Filters
total: 5177
filtered: 4617
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: call processing performance
-
The (Un)Real City by Magdalena Abakanowicz: Guidelines for Cities in Times of Planetary Crisis
PublicationThree decades have passed since Magdalena Abakanowicz presented her concept of Bois de Nanterre — Arboreal Architecture, in response to a call for a broader reflection on approaches to urban landscaping and a reinterpretation of the meaning and evolution of the Grand Axis in Paris. This paper analyses the work presented by the artist from an urban planning perspective. It shows how the rich and multi-layered metaphor for the 21st-century...
-
Towards hardware built-in support for computer system safety
PublicationArtykuł omawia dostępne technologie wirtualizacji zasobów pamięci i systemów I/O w systemach komputerowych takie jak Execute Disable Bit (EDB) capability i Virtual Machine Architecture (VMA). Nastepnie wprowadza założenia na rozszerzenie tych technologii w celu uzyskania funkcjonalności Safe Call Execution dzieki technologii Execution Disabling Policies (EDP). Wprowadzono również założenia na funkcjonalność Memory Virtualization...
-
Collective Uncertainty Entanglement Test
PublicationFor a given pure state of a composite quantum system we analyze the product of its projections onto aset of locally orthogonal separable pure states. We derive a bound for this product analogous to theentropic uncertainty relations. For bipartite systems the bound is saturated for maximally entangled statesand it allows us to construct a family of entanglement measures, we shall call collectibility. As thesequantities are experimentally...
-
How Machine Learning Contributes to Solve Acoustical Problems
PublicationMachine learning is the process of learning functional relationships between measured signals (called percepts in the artificial intelligence literature) and some output of interest. In some cases, we wish to learn very specific relationships from signals such as identifying the language of a speaker (e.g. Zissman, 1996) which has direct applications such as in call center routing or performing a music information retrieval task...
-
Rigorous numerics for critical orbits in the quadratic family
PublicationWe develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...
-
Peer assessment as a method for measuring harmful internet use
PublicationHarmful Internet use (HIU) describes unintended use of the Internet. It could be both self-harm and harming others. Our research goal is to develop a more accurate method for measuring HIU by this novel peer assessment. As such, it may become, with our call for more research, a paradigm shift supplementing every rating scale or other type of Internet use assessment. In addition to classic statistical analysis, structural equations...
-
Geo-location of the commune of an IP user
PublicationThis paper describes a system of geo-location of an IP user that would enable VoIP users to call 112. Basic requirement is fast (under 50ms) determination of the commune of the subscriber. To obtain as accurate information as possible aggregation of several methods was proposed: using a database of locations of IP ranges created by specialized companies, traceroute using history of user locations to assume his current one.It is...
-
System wykrywania i przeciwdziałania spoofingowi GPS
PublicationSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Weak Solutions within the Gradient-Incomplete Strain-Gradient Elasticity
PublicationIn this paper we consider existence and uniqueness of the three-dimensional static boundary-value problems in the framework of so-called gradient-incomplete strain-gradient elasticity. We call the strain-gradient elasticity model gradient-incomplete such model where the considered strain energy density depends on displacements and only on some specific partial derivatives of displacements of first- and second-order. Such models...
-
Using Decisional DNA to Enhance Industrial and Manufacturing Design: Conceptual Approach
PublicationDuring recent years, manufacturing organizations are facing market changes such as the need for short product life cycles, technological advancement, intense pressure from competitors and the continuous customers’ expectation for high quality products at lower costs. In this scenario, knowledge and its associated engineering/management of every stage involved in the industrial design has become increasingly important for manufacturing...
-
A Nonlinear Model of a Mesh Shell
PublicationFor a certain class of elastic lattice shells experiencing finite deformations, a continual model using the equations of the so-called six-parameter shell theory has been proposed. Within this model, the kinematics of the shell is described using six kinematically independent scalar degrees of freedom — the field of displacements and turns, as in the case of the Cosserat continuum, which gives reason to call the model under consideration...
-
Design and Configuration of Context-aware VoIP Telephony Systems
PublicationVoice over IP is a widely used concept with regard to a realization technology of different types of telephony systems, including those that are used in enterprises. Such systems of a call procesing component and a set of desk endpoints that are pervasove from a user perspective. Those andpoints are usually not mobile, but in result can deliver a much greater set of functions needed in an everyday office work. Those functions also...
-
Wybrane aspekty oceny satysfakcji i lojalności klientów i pracowników
PublicationCelem artykułu jest przedstawienie propozycji oryginalnego modelu pozwalającego lepiej zrozumieć mechanizmy kształtowania się satysfakcji i lojalności klientów i pracowników oraz umożliwiającego porównywanie satysfakcji klientów różnych przedsiębiorstw w oderwaniu od ich specyfiki branżowej. Zaprezentowany model opiera się na mechanizmach przyczynowo-skutkowych i pozwala na stawianie kwantyfikowalnych celów, dając w rezultacie...
-
Weak forms of shadowing in topological dynamics
PublicationWe consider continuous maps of compact metric spaces. It is proved that every pseudotrajectory with sufficiently small errors contains a subsequence of positive density that is point-wise close to a subsequence of an exact trajectory with the same indices. Also, we study homeomor- phisms such that any pseudotrajectory can be shadowed by a finite number of exact orbits. In terms of numerical methods this property (we call it multishadowing)...
-
Multiresolution analysis and adaptive estimation on a sphere using stereographic wavelets
PublicationWe construct an adaptive estimator of a density function on d dimensional unit sphere Sd (d ≥ 2), using a new type of spherical frames. The frames, or as we call them, stereografic wavelets are obtained by transforming a wavelet system, namely Daubechies, using some stereographic operators. We prove that our estimator achieves an optimal rate of convergence on some Besov type class of functions by adapting to unknown smoothness....
-
The Challenge of Quantification: An Interdisciplinary Reading
PublicationThe present work looks at what we call “the multiverse of quantification”, where visible and invisible numbers permeate all aspects and venues of life. We review the contributions of different authors who focus on the roles of quantification in society, with the aim of capturing different and sometimes separate voices. Several scholars, including economists, jurists, philosophers, sociologists, communication and data scientists,...
-
Isolation Number versus Domination Number of Trees
PublicationIf G=(VG,EG) is a graph of order n, we call S⊆VG an isolating set if the graph induced by VG−NG[S] contains no edges. The minimum cardinality of an isolating set of G is called the isolation number of G, and it is denoted by ι(G). It is known that ι(G)≤n3 and the bound is sharp. A subset S⊆VG is called dominating in G if NG[S]=VG. The minimum cardinality of a dominating set of G is the domination number, and it is denoted by γ(G)....
-
The Boltzmann sequence-structure channel
PublicationWe rigorously study a channel that maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein statistics. This channel, which we also call the Boltzmann sequence-structure channel, is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. In our previous work, we verified experimentally that the channel capacity has a phase transition for...
-
Towards more inclusive qualitative research: the practice of interviewing neurominorities
PublicationManagement scholars increasingly focus their efforts on the development of neurodivergent human capital and the promotion of inclusive employment and decent work. However, it may be argued that existing research still suffers from the lack of a comprehensive appreciation of what neurominorities may find difficult in the research process or how they interpret what the researchers are doing. In the light of only fragmented advice...
-
On minimum cost edge searching
PublicationWe consider the problem of finding edge search strategies of minimum cost. The cost of a search strategy is the sum of searchers used in the clearing steps of the search. One of the natural questions is whether it is possible to find a search strategy that minimizes both the cost and the number of searchers used to clear a given graph G. We call such a strategy ideal. We prove, by an example, that ideal search strategies do not...
-
NLP Questions Answering Using DBpedia and YAGO
PublicationIn this paper, we present results of employing DBpedia and YAGO as lexical databases for answering questions formulated in the natural language. The proposed solution has been evaluated for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference). Our method uses dependency trees generated from the user query. The trees are browsed for paths leading from the root of the tree to the question...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublicationA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
On rotational instability within the nonlinear six-parameter shell theory
PublicationWithin the six-parameter nonlinear shell theory we analyzed the in-plane rotational instability which oc- curs under in-plane tensile loading. For plane deformations the considered shell model coincides up to notations with the geometrically nonlinear Cosserat continuum under plane stress conditions. So we con- sidered here both large translations and rotations. The constitutive relations contain some additional mi- cropolar parameters...
-
How to evaluate methods used in chemical laboratories in terms of the total chemical risk? – a ChlorTox Scale
PublicationReliable assessment of the health and environmental risk associated with the use of chemicals is critical to ob- jectively evaluate the greenness and whiteness of an analytical method. An objective and useful way of risk assessment should take into account all the relevant properties of used substances, their actual amounts needed for application of the method, and quantify the assessment result using a standardized unit. This...
-
Clean energy in the European Union: Transition or evolution?
PublicationIn this paper, we analyse two phenomena. First, the relationship between greenhouse gases emission and effectiveness of the European Union energy policies and second the transition from the fossil fuels to renewable energy sources. We run two-step data analysis concerning 25 European Union member states in the period from 1990 to 2018. We use information on greenhouse gases emission, introduction of new energy policies, source...
-
Two-particle entropy and structural ordering in liquid water
PublicationEntropies of simple point charge (SPC) water were calculated over the temperature range 278-363 K using the two-particle correlation function approximation. Then, the total two-particle contribution to the entropy of the system was divided into three parts, which we call translational, configurational, and orientational. The configurational term describes the contribution to entropy, which originates from spatial distribution of...
-
Two- and three-dimensional elastic networks with rigid junctions: modeling within the theory of micropolar shells and solids
PublicationFor two- and three-dimensional elastic structures made of families of flexible elastic fibers undergoing finite deformations, we propose homogenized models within the micropolar elasticity. Here we restrict ourselves to networks with rigid connections between fibers. In other words, we assume that the fibers keep their orthogonality during deformation. Starting from a fiber as the basic structured element modeled by the Cosserat...
-
A Assessment of Management Efficiency in Local Administrative Offices: Case Study Poland
PublicationThe analysis of management efficiency is an important element in evaluating the functioning of public administration from an economic point of view. In order to achieve greater efficiency of the management process, and thus the quality in public administration, it is important to analyze and evaluate its elements. Modern research usually covers individual elements, parts of the management process. However, the current study proposes...
-
Pervaporation in food processing
PublicationThis chapter is about pervaporation in food processing
-
Elimination of Impulsive Disturbances From Archive Audio Signals Using Bidirectional Processing
PublicationIn this application-oriented paper we consider the problem of elimination of impulsive disturbances, such as clicks, pops and record scratches, from archive audio recordings. The proposed approach is based on bidirectional processing—noise pulses are localized by combining the results of forward-time and backward-time signal analysis. Based on the results of specially designed empirical tests (rather than on the results of theoretical analysis),...
-
Bound on Bell inequalities by fraction of determinism and reverse triangle inequality
PublicationIt is an established fact that entanglement is a resource. Sharing an entangled state leads to nonlocal correlations and to violations of Bell inequalities. Such nonlocal correlations illustrate the advantage of quantum resources over classical resources. In this paper, we quantitatively study Bell inequalities with 2 × n inputs. As found in Gisin et al. [Int. J. Quantum. Inform. 05, 525 (2007)], quantum mechanical correlations...
-
Including the Dark Side of Entrepreneurship in the Entrepreneurship Education
PublicationPursuing an entrepreneurial career is often rewarding in terms of both economic and psychological outcomes. However, becoming an entrepreneur also has its darker side that affects professional and personal life. Meanwhile, the positivity bias is prevalent in entrepreneurial education and research. It is recognized as emphasizing the advantages of becoming an entrepreneur and giving considerably less attention to potential downsides....
-
Parallel implementation of background subtraction algorithms for real-time video processing on a supercomputer platform
PublicationResults of evaluation of the background subtraction algorithms implemented on a supercomputer platform in a parallel manner are presented in the paper. The aim of the work is to chose an algorithm, a number of threads and a task scheduling method, that together provide satisfactory accuracy and efficiency of a real-time processing of high resolution camera images, maintaining the cost of resources usage at a reasonable level. Two...
-
ARRIERE-GARDE IN ARCHITECTURE, AS A RESPONSE TO POST-POSTMODERN REALITY
PublicationThe article presents a general discussion on the direction of contemporary architecture. We can freely speak that postmodernity, understood in its philosophical core as a search for meaning in architecture, as a strategy of building our environment is over. What comes next? Some say, from lack of better naming, that we live in post-postmodern times. Term post-postmodernity is a call for new strategy of shaping our societies and...
-
VALUATION OF EMBEDDED OPTIONS IN NON-MARKETABLE CALLABLE BONDS: A NEW NUMERICAL APPROACH
PublicationThe issue of how to price options embedded in callable bonds has attracted a lot of interest over the years. The usual bond valuation methods rely on yield curves, risk premium, and other parameters to estimate interest rates used in discounted cash flow calculations. The option to retire the bond is, however, neglected in the standard pricing models, causing a systematic overvaluation of callable bonds. In the event of a decline...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Non-Perfect Propagation of Information to a Noisy Environment with Self-Evolution
PublicationWe study the non-perfect propagation of information for evolving a low-dimensional environment that includes self-evolution as well as noisy initial states and analyse the interrelations between the degree of objectivization and environment parameters. In particular, we consider an analytical model of three interacting qubits and derive its objectivity parameters. The numerical analysis shows that the quality of the spectrum broadcast...
-
Analytical Methods for Causality Evaluation of Photonic Materials
PublicationWe comprehensively review several general methods and analytical tools used for causality evaluation of photonic materials. Our objective is to call to mind and then formulate, on a mathematically rigorous basis, a set of theorems which can answer the question whether a considered material model is causal or not. For this purpose, a set of various distributional theorems presented in literature is collected as the distributional...
-
Krylov Space Iterative Solvers on Graphics Processing Units
PublicationCUDA architecture was introduced by Nvidia three years ago and since then there have been many promising publications demonstrating a huge potential of Graphics Processing Units (GPUs) in scientific computations. In this paper, we investigate the performance of iterative methods such as cg, minres, gmres, bicg that may be used to solve large sparse real and complex systems of equations arising in computational electromagnetics.
-
Modelling and simulation of GPU processing in the MERPSYS environment
PublicationIn this work, we evaluate an analytical GPU performance model based on Little's law, that expresses the kernel execution time in terms of latency bound, throughput bound, and achieved occupancy. We then combine it with the results of several research papers, introduce equations for data transfer time estimation, and finally incorporate it into the MERPSYS framework, which is a general-purpose simulator for parallel and distributed...
-
Massive surveillance data processing with supercomputing cluster
PublicationIn recent years, increasingly complex algorithms for automated analysis of surveillance data are being developed. The rapid growth in the number of monitoring installations and higher expectations of the quality parameters of the captured data result in an enormous computational cost of analyzing the massive volume of data. In this paper a new model of online processing of surveillance data streams is proposed, which assumes the...
-
Material Flow Analysis in a cooked mussel processing industry
PublicationGalicia (NW Spain) is an ideal environment for mussel culture owing to its excellent natural conditions. It is the first Spanish and European mussel producer and the second worldwide after China. More than 50% of the mussel collected in Galicia is used in the processing industry, which produces different products, as cooked mussel that is canned, frozen or used in the food industry. In this paper a methodology based on Life Cycle...
-
Application of persulfate-based oxidation processes to address diverse sustainability challenges: A critical review
PublicationOver the past years, persulfate (PS) is widely applied due to their high versatility and efficacy in decontamination and sterilization. While treatment of organic chemicals, remediation of soil and groundwater, sludge treatment, disinfection on pathogen microorganisms have been covered by most published reviews, there are no comprehensive and specific reviews on its application to address diverse sustainability challenges, including...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Radar and Sonar Imaging and Processing
PublicationThe 21 papers (from 61 submitted) published in the Special Issue “Radar and Sonar Imaging Processing” highlighted a variety of topics related to remote sensing with radar and sonar sensors. The sequence of articles included in the SI dealt with a broad profile of aspects of the use of radar and sonar images in line with the latest scientific trends. The latest developments in science, including artificial intelligence, were used.
-
Processing of Satellite Data in the Cloud
PublicationThe dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...
-
Revisiting serotonin’s role in spatial memory: A call for sensitive analytical approaches
PublicationThe serotonergic system is involved in various psychiatric and neurological conditions, with serotonergic drugs often used in treatment. These conditions frequently affect spatial memory, which can serve as a model of declarative memory due to well-known cellular components and advanced methods that track neural activity and behavior with high temporal resolution. However, most findings on serotonin's effects on spatial learning...
-
Determining coinsistent states of distributed objects paricipating in a remote method call
PublicationPrzedstawiono metodę testowania obiektów w systemie rozprzoszonym z wykorzystaniem replikacji stanu obiektów. W szczególności zaproponowano technikę zegarów haszujących do identyfikacji zdarzeń w systemach zawierających nieznaną a'priori liczbą obiektów oraz E-drzewo do identyfikacji stanu tych obiektów.
-
PROCESSING, MECHANICAL AND THERMAL PROPERTIES OF RECYCLED LOW-DENSITY POLYETHYLENE STREAMS
PublicationThe recycling of plastics is currently one of the most significant industrial challenges. Due to the enormous amounts of plastic wastes generated by various industry branches, it is essential to look for the potential methods of their utilization. Nevertheless, for the efficient application of recycled materials it is crucial to analyze their performance. Therefore, in presented paper we investigated the processing (melt flow index),...
-
Implementation of DIFAR Processing in ASW Dipping Sonar
PublicationThis paper presents the implementation of the signal processing algorithm used by buoy DIFAR (Directional Frequency Analysis and Recording), that is fully operational on Polish Navy anti-submarine warfare (ASW) helicopters and ships, applied to dipping sonars for detection and tracking of submarines. The development of the DSP algorithms was a part of the modernization of sonars conducted at the Gdansk University of Technology....