Filters
total: 579
filtered: 555
Search results for: POWER NETWORKS
-
Robustness in Compressed Neural Networks for Object Detection
PublicationModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
Annual signals observed in regional GPS networks
PublicationAbstract: This paper describes analyses concerning annual signals in GPS-derived coordinates. The data was processed in the Military University of Technology Local Analysis Centre with Bernese 5.0 software. We used observations from 129 permanent GPS stations which belong to the Polish Active Geodetic Network (ASG-EUPOS), for the period of GPS weeks 1465-1729, corresponding to about 5 years. The annual signals have been estimated...
-
Application of wavelength division multiplexing in sensor networks
PublicationOver the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Statistical significance of displacements in heterogeneous control networks
PublicationThis paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Cooperative Data Transmission in Wireless Vehicular Networks
PublicationThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
COMPARATIVE ANALYSIS OF ACTIVE GEODETIC NETWORKS IN POLAND
Publication -
A Development of a Capacitive Voltage Divider for High Voltage Measurement as Part of a Combined Current and Voltage Sensor
PublicationThis article deals with the development of capacitive voltage divider for high voltage measurements and presents a method of analysis and optimization of its parameters. This divider is a part of a combined voltage and current sensor for measurements in high voltage power networks. The sensor allows continuous monitoring of the network distribution status and performs a quick diagnosis and location of possible network failures....
-
Dynamic GPU power capping with online performance tracing for energy efficient GPU computing using DEPO tool
PublicationGPU accelerators have become essential to the recent advance in computational power of high- performance computing (HPC) systems. Current HPC systems’ reaching an approximately 20–30 mega-watt power demand has resulted in increasing CO2 emissions, energy costs and necessitate increasingly complex cooling systems. This is a very real challenge. To address this, new mechanisms of software power control could be employed. In this...
-
The publication of the European Commission's guidelines in an official language of a new Member State as a condition for their application.Case comment to the order of the Polish Supreme Court of 3 September 2009 (Ref. No. III SK 16/09) to refer a preliminary question to the Court of Justice of the European Union (C-410/99 Polska Telefonia Cyfrowa sp. z o.o. v Prezes Urzędu Komunikacji Elektronicznej)
PublicationThe case comment concentrates on two issues. In the first place, it contains an analysis of the legal character of the European Commission Guidelines on market analysis and the assessment of significant market power under the Community regulatory framework for electronic communications networks and services. Secondly, it analyses the consequences of the lack of publication of those Guidelines in Polishlanguage in the Official Journal...
-
Possibilities of heat transfer augmentation in heat exchangers with minichannels for marine applications
PublicationIn the paper, new trends in development of microchannel heat exchangers are presented. The exchangers developed in this way can be applied in marine applications. Main attention was focused on heat exchangers design with reduced size of passages namely based on microchannels. In our opinion future development of high power heat exchangers will be based on networks micro heat exchangers.
-
Trends in Locally Balanced Energy Systems without the Use of Fossil Fuels: A Review
PublicationIn recent years, the idea of the operation of energy systems (power systems, heating systems) has changed significantly. This paper is an overview of locally balanced energy systems without the use of fossil fuels. The paper justifies the concept of local energy balancing in a new energy system that does not use fossil fuels (coal, natural gas, and crude oil), based on European Union guidelines and formal documents as well as the...
-
Widespread theta synchrony and high-frequency desynchronization underlies enhanced cognition
PublicationThe idea that synchronous neural activity underlies cognition has driven an extensive body of research in human and animal neuroscience. Yet, insufficient data on intracranial electrical connectivity has precluded a direct test of this hypothesis in a whole-brain setting. Through the lens of memory encoding and retrieval processes, we construct whole-brain connectivity maps of fast gamma (30-100 Hz) and slow theta (3-8 Hz) spectral...
-
A gap waveguide-based mechanically reconfigurable phase shifter for high-power Ku-band applications
PublicationThis paper presents a novel design of a low-loss, reconfgurable broadband phase shifter based on groove gap waveguide (GGW) technology. The proposed phase shifter consists of a folded GGW and three bends with a few pins forming the GGW and one bend attached to a movable plate. This movable plate allows for adjustments to the folded waveguide length, consequently altering the phase of electromagnetic waves. The advantage of GGW...
-
A robust 18-pulse diode rectifier with coupled reactors
PublicationThe article presents the principle of operation and selected results of simulation and laboratory tests of the 18-pulse rectifier system with coupled reactors and small series active power filter. The presented system makes it possible to reduce, especially in distribution supply networks, undesired higher current harmonics. The 18-pulse nature of operation of the rectifier is reached using a set of coupled three-phase network...
-
Performance of LSP preemption methods in different MPLS networks
PublicationPreemption in Multiprotocol Label Switching (MPLS) is an optional traffic engineering technique used to create a new path of high priority when there is not enough bandwidth available. In such case the path is admitted by removing one or more previously allocated paths of lower priority. As there are usually many possible sets of low priority paths which can be selected, a preemption algorithm is being started to select the best...
-
Localization in wireless sensor networks based on zigbee platform
PublicationW artykule porównano dwie różne metody lokalizacji w sieciach sensorów bezprzewodowych. Jedną z metod jest implementacja sprzętowa algorytmu w układzie nadawczo odbiorczym CC2431. Drugą metodą jest implementacja programowa. Wyniki testów przeprowadzonych na otwartym terenie oraz w pomieszczeniach zamkniętych zostały przedstawione i porównane w pracy.
-
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublicationDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Accuracy analysis of a mobile station location in the cellular networks
PublicationJakość usług lokalizacyjnych oferowanych w sieciach komórkowych zależy od efektywności estymacji położenia terminala ruchomego. Dokładność obecnie stosowanych metod lokalizacyjnych jest niewystarczająca, szczególnie w odniesieniu do wywołań w niebezpieczeństwie. Modyfikacja istniejących algorytmów może istotnie wpłynąć na zwiększenie dokładności lokalizowania terminala ruchomego przy jednocześnie niewielkich nakładach finansowych....
-
Pattern matching localization in ZigBee wireless sensor networks.
PublicationLokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.
-
Survivability of unicast and anycast flows under attacks on networks
PublicationW artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...
-
Algorithms of fast service restoration in survivable multilayer networks
PublicationGłównym celem rozprawy jest zaproponowanie nowych modeli/algorytmów doboru tras zapewniających przeżywalność usług w sieciach IP-MPLS/WDM poprzez zastosowanie wyznaczonych zawczasu ścieżek zabezpieczających. Zakres pracy obejmuje: dokonanie przeglądu mechanizmów transmisji informacji w warstwowych sieciach teleinformatycznych IP-MPLS/WDM; szczegółowy opis sposobów zapewniania przeżywalności usług; zaproponowanie nowych metod doboru...
-
Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths
PublicationRozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.
-
CRVG - a new model for wireless networks topology generation
PublicationThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
Application of Bayesian Networks for Forecasting Future Model of Farm
Publication -
Mobility management solutions for current IP and future networks
PublicationEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Measures of region failure survivability for wireless mesh networks
PublicationWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Interval wavelength assignment in all-optical star networks
PublicationArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Design of Optical Wireless Networks with Fair Traffic Flows
Publication -
Architectural Modifications to Enhance Steganalysis with Convolutional Neural Networks
PublicationThis paper investigates the impact of various modifications introduced to current state-of-the-art Convolutional Neural Network (CNN) architectures specifically designed for the steganalysis of digital images. Usage of deep learning methods has consistently demonstrated improved results in this field over the past few years, primarily due to the development of newer architectures with higher classification accuracy compared to...
-
Characterizing the Scalability of Graph Convolutional Networks on Intel® PIUMA
PublicationLarge-scale Graph Convolutional Network (GCN) inference on traditional CPU/GPU systems is challenging due to a large memory footprint, sparse computational patterns, and irregular memory accesses with poor locality. Intel’s Programmable Integrated Unffied Memory Architecture (PIUMA) is designed to address these challenges for graph analytics. In this paper, a detailed characterization of GCNs is presented using the Open-Graph Benchmark...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublicationMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Outlier detection method by using deep neural networks
PublicationDetecting outliers in the data set is quite important for building effective predictive models. Consistent prediction can not be made through models created with data sets containing outliers, or robust models can not be created. In such cases, it may be possible to exclude observations that are determined to be outlier from the data set, or to assign less weight to these points of observation than to other points of observation....
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublicationIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublicationCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
NETWORKS, STAKEHOLDERS AND ENTREPRENEURIAL ECOSYSYSTEMS IN CURRENT POLISH ECONOMYGUT
PublicationThis book is dedicated to widely understood entrepreneurship and financial system in different polish ecosystems. In particular, there is described influence of supporting entrepreneurship to investment development in Walbrzych agglomerations communes with the results of questionnaires for varied groups of inhabitants, entrepreneurs and territorial self-governments. There is also presented analysis of relations within academic...
-
The Use of Semantic Networks for the Categorization of Prosumers: Expanded Version
Publication -
Distributed Trust Management Model for Wireless Sensor Networks
Publication -
Extraction of music information based on artifical neutral networks
PublicationW artykule przedstawiono założenia systemu automatycznego rozpoznawania muzyki. Na podstawie przeprowadzonych eksperymentów w artykule przedstawiono efektywność zaimplementowanych algorytmów w zależności od sposobu opisu danych muzycznych. Zaimpementowany system jest oparty o sztuczne sieci neuronowe.
-
Seamless roaming between UMTS and IEEE 802.11 networks.
PublicationW artykule opisano metody przełączania pomiędzy systemami UMTS i sieciami standardu IEEE 802.11 - wykorzystującymi protokół MIP. Zaproponowano parametry i ........związane z przełączeniami połączeń, pozwalające na zwiększenie efektywności pracy systemów końcowych, uzyskujących dostęp do Intrnetu za pomocą wspomnianych wyżej systemów. Propozycje zostały zweryfikowane metodami symulacyjnymi, z wykorzystaniem symulatora NS-2.