
AGENT-BASED APPROACH TO THE DESIGN OF RBF NETWORKS
Publication -
Cost minimisation in unbounded multi-interface networks
PublicationW pracy badano problem odłączania niektórych urządzeń komunikacyjnych w wielointerfejsowych sieciach bezprzewodowych w taki sposób, by zapewnić realizację wymaganego grafu połączeń przy jednoczesnej minimalizacji zużycia energii. Sformułowano problem optymalizacyjny, podano wyniki dotyczące jego trudności i zaproponowano algorytmy optymalizacyjne dla wariantu, w którym liczba interfejsów komunikacyjnych jest potencjalnie nieograniczona...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Minimization of label usage in (G)MPLS networks
Publication -
DETERMINATION OF VERTICAL DISPLACEMENTS IN RELATIVE MONITORING NETWORKS
PublicationThe problem of determining displacements of objects is an important and current issue, in particular in terms of operational safety. This is a requirement that covers geodetic, periodic control measurements in order to determine horizontal and vertical displacements. The paper is focused on the analysis of vertical displacements. Geodetic measurements and their interpretation allow to reduce the risk of possible structural catastrophes....
-
Region protection/restoration scheme in survivable networks
PublicationW artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...
-
Ship Resistance Prediction with Artificial Neural Networks
PublicationThe paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
COMPARATIVE ANALYSIS OF ACTIVE GEODETIC NETWORKS IN POLAND
Publication -
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Measures of region failure survivability for wireless mesh networks
PublicationWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths
PublicationRozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublicationIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
CRVG - a new model for wireless networks topology generation
PublicationThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
The networking of the justice system as part of public court networks
PublicationThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublicationMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublicationCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublicationOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublicationIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Towards 5G — Cloud-based Radio Access Networks
PublicationIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublicationThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
Performance of LSP preemption methods in different MPLS networks
PublicationPreemption in Multiprotocol Label Switching (MPLS) is an optional traffic engineering technique used to create a new path of high priority when there is not enough bandwidth available. In such case the path is admitted by removing one or more previously allocated paths of lower priority. As there are usually many possible sets of low priority paths which can be selected, a preemption algorithm is being started to select the best...
-
Mobility management solutions for current IP and future networks
PublicationEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...
-
Outlier detection method by using deep neural networks
PublicationDetecting outliers in the data set is quite important for building effective predictive models. Consistent prediction can not be made through models created with data sets containing outliers, or robust models can not be created. In such cases, it may be possible to exclude observations that are determined to be outlier from the data set, or to assign less weight to these points of observation than to other points of observation....
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Discriminatory expressions, the young and social networks: The effect of gender
PublicationIn the framework of the «Project I: CUD» (Internet: Creatively Unveiling Discrimination), carried out in the United Kingdom, Italy, Belgium, Romania and Spain, we conducted a study into the expressions of discrimination used by young people on social network sites. To do so we designed a methodological strategy for detecting discriminatory content in 493 Facebook profiles and used this strategy to collect 363 examples for further...
-
Settlement Networks in Polish Spatial Development Regional Plans
PublicationIn 1999, ten years after the great political changes in Poland, 16 self-governed regions (in Polish: voivodeship) were created. According to Polish law, voivodeship spatial development plans, or regional plans in short, determine basic elements of the settlement network. No detailed regulations indicate the specific elements of the settlement network or what features of these elements should be determined. For this reason, centres...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Application of Bayesian Networks for Forecasting Future Model of Farm
Publication -
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublicationDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Accuracy analysis of a mobile station location in the cellular networks
PublicationJakość usług lokalizacyjnych oferowanych w sieciach komórkowych zależy od efektywności estymacji położenia terminala ruchomego. Dokładność obecnie stosowanych metod lokalizacyjnych jest niewystarczająca, szczególnie w odniesieniu do wywołań w niebezpieczeństwie. Modyfikacja istniejących algorytmów może istotnie wpłynąć na zwiększenie dokładności lokalizowania terminala ruchomego przy jednocześnie niewielkich nakładach finansowych....
-
Pattern matching localization in ZigBee wireless sensor networks.
PublicationLokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.
-
Survivability of unicast and anycast flows under attacks on networks
PublicationW artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...
-
Interval wavelength assignment in all-optical star networks
PublicationArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Service restoration in survivable networks under malicious attacks
PublicationW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...