Search results for: OVERLAPPING COMMUNICATION AND COMPUTATIONS - Bridge of Knowledge

Search

Search results for: OVERLAPPING COMMUNICATION AND COMPUTATIONS

Filters

total: 1577
filtered: 994

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: OVERLAPPING COMMUNICATION AND COMPUTATIONS

  • Probabilistic Analysis of Structure Models using Target Random Sampling (TRS)

    Publication

    The work presents testing methods of sensitivity and reliability of mechanical or structural systems. All computations concerned the case of Zigler column, a simple model of a compressed column involving two random variables only. A conclusion was drawn that the standard Monte Carlo method, its reduction variants and the response surface method allow to assess the sensitivity of structural response to the variation of random structural...

    Full text to download in external service

  • A low complexity double-talk detector based on the signal envelope

    A new algorithm for double-talk detection, intended for use in the acoustic echo canceller for voice communication applications, is proposed. The communication system developed by the authors required the use of a double-talk detection algorithm with low complexity and good accuracy. The authors propose an approach to doubletalk detection based on the signal envelopes. For each of three signals: the far-end speech, the microphone...

    Full text available to download

  • Challenges in providing support for management of evidence-based arguments

    The paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...

    Full text to download in external service

  • Voice Multilateration System

    This paper presents an innovative method of locating airplanes, which uses only voice communication between an air traffic controller and the pilot of an aircraft. The proposed method is described in detail along with its practical implementation in the form of a technology demonstrator (proof of concept), included in the voice communication system (VCS). A complete analysis of the performance of the developed method is presented,...

    Full text available to download

  • 5G Technologies in Intelligent Transport Systems - Architectures, Virtualization and Network Slicing

    In the paper, 5G communication technologies implemented for Intelligent Transport Systems are discussed. Firstly, the essence of the 5G system concept is presented, and the problem of network functions virtualization (NFV) is analyzed. Moreover, the principle of virtualization is explained. Secondly, the analysis of network slicing is performed, from the point of view of transport systems implementation in the...

    Full text to download in external service

  • A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification

    Publication

    - Year 2020

    Vehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...

    Full text to download in external service

  • Project-Based Collaborative Research and Training Roadmap for Manufacturing Based on Industry 4.0

    Publication

    - Year 2023

    The importance of the economy being up to date with the latest developments, such as Industry 4.0, is more evident than ever before. Successful implementation of Industry 4.0 principles requires close cooperation of industry and state authorities with universities. A paradigm of such cooperation is described in this paper stemming from university partners with partly overlapping and partly complementary areas of expertise in manufacturing....

    Full text to download in external service

  • Prediction of coking dynamics for wet coal charge

    Publication

    - Chemical and Process Engineering : New Frontiers - Year 2015

    A one-dimensional transient mathematical model describing thermal and flow phenomena during coal coking in an oven chamber was studied in the paper. It also accounts for heat conduction in the ceramic oven wall when assuming a constant temperature at the heating channel side. The model was solved numerically using partly implicit methods for gas flow and heat transfer problems. The histories of temperature, gas evolution and internal...

    Full text available to download

  • Methods for quality improvement of multibeam and LiDAR point cloud data in the context of 3D surface reconstruction

    Publication

    Point cloud dataset is the transitional data model used in several marine and land remote-sensing applications. During further steps of processing, the transformation of point cloud spatial data to more complex models containing higher order geometric structures like edges and facets may be possible, if an appropriate quality level of input data is provided. Point cloud datasets usually contain a considerable amount of undesirable...

    Full text available to download

  • Fast Collaborative Graph Exploration

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2013

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text to download in external service

  • Fast collaborative graph exploration

    Publication

    - INFORMATION AND COMPUTATION - Year 2015

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text available to download

  • Analysis of Impulse Responses Measured in Motion in a Towing Tank

    Publication

    - Electronics - Year 2022

    The growing interest in developing autonomous underwater vehicles (AUVs) and creating underwater sensor networks (USNs) has led to a need for communication tools in underwater environments. For obvious reasons, wireless means of communication are the most desirable. However, conducting research in real conditions is troublesome and costly. Moreover, as hydroacoustic propagation conditions change very significantly, even during...

    Full text available to download

  • Analysis of Impulse Responses Measured in Motion in a Towing Tank

    Publication

    - Year 2023

    The growing interest in developing autonomous underwater vehicles (AUVs) and creating underwater sensor networks (USNs) has led to a need for communication tools in underwater environments. For obvious reasons, wireless means of communication are the most desirable. However, conducting research in real conditions is troublesome and costly. Moreover, as hydroacoustic propagation conditions change very significantly, even during...

    Full text to download in external service

  • Mixed 4-node shell element with assumed strain and stress in 6-parameter theory

    We propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...

    Full text to download in external service

  • Towards Effective Processing of Large Text Collections

    Publication

    In the article we describe the approach to parallelimplementation of elementary operations for textual data categorization.In the experiments we evaluate parallel computations ofsimilarity matrices and k-means algorithm. The test datasets havebeen prepared as graphs created from Wikipedia articles relatedwith links. When we create the clustering data packages, wecompute pairs of eigenvectors and eigenvalues for visualizationsof...

  • GPU Acceleration of Multilevel Solvers for Analysis of Microwave Components With Finite Element Method

    The letter discusses a fast implementation of the conjugate gradient iterative method with ${rm E}$-field multilevel preconditioner applied to solving real symmetric and sparse systems obtained with vector finite element method. In order to accelerate computations, a graphics processing unit (GPU) was used and significant speed-up (2.61 fold) was achieved comparing to a central processing unit (CPU) based approach. These results...

    Full text to download in external service

  • Mixed 4-node shell element with assumed strain and stress in 6-parameter theory

    We propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...

    Full text to download in external service

  • ICT and social development. Conceptual considerations.

    Publication

    - Year 2020

    This chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...

    Full text to download in external service

  • APIS – Agent Platform for Integration of Services

    The paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...

    Full text available to download

  • Natural Deep Eutectic Solvents as Agents for Improving Solubility, Stability and Delivery of Curcumin

    Publication

    - PHARMACEUTICAL RESEARCH - Year 2019

    Purpose Study on curcumin dissolved in natural deep eutectic solvents (NADES) was aimed at exploiting their beneficial properties as drug carriers. Methods The concentration of dissolved curcumin in NADES was measured. Simulated gastrointestinal fluids were used to determine the concentration of curcumin and quantum chemistry computations were performed for clarifying the origin of curcumin solubility enhancement in NADES. Results NADES...

    Full text to download in external service

  • Koncepcja zdalnego sterowania i monitoringu urządzeń trakcyjnych z wykorzystaniem technologii teleinformatycznych

    Publication

    Advancement in wireless communication enables engineers to apply sophisticated and relatively inexpensive technologies in new fields of industry, which were previously designated solely to wire-based solutions. One of those fields is railway transportation system. In effect of a high reliability and safety demands, this area was resistive to new technologies. Nowadays, increased security and reliability of wireless sensor networks...

  • Low Power Baseband Processor for M2M Reconfigurable Radio Test Platform

    Publication

    Software Defined Radio (SDR) is becoming more andmore frequently used technique for wireless communication. Itfacilitates as fast prototyping and is a versatile method fordeveloping new communication systems. SDR can be realizedbased on high computational capacity platform, where powerconsumption is no a primary concern like i.e. DVB or BTStransmitters. Another trend are low power systems, whereavailable power in reduced and more...

  • Computational complexity and length of recorded data for fluctuation enhanced sensing method in resistive gas sensors

    Publication

    - Year 2015

    This paper considers complexity and accuracy of data processing for gas detection using resistance fluctuation data observed in resistance gas sensors. A few selected methods were considered (Principal Component Analysis – PCA, Support Vector Machine – SVM). Functions like power spectral density or histogram were used to create input data vector for these algorithms from the observed resistance fluctuations. The presented considerations...

    Full text to download in external service

  • Local basis function estimators for identification of nonstationary systems

    Publication

    The problem of identification of a nonstationary stochastic system is considered and solved using local basis function approximation of system parameter trajectories. Unlike the classical basis function approach, which yields parameter estimates in the entire analysis interval, the proposed new identification procedure is operated in a sliding window mode and provides a sequence of point (rather than interval) estimates. It is...

    Full text to download in external service

  • Modeling of Performance, Reliability and Energy Efficiency in Large-Scale Computational Environment

    Publication

    - Year 2016

    Large scale of complexity of distributed computational systems imposes special challanges for prediction of quality in such systems.Existing quality models for lower-scale systems include functionality,performance,reliability,flexibility and usability.Among these attributes,performance and reliability have a particular significance to the large-scale systems computing quality modeling due to their strong dependence on the system...

  • Local Mesh Deformation for accelerated parametric studies based on the Finite Element Method

    Publication

    This paper presents an approach for enhancing the efficiency of two-dimensional Finite Element Method analysis in parametric studies or optimisation process of microwave components. The new approach involves local mesh deformation applied near the elements that are modified during computations. Since in the proposed approach the topology of the mesh remains unchanged, a new mesh does not have to be generated from scratch when the...

    Full text to download in external service

  • Analysis of allophones based on audio signal recordings and parameterization

    The aim of this study is to develop an allophonic description of English plosive consonants based on recordings of 600 specially selected words. Allophonic variations addressed in the study may have two sources: positional and contextual. The former one depends on the syllabic or prosodic position in which a particular phoneme occurs. Contextual allophony is conditioned by the local phonetic environment. Co-articulation overlapping...

    Full text to download in external service

  • Data Acquisition in a Manoeuver Auto-negotiation System

    Typical approach to collision avoidance systems with artificial intelligence support is that such systems assume a central communication and management point (such as e.g. VTS station), usually located on shore. This approach is, however, not applicable in case of an open water encounter. Thus, recently a new approach towards collision avoidance has been proposed, assuming that all ships in the encounter, either restricted or open...

    Full text available to download

  • Fashion Games, Fashion in Games and Gamification in Fashion. A First Map

    Publication

    - Year 2023

    Fashion companies have been using different forms of entertainment such as film and television, sport, music, museums, and photography as inspiration sources and as communication and marketing channels for decades. However, in recent years, they have also started to consider the gaming world. While gaming offers a potential revenue stream from sales of physical and digital clothing, change in it is also the gateway to access new...

    Full text to download in external service

  • Autistic Employees’ Technology-Based Workplace Accommodation Preferences Survey—Preliminary Findings

    Background: There has been an increase in the number of research studies focused on the design of accommodations aimed at improving the well-being and work performance of autistic employees. These accommodations took various forms; some of them were based on modification of management practices, for example, support in the area of effective communication, or involved modifications to the physical working environment aimed at limiting...

    Full text available to download

  • Analysis of Video Transmission Capabilities in a Simulated OFDM-Based Supplementary BPL-PLC System

    Publication

    - ENERGIES - Year 2022

    The design and maintenance of a reliable communication system, especially in harsh working conditions for the oil and mining industry, brings many challenges. With the use of a video transmission system, one can monitor the crew and their working environment. Broadband over power line–power line communication (BPL-PLC) seems an ideal medium for such a service, since it enables the use of the existing wired infrastructure for supplementary...

    Full text available to download

  • Erosion of privacy in computer vision systems

    W pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.

  • Uncertainty in emotion recognition

    Purpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...

    Full text to download in external service

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Full text to download in external service

  • Security Assessment of a Turbo-Gas Power Plant

    Publication

    - Year 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Full text to download in external service

  • Modeling of Performance, Reliability and Energy Efficiency in Large-Scale Computational Environments

    Publication

    - Year 2013

    Large scale of complexity of distributed computational systems imposes special challenges for prediction of quality in such systems. Existing quality models for lower-scale systems include functionality, performance, reliability, flexibility and usability. Among these attributes, performance and reliability have a particular significance to the large-scale systems computing quality modeling due to their strong dependence on the...

  • An absorbing set for the Chialvo map

    The classical Chialvo model, introduced in 1995, is one of the most important models that describe single neuron dynamics. In order to conduct effective numerical analysis of this model, it is necessary to obtain a rigorous estimate for the maximal bounded invariant set. We discuss this problem, and we correct and improve the results obtained by Courbage and Nekorkin (2010). In particular, we provide an explicit formula for an...

    Full text to download in external service

  • FPGA computation of magnitude of complex numbers using modified CORDIC algorithm

    In this work we present computation of the magnitude of complex numbers using a modified version of the CORDIC algorithm that uses only five iterations. The relationship between the computation error and the number of CORDIC iterations are presented for floating-point and integer arithmetics. The proposed modification of CORDIC for integer arithmetic relies upon the introduction of correction once basic computations are performed...

    Full text available to download

  • Simplified probabilistic analysis of settlement of cyclically loaded soil stratum using point estimate method

    The paper deals with the probabilistic analysis of settlement of a non-cohesive soil layer subjected to cyclic loading. Originally, the settlement assessment is based on deterministic compaction model which requires integration of a set of differential equations. However, making use of the Bessel functions the settlement of the soil stratum can be calculated by means of simplified algorithm. The compaction model parameters were...

    Full text available to download

  • Providing Differentiated Levels of Service Availability in VANET Communications

    Publication

    Inter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...

    Full text to download in external service

  • Propagation Loss and Interference Analysis for 5G Systems in the Context of C-ITS System Implementation

    Publication

    - Year 2019

    The article presents the concept of implementing subsequent phases of services for the C-ITS system (the Cooperative Intelligent Transport Systems), based on the European Parliament resolution of March 2018. Next, the 5G systems, in the context of their possible cooperation with C-ITS systems, were discussed. Numerical propagation analysis was performed for V2V and V2I type communication based on two different propagation models....

  • Adopting collaborative games into Open Kanban

    Publication

    - Year 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Full text to download in external service

  • Protokoły łączności do transmisji strumieni multimedialnych na platformie KASKADA

    Publication

    Platforma KASKADA rozumiana jako system przetwarzania strumieni multimedialnych dostarcza szeregu usług wspomagających zapewnienie bezpieczeństwa publicznego oraz ocenę badań medycznych. Wydajność platformy KASKADA w znaczącym stopniu uzależniona jest od efektywności metod komunikacji, w tym wymiany danych multimedialnych, które stanowią podstawę przetwarzania. Celem prowadzonych prac było zaprojektowanie podsystemu komunikacji...

  • FEM simulations applied to the failure analysis of RC structure under the influence of municipal sewage pressure

    The paper discusses a failure mechanism of reinforced concrete (RC) structure with steel cover that failed under the influence of municipal sewage pressure. To explain the reasons of failure, in-situ measurements, laboratory experiments and comprehensive Finite Element Method (FEM) computations were performed. Non-destructive in-situ scanning tests were carried out to determine quantity and cover thickness of embedded reinforcement...

    Full text to download in external service

  • FPGA implementation of the multiplication operation in multiple-precision arithmetic

    Publication

    - Year 2017

    Although standard 32/64-bit arithmetic is sufficient to solve most of the scientific-computing problems, there are still problems that require higher numerical precision. Multiple-precision arithmetic (MPA) libraries are software tools for emulation of computations in a user-defined precision. However, availability of a reconfigurable cards based on field-programmable gate arrays (FPGAs) in computing systems allows one to implement...

    Full text available to download

  • Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities

    Publication

    - Year 2022

    In relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...

    Full text available to download

  • The Challenge of Quantification: An Interdisciplinary Reading

    Publication

    - Minerva - A Review of Science, Learning and Policy - Year 2023

    The present work looks at what we call “the multiverse of quantification”, where visible and invisible numbers permeate all aspects and venues of life. We review the contributions of different authors who focus on the roles of quantification in society, with the aim of capturing different and sometimes separate voices. Several scholars, including economists, jurists, philosophers, sociologists, communication and data scientists,...

    Full text available to download

  • Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management

    Publication

    - ENERGIES - Year 2022

    This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...

    Full text available to download

  • Disciplines and measures of information resilience

    Publication
    • J. Rak
    • M. Jonsson
    • D. Hutchison
    • J. Sterbenz

    - Year 2017

    Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...

    Full text to download in external service

  • Nanostructure and dielectric behavior of vanadate glasses containing BaTiO3

    The ac and dc electrical conductivity of barium titanate doped bismuth-vanadate as-quenched and heat-treated materials was measured in the frequency range from 1 mHz to 1 MHz and in the temperature range from 153 K to 423 K with the impedance spectroscopy method. The microstructure was investigated by means of XRD, scanning electron microscopy (SEM), atomic force microscopy (AFM) and confocal microscopy. The obtained results showed...

    Full text to download in external service