Filters
total: 9419
filtered: 7490
-
Catalog
- Publications 7490 available results
- Journals 43 available results
- Conferences 41 available results
- People 142 available results
- Inventions 20 available results
- Projects 1 available results
- Laboratories 3 available results
- Research Teams 5 available results
- Research Equipment 2 available results
- e-Learning Courses 315 available results
- Events 18 available results
- Open Research Data 1339 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: JOB SCHEDULING UNIFORM MACHINES MAKESPAN TOTAL COMPLETION TIME APPROXIMATION SCHEME NP-HARDNESS INCOMPATIBILITY GRAPH
-
Graph Representation Integrating Signals for Emotion Recognition and Analysis
PublicationData reusability is an important feature of current research, just in every field of science. Modern research in Affective Computing, often rely on datasets containing experiments-originated data such as biosignals, video clips, or images. Moreover, conducting experiments with a vast number of participants to build datasets for Affective Computing research is time-consuming and expensive. Therefore, it is extremely important to...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
Energy-Aware Scheduling for High-Performance Computing Systems: A Survey
PublicationHigh-performance computing (HPC), according to its name, is traditionally oriented toward performance, especially the execution time and scalability of the computations. However, due to the high cost and environmental issues, energy consumption has already become a very important factor that needs to be considered. The paper presents a survey of energy-aware scheduling methods used in a modern HPC environment, starting with the...
-
A Measurement-Based Approach for Speed Control of Induction Machines
PublicationThis paper presents an approach to design a measurement-based controller for induction machines. The proposed control approach is motivated by the fact that developing an appropriate mechanical model of such induction machines is a challenging task. Since our proposed control methodology is only on the basis of measured data, the controller design does not require any information about the model of the mechanical part. The control...
-
A space-efficient algorithm for computing the minimum cycle mean in a directed graph
PublicationAn algorithm is introduced for computing the minimum cycle mean in a strongly connected directed graph with n vertices and m arcs that requires O(n) working space. This is a considerable improvement for sparse graphs in comparison to the classical algorithms that require O(n^2) working space. The time complexity of the algorithm is still O(nm). An implementation in C++ is made publicly available at http://www.pawelpilarczyk.com/cymealg/.
-
Synthesis and properties of AxV2Al20 (A = Th, U, Np, Pu) ternary actinide aluminides
PublicationPolycrystalline samples of AxV2Al20 (A = Ce, Th, U, Np, Pu; 0.7 ≤ x ≤ 1.0) actinide intermetallics were synthesized using the arc-melting method. Crystal structure studies were performed by means of powder x-ray diffraction and the Rietveld refinement method. All studied compounds crystallize in the CeCr2Al20-type structure (space group Fd-3m, no. 227) with the actinoid and Ce atom located in the oversized icosahedral cage formed...
-
A Task-Scheduling Approach for Efficient Sparse Symmetric Matrix-Vector Multiplication on a GPU
PublicationIn this paper, a task-scheduling approach to efficiently calculating sparse symmetric matrix-vector products and designed to run on Graphics Processing Units (GPUs) is presented. The main premise is that, for many sparse symmetric matrices occurring in common applications, it is possible to obtain significant reductions in memory usage and improvements in performance when the matrix is prepared in certain ways prior to computation....
-
Modeling the impact of surface currents in a harbor using graph theory
PublicationEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Sensorless Control of Polyphase Induction Machines
PublicationThe basics of transformations of polyphase systems into orthogonal systems are explained. Vector models of induction machines in orthogonal planes are analysed and multiscalar models for rotor flux and main flux together with stator current are presented. A speed observer based on an extended model of the induction machine for selected variables is applied in the control system for the induction machine. On the basis of the model...
-
Characterizing the Scalability of Graph Convolutional Networks on Intel® PIUMA
PublicationLarge-scale Graph Convolutional Network (GCN) inference on traditional CPU/GPU systems is challenging due to a large memory footprint, sparse computational patterns, and irregular memory accesses with poor locality. Intel’s Programmable Integrated Unffied Memory Architecture (PIUMA) is designed to address these challenges for graph analytics. In this paper, a detailed characterization of GCNs is presented using the Open-Graph Benchmark...
-
Dynamic Analysis of an Enhanced Multi-Frequency Inertial Exciter for Industrial Vibrating Machines
Publication -
Total outer-connected domination in trees
PublicationW pracy przedstawiono dolne ograniczenie na liczbę dominowania totalnego zewnętrznie spójnego w grafach oraz scharakteryzowano wszystkie drzewa osiągające to ograniczenie.
-
Multichannel self-optimizing active noise control scheme
PublicationThe problem of cancellation of a nonstationary sinusoidal interference, acting at the output of an unknown multivariable linear stable plant, is considered. The proposed cancellation scheme is a nontrivial extension of the SONIC (self-optimizing narrowband interference canceller) algorithm, developed earlier for single-input, single-output plants. In the important benchmark case - for disturbances with randomwalk-type amplitude...
-
The Influence of Time and Storage Conditions on the Antioxidant Potential and Total Phenolic Content in Homemade Grape Vinegars
Publication -
Errors of a Linear Current Approximation in High-Speed PMSM Drives
PublicationCurrent sampling techniques and predictive algorithms used in the digital control of electric drives rely on a simple mathematical model that assumes linear current changes upon constant supplying voltages. This paper identifies rotor movement as a factor that makes this assumption invalid when the rotor covers an angular distance of a few tens of degrees during the control interval duration. The errors of the linear current approximation...
-
Approaches to experiment based friction modeling: polynomial approximation versus ann approximation
PublicationBadano warunki (poziom wymuszeń), przy których następowało wzbudzenie drgań mechanicznych przy tarciu ślizgowym konforemnego skojarzenia próbek wykonanych z Al2O3 (płaskie czoło tulei obracającej się względem swojej osi - powierzchnia płaska). Uzyskane dane eksperymentalne wykorzystano następnie do zbudowania modeli - stosując aproksymację wielomianami albo sztuczną siecią neuronową (ANN).
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublicationWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
Improved Uniform Sampling in Constrained Domains for Data-Driven Modelling of Antennas
PublicationData-driven surrogate modelling of antenna structures is an attractive way of accelerating the design process, in particular, parametric optimization. In practice, construction of surrogates is hindered by curse of dimensionality as well as wide ranges of geometry parameters that need to be covered in order to make the model useful. These difficulties can be alleviated by constrained performance-driven modelling with the surrogate...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublicationAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Response of cylindrical steel tank under stochastically generated non-uniform earthquake excitation
PublicationCylindrical steel tanks are very important structures in industrial facilities since their application is related to storing different types of products. Their safety and reliability have become a crucial issue because any damage may cause significant consequences, including ecological disaster. The most dangerous dynamic load acting on cylindrical steel tanks is related to earthquakes, especially that the seismic excitation may...
-
Text-mining Similarity Approximation Operators for Opinion Mining in BI tools
PublicationThe concept of the Text-mining Similarity Approximation Operators for Opinion Mining as extensions to Natural Language Interface Database is defined. The new operators: “keywords of” dimension; subsetting operator “about C is q”; aggregation operator “by similar C” are proposed. These operators are based on the Latent Semantic Analysis and Social Network Analysis
-
Real-time simulation in non real-time environment
PublicationSimulation in real-time is a very useful tool because of didactical and practical benefits. Very important benefit of real-time simulation is a fact that operator’s decision can be taken into account in the same time scale as the real system would work. This enables construction of simulators, and opportunity to test control algorithms in Hardware in The Loop scheme using target industrial equipment. Professional real-time environments...
-
Comparison of reproduction strategies in genetic algorithm approach to graph searching
Publicationgenetic algorithms (ga) are a well-known tool used to obtain approximate solutions to optimization problems. successful application of genetic algorithm in solving given problem is largely dependant on selecting appropriate genetic operators. selection, mutation and crossover techniques play a fundamental role in both time needed to obtain results and their accuracy. in this paper we focus on applying genetic algorithms in calculating...
-
Bounds on the Cover Time of Parallel Rotor Walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...
-
Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces
PublicationIndustry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular massive multiple-input multiple-output (MIMO), and its future evolution Large Intelligent Surfaces (LIS), which provide more reliable channel quality than previous technologies. As such, there arises the need to perform efficient scheduling of industrial control traffic...
-
Region protection/restoration scheme in survivable networks
PublicationW artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...
-
Weakly convex domination subdivision number of a graph
PublicationA set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublicationThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
An improved frequency estimator for an adaptive active noise control scheme
PublicationAn improved frequency tracker is proposed for the recently introduced self optimizing narrowband interference canceller (SONIC). The scheme is designed for disturbances with quasi-linear frequency modulation and, under second-order Gaussian random-walk assumption, can be shown to be statistically efficient. One real-world experiment and several simulations show that a considerable improvement in disturbance rejection may be achieved...
-
Toward an understanding of occupational burnout among employees with autism – the Job Demands‑Resources theory perspective
PublicationThis article aims to gain insight into the phenomenon of occupational burnout among employees with autism based on the theoretical framework of the Job Demands-Resources theory and the literature on employees with autism in the workplace. Firstly, we argue that although the resources and demands of the neurotypical and neurodivergent employees might be different, the theoretical mechanism of occupational burnout formation remains...
-
The influence of variants of finishing machining on scheduling of shaft components manufacturing
PublicationIn the paper variants of technological processes were presented to the study for piston rods and rams of hydraulic cylinders taking issues into consideration scheduling of course of the production in flexible manufacturing cell. At the carried study an attempt of the estimation of the influence of technological variants on the effectiveness to manufacture the flexible manufacturing system on the basis of preliminary schedules of...
-
Multiscalar Model Based Control Systems for AC Machines
PublicationContents of the Chapter: Nonlinear transformations and feedback linearization. Models of the squirrel cage induction machine: Vector model of the squirrel cage induction machine. Multiscalar models of the squirrel cage induction machine.Feedback linearization of multiscalar models of the induction motor.Models of the double fed induction machine: Vector model of the double fed induction machine. Multiscalar model of the...
-
Distributed graph searching with a sense of direction
PublicationIn this work we consider the edge searching problem for vertex-weighted graphs with arbitrarily fast and invisible fugitive. The weight function w provides for each vertex v the minimum number of searchers required to guard v, i.e., the fugitive may not pass through v without being detected only if at least w(v) searchers are present at v. This problem is a generalization of the classical edge searching problem, in which one has...
-
Synchronous generator model taking into account the non-uniform saturation of the pole shoes
PublicationFor the evaluation of modern electric power systems with regard to their behavior, weight, and reliability a novel modeling and simulation tools have been developed. The paper presents circuit model of synchronous generator taking into account both the non-sinusoidal distribution of the stator and rotor winding, and non-uniform saturation of the pole shoes. This model is suitable for simulation of both salient and no-salient pole...
-
Modifications of total synthesis of mycophenolic acid
PublicationThe total synthesis of mycophenolic acid (MPA), a potent immunosuppressant, was modified. The obtained mycophenolic acid was suitable for further preparation of new prospective immunosuppressants with improved therapeutic properties.
-
Feedback Control of Multiphase Induction Machines with Backstepping Technique
PublicationThe paper presents the control possibility of five phase induction machines. In the proposed solution the machine model vector form is not transformed to the (dq)-coordinate system, that is connected to rotor flux vector, but utilizes the stationary system ( αβ ). Moreover, the nonlinear model linearization is based on demonstrated nonlinear variables transformation for i-orthogonal ( αβ )(n) planes. By introducing the backstepping...
-
How Chain Transfer Leads to a Uniform Polymer Particle Morphology and Prevents Reactor Fouling
PublicationABSTRACT: The effect of adding diethyl zinc as a chain transfer agent during the polymerization of propylene in heptane performed at 80 °C was studied. Although it was expected that the chain transfer would stop after precipitation of the polymer, the polymer molecular weight continued to increase throughout the whole of the polymerization. The presence of diethyl zinc had an additional effect that the polymerizations were devoid...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
TOTAL SHIP OPERABILITY – REVIEW, CONCEPT AND CRITERIA
PublicationThe ship operability can be understood and analysed in different manners, and its quality is described using different indexes by different authors. Practically, there is no general and widely accepted description of total ship operability in the literature, nor in the rules of classification societies, which would include both seakeeping and manoeuvrability characteristics of a ship, and simultaneously take into account all ship...
-
Nordhaus-Gaddum results for the weakly convex domination number of a graph
PublicationArtykuł dotyczy ograniczenia z góry i z dołu (ze względu na ilość wierzchołków) sumy i iloczynu liczb dominowania wypukłego grafu i jego dopełnienia.
-
A note on the affective computing systems and machines: a classification and appraisal
PublicationAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...
-
The Method of a Two-Level Text-Meaning Similarity Approximation of the Customers’ Opinions
PublicationThe method of two-level text-meaning similarity approximation, consisting in the implementation of the classification of the stages of text opinions of customers and identifying their rank quality level was developed. Proposed and proved the significance of major hypotheses, put as the basis of the developed methodology, notably about the significance of suggestions about the existence of analogies between mathematical bases of...
-
Enhanced uniform data sampling for constrained data‐driven modeling of antenna input characteristics
PublicationData-driven surrogates are the most popular replacement models utilized in many fields of engineering and science, including design of microwave and antenna structures. The primary practical issue is a curse of dimensionality which limits the number of independent parameters that can be accounted for in the modelling process. Recently, a performance-driven modelling technique has been proposed where the constrained domain of the...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublicationIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Approximation of the non-linear roll damping
PublicationArtykuł omawia, jak otrzymać oszacowanie nieliniowego momentu tłumiącehgo kołysania boczne okretu za pomocą zapisu przebiegu kołysań swobodnych modelu okrętu. Udowadnia, że 1) moment tłumiący w kategoriach aproksymacji jest nieanalityczną funkcją nieparzystą prędkosci kołysań, 2) standardowa metoda, oparta na stosunku dwóch kolejnych amplitud, ma ograniczone zastosowanie, do niezbyt dużych amplitud kołysań. Zaproponowano nową metodą...
-
Numerical and experimental investigation of guided ultrasonic wave propagation in non-uniform plates with structural phase variations
PublicationThe article presents the results of numerical and experimental investigations of guided wave propagation in aluminum plates with variable thickness. The shapes of plate surfaces have been specially designed and manufactured using a CNC milling machine. The shapes of the plates were defined by sinusoidal functions varying in phase shift, which forced the changes in thickness variability alongside the propagation path. The main aim...
-
The association analysis for risk evaluation of significant delay occurrence in the completion date of construction project
Publication -
The estimation of total volatile organic compounds emissions generated from peroxide cured natural rubber/polycaprolactone blends
PublicationNatural rubber (NR)/polycaprolactone (PCL) blends at the ratio of 90/10% wt. (NR/PCL90/10) and 70/30% wt. (NR/PCL70/30), with a constant amount of dicumyl peroxide, were prepared by compounding in an internal mixer. Obtained NR/PCL bio-based blends were cured at three different temperatures (150 °C, 160 °C and 170 °C). The total content of volatile organic compounds (TVOC) as a function of the NR/PCL blends ratio, and their curing...