Filters
total: 29
filtered: 26
-
Catalog
Chosen catalog filters
Search results for: EDGE COMPUTING
-
Edge-Computing based Secure E-learning Platforms
PublicationImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Big Data and the Internet of Things in Edge Computing for Smart City
PublicationRequests expressing collective human expectations and outcomes from city service tasks can be partially satisfied by processing Big Data provided to a city cloud via the Internet of Things. To improve the efficiency of the city clouds an edge computing has been introduced regarding Big Data mining. This intelligent and efficient distributed system can be developed for citizens that are supposed to be informed and educated by the...
-
Some Artificial Intelligence Driven Algorithms For Mobile Edge Computing in Smart City
PublicationSmart mobile devices can share computing workload with the computer cloud that is important when artificial intelligence tools support computer systems in a smart city. This concept brings computing on the edge of the cloud, closer to citizens and it can shorten latency. Edge computing removes a crucial drawback of the smart city computing because city services are usually far away from citizens, physically. Besides, we introduced...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublicationIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
Big Data from Sensor Network via Internet of Things to Edge Deep Learning for Smart City
PublicationData from a physical world is sampled by sensor networks, and then streams of Big Data are sent to cloud hosts to support decision making by deep learning software. In a smart city, some tasks may be assigned to smart devices of the Internet of Things for performing edge computing. Besides, a part of workload of calculations can be transferred to the cloud hosts. This paper proposes benchmarks for division tasks between an edge...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublicationIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
A Survey of Vehicular Network Systems for Road Traffic Management
PublicationIn this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...
-
Moduł platformy SyMEC odpowiedzialny za współpracę serwera MEC z sieciami komórkowymi i bezprzewodowymi sieciami dostępowymi WLAN
PublicationZaprezentowano moduł współpracy z sieciami dostępowymi, będący istotnym elementem serwera MEC (Multi-access Edge Computing), budowanego w ramach projektu SyMEC i umożliwiającego uruchamianie elementów aplikacyjnych na brzegu sieci. Przedstawiono różnice w wymaganiach dotyczących sposobu realizacji tego komponentu w przypadku sieci dostępowych standaryzowanych przez 3GPP oraz sieci WLAN. Zaproponowana została architektura umożliwiająca...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublicationWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Co stymuluje rozwój współczesnej teleinformatyki i jakie są istotne kierunki tego rozwoju?
PublicationCorocznie dokonuje się oceny stanu sztuki i tendencji w rozwoju światowej telekomunikacji i (tele)informatyki przywołując „mierzalne” i „niemierzalne” zmiany. W artykule przedstawiono charakter tych zmian oraz wskazano wyzwania badawcze i wdrożeniowe istotne dla rozwoju tych dyscyplin. Zaprezentowano i scharakteryzowano ewolucję infrastruktury sieciowej prowadzącą do sieci programowalnych SDN (Software Defined Network) oraz wykorzystania...
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublicationWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
Sawing Processes as a Way of Determining Fracture Toughness and Shear Yield Stresses of Wood
PublicationA new computational model, based on fracture mechanics, was used to determine cutting forces. Unlike traditional computing methods, which depend on many coefficients reflecting the machining of solid wood, the new model uses two main parameters: fracture toughness and shear yield stresses. The aim of this study was to apply this new method to determine these parameters for the tooth cutting edge principal positions and longitudinal...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublicationMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
Adaptacyjny system oświetlania dróg oraz inteligentnych miast
PublicationPrzedmiotem rozprawy jest zbadanie praktycznej możliwości wykrywania w czasie rzeczywistym anomalii w systemie oświetlenia drogowego w oparciu o analizę danych ze inteligentnych liczników energii. Zastosowanie inteligentnych liczników energii elektrycznej (Smart Meter) w systemach oświetlenia drogowego stwarza nowe możliwości w zakresie automatycznej diagnostyki takich niepożądanych zjawisk jak awarie lamp, odstępstwa od harmonogramu...
-
Detection of Anomalies in the Operation of a Road Lighting System Based on Data from Smart Electricity Meters
PublicationSmart meters in road lighting systems create new opportunities for automatic diagnostics of undesirable phenomena such as lamp failures, schedule deviations, or energy theft from the power grid. Such a solution fits into the smart cities concept, where an adaptive lighting system creates new challenges with respect to the monitoring function. This article presents research results indicating the practical feasibility of real‐time...
-
Self-stabilizing algorithm for edge-coloring of graphs
PublicationReferat ten poświęcony jest kolorowaniu grafów w modelu rozproszonym.Podano samostabilizujący się algorytm kolorowania krawędzi grafu wraz z dowodem poprawności oraz oszacowaniem jego czasu działania.
-
Biblioteka PG w strukturach ogólnokrajowej sieci bibliotecznej (OSB)
PublicationBiblioteka Politechniki Gdańskiej została włączona do ogólnokrajowej sieci bibliotecznej (OSB). Proces rozbudowy OSB opiera się na wdrażaniu działającego w chmurze (cloud computing) systemu bibliotecznego Alma (z wyszukiwarką Primo), używanego przez ponad 3 tysiące bibliotek na świecie. Jest to system biblioteczny nowej generacji działający w oparciu o usługę chmurową typu Multitenant SaaS. Oznacza to, że system biblioteczny...
-
Automatic Detection of Nerves in Confocal Corneal Images with Orientation-Based Edge Merging
PublicationThe paper presents an algorithm for improving results of automatic nerve detections in confocal microscopy images of human corneal. The method is designed as a postprocessing step of regular detection. After the nerves are initially detected, the algorithms attempts to improve the results by filling unde-sired gaps between single nerves detections in order to correctly mark the entire nerve instead of only parts of it. This approach...
-
ARTIFICIAL MODEL IN THE ASSESSMENT OF THE ALGORITHM OF OBJECTS RECORDED BY LASER SCANNING SHAPE DETECTION (ALS/TLS)
PublicationBrief description of the study and used methods. Brief description of the study and used As part of the preparatory work aimed to create the application solution allowing for the automation of searching objects in data, obtained in the scanning process using ALS (Airborne Laser Scanning) or TLS (Terrestrial Laser Scanning), the authors prepared a artificial (synthetic, theoretical) model of space, used for the verification of operation...
-
Distributed graph searching with a sense of direction
PublicationIn this work we consider the edge searching problem for vertex-weighted graphs with arbitrarily fast and invisible fugitive. The weight function w provides for each vertex v the minimum number of searchers required to guard v, i.e., the fugitive may not pass through v without being detected only if at least w(v) searchers are present at v. This problem is a generalization of the classical edge searching problem, in which one has...
-
Paired domination subdivision and multisubdivision numbers of graphs
PublicationThe paired domination subdivision number sdpr(G) of a graph G is the minimum number of edges that must be subdivided (where an edge can be subdivided at most once) in order to increase the paired domination number of G. We prove that the decision problem of the paired domination subdivision number is NP-complete even for bipartite graphs. For this reason we define the paired domination muttisubdivision number of a nonempty graph...
-
On the connected and weakly convex domination numbers
PublicationIn this paper we study relations between connected and weakly convex domination numbers. We show that in general the difference between these numbers can be arbitrarily large and we focus on the graphs for which a weakly convex domination number equals a connected domination number. We also study the influence of the edge removing on the weakly convex domination number, in particular we show that a weakly convex domination number...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...
-
A CNN based coronavirus disease prediction system for chest X-rays
PublicationCoronavirus disease (COVID-19) proliferated globally in early 2020, causing existential dread in the whole world. Radiography is crucial in the clinical staging and diagnosis of COVID-19 and offers high potential to improve healthcare plans for tackling the pandemic. However high variations in infection characteristics and low contrast between normal and infected regions pose great challenges in preparing radiological reports....
-
Deep learning in the fog
PublicationIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...