Filters
total: 1841
filtered: 233
Search results for: SINUS NODE DYSFUNCTION
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Bounds on the Cover Time of Parallel Rotor Walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublicationWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
Identification of the Contamination Source Location in the Drinking Water Distribution System Based on the Neural Network Classifier
PublicationThe contamination ingression to the Water Distribution System (WDS) may have a major impact on the drinking water consumers health. In the case of the WDS contamination the data from the water quality sensors may be efficiently used for the appropriate disaster management. In this paper the methodology based on the Learning Vector Quantization (LVQ) neural network classifier for the identification of the contamination source location...
-
THE CONCEPT OF MODELING OF SNOW IMPACT ON THE STRUCTURE OF THE SUSPENDED TAURON ARENA ROOF IN CRACOW
PublicationThe article presents studies and numerical simulations on modeling snow influence on TAURON ARENA suspended roof structure in Cracow. The scope of work includes experimental tests, functions solutions taking into account various cases of snow impact according to PN and EC, as well as numerical simulations for the sport and entertainment arena in the Czyzyny district. The FEM roof structure model developed in the SOFISITK software...
-
Preserving Trees in Automata
PublicationWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Low-power device simulator for micro-energy measurement methods testing
PublicationThe paper presents low-power device simulator designed for testing of micro-energy measurement methods. Such kind methods can be used for evaluation of power systems based on Energy Harvesting. The device allows to set the current consumption characteristic over the time, thus making possible playing the role of different types of low-power devices e.g. simulating sensor network node.
-
THE INFLUENCE OF PHASE SHIFTERS ON THE VOLTAGE STABILITY OF CONNECTED POWER SYSTEMS
PublicationThe paper presents the results of simulation tests of connected power systems in which phase shifters were installed on cross-border links. The analysis was carried out in terms of assessing the impact of shifters on node voltage stability. Individual systems were characterized by different balance of active power: deficit or excess. The evaluation of voltage stability was based on the dU/dQ and dU/dP criteria.
-
Genetic predisposition to inflammatory bowel disease
PublicationInflammatory bowel disease (IBD) is a chronic, incurable inflammatory disease of the digestive system. The two main disease entities included in the IBD are ulcerative colitis and Crohn's disease. According to epidemiological studies there are more and more new cases every year. In especially among the youngest patients with symptoms of malnutrition and growth inhibition to land up in hospitalwith cancer suspected. The purpose...
-
Direct brain stimulation modulates encoding states and memory performance in humans
PublicationPeople often forget information because they fail to effectively encode it. Here, we test the hypothesis that targeted electrical stimulation can modulate neural encoding states and subsequent memory outcomes. Using recordings from neurosurgical epilepsy patients with intracranially implanted electrodes, we trained multivariate classifiers to discriminate spectral activity during learning that predicted remembering from forgetting,...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Constructing a map of an anonymous graph: applications of universal sequences
PublicationWe study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publication. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Prediction of Processor Utilization for Real-Time Multimedia Stream Processing Tasks
PublicationUtilization of MPUs in a computing cluster node for multimedia stream processing is considered. Non-linear increase of processor utilization is described and a related class of algorithms for multimedia real-time processing tasks is defined. For such conditions, experiments measuring the processor utilization and output data loss were proposed and their results presented. A new formula for prediction of utilization was proposed...
-
QRS Morphology-Based EDR Signal—Factors Determining its Properties
PublicationRespiration-induced signals contain a clinically significant information. It could be obtained utilizing both direct and indirect methods. ECG-Derived Respiration (EDR) method is the latter one. However, in this case, two approaches could be distinguished. First one is based on determining changes in the morphology of QRS complexes while the second one is based on the Respiratory Sinus Arrhythmia (RSA) mechanism. The former approach...
-
Posttraumatic Orbital Emphysema: A Numerical Model
PublicationOrbital emphysema is a common symptom accompanying orbital fracture. The pathomechanism is still not recognized and the usually assumed cause, elevated pressure in the upper airways connected with sneezing or coughing, does not always contribute to the occurrence of this type of fracture. Observations based on the finite model (simulating blowout type fracture) of the deformations of the inferior orbital wall after a strike in...
-
Escherichia coli Strains with Virulent Factors Typical for Uropathogens were Isolated from Sinuses from Patients with Chronic Rhinosinusitis—Case Report
PublicationEscherichia coli were isolated from three patients with chronic rhinosinusitis (CRS) by intraoperative sinus tissue biopsy. Taking into account the unusual replicative niche and previous treatment failures, it was decided to focus on the virulence and drug resistance of these bacteria. The strains turned out to be multi-sensitive, but the rich virulence factors profile of bacteria typical for phylogenetic group B2 deserved attention....
-
The Large Customer Reactive Power Control Possibilities
Publicationn this paper the authors wish to draw attention to the rationale for, and the possibility of, the use of local reactive power sources by the Transmission Node Master Controller (TNMC). Large Customers (LC) are one of the possible reactive power sources. The paper presents the issues related to the need for coordination between the control systems installed in the LC network, and coordination between control systems of the LC as...
-
Wstępny plan badań węzła z mimośrodem dodatnim w kratownicy z kształtowników o przekrojach poprzecznych otwartych. -(Autorka otrzymała wyróżnienie za tą publikację)
PublicationW celu określenia wpływu mimośrodowego przecinania się prętów w kratownicy z kształtowników giętych na zimno, o przekrojach poprzecznych otwartych na nośność i stateczność węzłów dźwigarów kratowych, opracowano model badawczy oraz przeprowadzono wstępną analizę numeryczną przedmiotowego węzła, w programie Marc Mentat. Uzyskane wyniki wskazują na potrzebę uzupełnienia obciążenia o parę sił poziomych w modelu badawczym.
-
Wysokociśnieniowe uszczelnienia ruchu obrotowego wału hydraulicznych maszyn wyporowych
PublicationW artykule przedstawiono wyniki badań mające na celu wytypowanie węzła uszczelniającego wał silnika hydraulicznego zapewniającego najwyższą trwałość przy smarowaniu wodą. Parametry pracy: ciśnienie 2 MPa i minimalna prędkość poślizgu uszczelek 2 m/s. Opisano również nowatorski przyrząd, na którym przeprowadzono pomiary wszystkich parametrów węzła uszczelniającego.
-
Result of the 6-min walk test is an independent prognostic factor of surgically treated non-small-cell lung cancer
PublicationPathological tumour, node and metastasis (TNM) stage remains the most significant prognostic factor of non-small-cell lung cancer (NSCLC). Meanwhile, age, gender, pulmonary function tests, the extent of surgical resection and the presence of concomitant diseases are commonly used to complete the prognostic profile of the patient with early stage of NSCLC. The aim of this study is to assess how the result of a 6-min walk test (6MWT)...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublicationWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
On FEM analysis of Cosserat-type stiffened shells. Static and stability linear analysis
PublicationThe present research investigates the theory and numerical analysis of shells stiffened with beams in the framework based on the geometrically exact theories of shells and beams. Shell’s and beam’s kinematics are described by the Cosserat surface and the Cosserat rod respectively, which are consistent including deformation and strain measures. A FEM approximation of the virtual work principle leads to the conforming shell and beam...
-
Modal analysis of a fish-belly flap type of steel water gate
PublicationABSTRACT: The results of a modal analysis of the fish-belly flap type of steel water gate are presented in the paper. The analysis was conducted for a detailed numerical model of the structure using four-node quadrilateral shell elements. The study was focused on the examination of the influence of positioning of the flap gate and hydrostatic pressure of water on the eigenvalues and eigenmodes of the structure. The results of the study...
-
The validation process of truss model with joint eccentricities
PublicationNowadays, due to the technological reasons in modern lightweight steel trusses, fabricated from cold-formed sections, positive eccentricities appear in the truss nodes, to induce additional forces truss chords. In order to account for the real load-carrying capacity of truss node area the steel structure research was conducted in scale 1:1. As a result of experimental research, the forms of deformation and strains of the walls...
-
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublicationDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...
-
Receptor for advanced glycation end‐products: Biological significance and imaging applications
PublicationThe receptor for advanced glycation end-products (RAGE or AGER) is a transmembrane, immunoglobulin-like receptor that, due to its multiple isoform structures, binds to a diverse range of endo- and exogenous ligands. RAGE activation caused by the ligand binding initiates a cascade of complex pathways associated with producing free radicals, such as reactive nitric oxide and oxygen species, cell proliferation, and immunoinflammatory...
-
Performance of FAN conception of traffic control in IP QoS networks
PublicationIn this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...
-
Energy Consumption Modeling in SPMD and DAC Applications
PublicationIn this chapter, we show a study of energy consumption during execution of SPMD and DAC application – the same applications which time of execution we modeled in the previous two chapters. We measured an average power usage at a single node of the GALERA+ cluster during application execution and then we modeled the total energy consumption by the application. Next we simulated the applications using MERPSYS and we compared the...
-
More Just Measure of Fairness for Sharing Network Resources
PublicationA more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...
-
The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface
PublicationIn the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...
-
From tryptophan to novel mitochondria-disruptive agent, synthesis and biological evaluation of 1,2,3,6-tetrasubstituted carbazoles
PublicationMitochondrial targeting plays an important role in anticancer therapy. The Mn(III)-promoted cyclization of 5- (1H-indol-3-yl)-3-oxopentanoic acid allow to obtain novel substituted carbazole derivatives that can act as mitochondria-disruptive agents. The starting materials used for the synthesis of these new aminocarbazoles are oxopentanoate derivatives of tryptophan. The scope and limitation of this method of synthesis are determined...
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublicationIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Finding small-width connected path decompositions in polynomial time
PublicationA connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Analysis of measurement uncertainty for contact-less method used to measure the position of catenary contact wire, performed with the use of Monte Carlo method
PublicationCurrently the majority of main railway lines in Europe are electrified, and electric trains have the biggest share in the entire amount of rail transport. Reliability of electrified railways is closely related to the issue of supplying traction vehicles with energy. The problems connected with diagnostics of energy consumption node, namely the contact line and the current collector, are therefore of fundamental importance for maintaining...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...