Search results for: analytic information theory - Bridge of Knowledge

Search

Search results for: analytic information theory

Filters

total: 25110
filtered: 3143

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: analytic information theory

  • Product Graph Invariants with Applications in the Theory of Information

    Publication

    - Year 2012

    There are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...

  • Average Redundancy of the Shannon Code for Markov Sources

    Publication

    It is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...

    Full text to download in external service

  • On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources

    Publication

    We study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...

    Full text to download in external service

  • Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof

    Publication
    • D. Yang
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • W. Song

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    New measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...

    Full text to download in external service

  • Types of Markov Fields and Tilings

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2016

    The method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...

    Full text available to download

  • General paradigm for distilling classical key from quantum states

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Full text to download in external service

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Full text to download in external service

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

  • A few steps more towards NPT bound entanglement

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2010

    In this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...

    Full text to download in external service

  • Extending loophole-free nonlocal correlations to arbitrarily large distances

    Publication

    - npj Quantum Information - Year 2024

    Quantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...

    Full text available to download

  • Application of the numerical-analytic method for systems of differential equations with parameter

    Publication

    The numerical-analytic method is applied to systems of differential equations with parameter under the assumption that the corresponding functions satisfy the Lipschitz conditions in matrix notation. We also obtain several existence results for problems with deviations of an argument

  • A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence

    Publication

    - COMBINATORICS PROBABILITY & COMPUTING - Year 2014

    We resolve a conjecture proposed by D.E. Knuth concerning a recurrence arising in the satisfiability problem. Knuth's recurrence resembles recurrences arising in the analysis of tries, in particular PATRICIA tries, and asymmetric leader election. We solve Knuth's recurrence exactly and asymptotically, using analytic techniques such as the Mellin transform and analytic depoissonization.

    Full text to download in external service

  • Application of Analytic Signal and Smooth Interpolation in Pulse Width Modulation for Conventional Matrix Converters

    Publication

    - IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS - Year 2020

    The paper proposes an alternative and novel approach to the PWM duty cycles computation for Conventional Matrix Converters (CMC) fed by balanced, unbalanced or non–sinusoidal AC voltage sources. The presented solution simplifies the prototyping of direct modulation algorithms. PWM duty cycles are calculated faster by the smooth interpolation technique, using only vector coordinates, without trigonometric functions and angles. Both...

    Full text available to download

  • MULTI-CRITERIA INVESTMENT DECISION SUPPORT MODEL USING FUZZY ANALYTIC HIERARCHY PROCESS (F-AHP) METHOD FOR POWER INDUSTRY

    In this paper, the comparative analysis of two wind farm construction projects was presented. This particular type of analysis is commonly applied before purchasing investment project being in a planning phase by a company interested in its development. Conduction of this type of analysis is prompted by the necessity to take into consideration the requirements of Polish legislation. Comparison of wind farm construction projects...

    Full text available to download

  • Analiza lokalizacji biogazowni metodami AHP i taksonomi numerycznej - porównanie metod

    Artykuł przedstawia porównanie wielokryterialnej metody Analytic Hierarchy Proces oraz taksonomii numerycznej w oparciu o wybór lokalizacji biogazowni.

    Full text available to download

  • Average Size of a Suffix Tree for Markov Sources

    Publication

    - Year 2016

    We study a suffix tree built from a sequence generated by a Markovian source. Such sources are more realistic probabilistic models for text generation, data compression, molecular applications, and so forth. We prove that the average size of such a suffix tree is asymptotically equivalent to the average size of a trie built over n independentsequences from the same Markovian source. This equivalenceis only known for memoryless...

    Full text to download in external service

  • Zastosowanie metody AHP do oceny zagrożeń na stanowiskach pracy.

    Publication

    - Year 2003

    W artykule przedstawiono podstawy wielokryterialnej metody wspomagania decyzji AHP (ang. Analytic Hierarchy Process) oraz jej zastosowanie do oceny zagrożeń na stanowiskach pracy.

  • Analytical Steady-State Model of the Pipeline Flow Process

    Publication

    The paper addresses the issue of modeling the flow process in transmission pipelines. A base model used for numerical simulation is introduced. Under certain assumptions concerning steady state analysis, the differential equations describing the process are solved analytically for two cases: zero and nonzero inclination angle α. These equations describe a constant flow rate and a corresponding distribution of the pressure along...

    Full text available to download

  • Evaluating Industry 4.0 Implementation Challenges Using Interpretive Structural Modeling and Fuzzy Analytic Hierarchy Process

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2021

    The fourth industrial revolution known as Industry 4.0 is reshaping and evolving the way industries produce products and individuals live and work therefore, gaining massive attraction from academia, business and politics. The manufacturing industries are optimistic regarding the opportunities Industry 4.0 may offer such as, improved efficiency, productivity and customization. The present research contributes to the Industry 4.0...

    Full text available to download

  • Long-distance quantum communication over noisy networks without long-time quantum memory

    Publication
    • P. Mazurek
    • A. Grudka
    • M. Horodecki
    • P. Horodecki
    • J. Łodyga
    • Ł. Pankowski
    • A. Przysiężna

    - PHYSICAL REVIEW A - Year 2014

    The problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...

    Full text available to download

  • An analysis of domain-based ship collision risk parameters

    According to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...

    Full text to download in external service

  • Fault diagnosing system of wheeled tractors

    Publication

    - Year 2015

    A defect of complex wheeled tractor assembles most frequently negative influence on exploitation efficiency, safety and exhaust gases emission. Structure complexity of wheeled tractors requires more and more advanced diagnostic methods for identification of their serviceable possibilities as well in manufacturing step as in exploitation. In classical diagnosing methods of wheeled tractor defects states mapping by measured diagnostic...

  • Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP

    The aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...

  • Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system

    Publication

    Motivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.

    Full text available to download

  • DL_MG: A Parallel Multigrid Poisson and Poisson–Boltzmann Solver for Electronic Structure Calculations in Vacuum and Solution

    Publication
    • J. Womack
    • L. Anton
    • J. Dziedzic
    • P. Hasnip
    • M. Probert
    • C. Skylaris

    - Journal of Chemical Theory and Computation - Year 2018

    The solution of the Poisson equation is a crucial step in electronic structure calculations, yielding the electrostatic potential -- a key component of the quantum mechanical Hamiltonian. In recent decades, theoretical advances and increases in computer performance have made it possible to simulate the electronic structure of extended systems in complex environments. This requires the solution of more complicated variants of the...

    Full text available to download

  • Three-dimensional conceptual model for service-oriented simulation

    Publication

    - Journal of Zhejiang University-SCIENCE A - Year 2009

    n this letter, we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation, and software/systems engineering. Finally,...

    Full text to download in external service

  • Emotions Embodied in the SVC of an Autonomous Driver System

    Publication

    A concept of embodied intelligence (EI) is considered. None of such implementations can be fully identified with artificial intelligence. Projects that dare to approach AI and EI should be based on both the AI concepts (symbolic and sub-symbolic), in solving real problems of perception and decision-making. Therefore, the EI, in this paper, is understood as a methodology that uses all available resources and algorithms from the...

    Full text available to download

  • Enriched buckling for beam-lattice metamaterials

    Publication

    We discuss two examples of beam-lattice metamaterials which show attractive mechanical properties concerning their enriched buckling. The first one considers pantographic beams and the nonlinear solution is traced out numerically on the base of a Hencky’s model and an algorithm based on Riks’ arc-length scheme. The second one concerns a beam-lattice with sliders and the nonlinear solution is discussed in analytic way and, finally,...

    Full text available to download

  • A novel architecture of Web-GIS for mapping and analysis of echinococcosis in Poland

    Publication

    - Applied Geomatics - Year 2022

    Echinococcosis is an infectious disease transferred through ingestion of food or water which have been contaminated with eggs of the Echinococcus tapeworm, which are spread by intermediate parasite hosts. Because the latter are primarily territorial, research related to diagnosis and prevention of echinococcosis requires investigation of environmental factors, which can be supported with the use of a Geographical Information System...

    Full text available to download

  • On a Recurrence Arising in Graph Compression

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2012

    In a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1􀀀p). A new node is created as long as...

    Full text to download in external service

  • PORÓWNANIE PROJEKTÓW BUDOWY FARM WIATROWYCH Z WYKORZYSTANIEM METODY AHP

    W referacie opisano porównanie projektów budowy farm wiatrowych będących w różnych stadiach realizacji przygotowania inwestycji. Metodą, którą wykorzystano do porównania projektów jest metodą analizy wielokryterialnej AHP (Analytic Hierarchy Process). Referat przedstawia opis metody oraz kryteriów, pod względem których porównano projekty. Wykazano, że dla projektu P2 czas zdobycia wszystkich niezbędnych...

    Full text available to download

  • A New Expression for the 3-D Dyadic FDTD-Compatible Green's Function Based on Multidimensional Z-Transform

    In this letter, a new analytic expression for the time-domain discrete Green's function (DGF) is derived for the 3-D finite-difference time-domain (FDTD) grid. The derivation employs the multidimensional Z-transform and the impulse response of the discretized scalar wave equation (i.e., scalar DGF). The derived DGF expression involves elementary functions only and requires the implementation of a single function in the multiple-precision...

    Full text to download in external service

  • Approximate Quality Criteria for Difficult Multi-Objective Optimization Problems

    Publication

    This paper introduces approximate analytic quality criteria useful in assessing the efficiency of evolutionary multi-objective optimization (EMO) procedures. We present a summary of extensive research into computing. In the performed comparative study we take into account the various approaches of the state-of-the-art, in order to objectively assess the EMO performance in highly dimensional spaces; where some executive criteria,...

    Full text available to download

  • Approximate Quality Criteria for Difficult Multi-Objective Optimization Problems

    Publication

    This paper introduces approximate analytic quality criteria useful in assessing the efficiency of evolutionary multi-objective optimization (EMO) procedures. We present a summary of extensive research into computing. In the performed comparative study we take into account the various approaches of the state-of-the-art, in order to objectively assess the EMO performance in highly dimensional spaces; where some executive criteria,...

    Full text available to download

  • Different philosophical approaches to estimating missing data in AHP frameworks for uncertainty representation in risk assessments

    Publication

    AHP (ang. Analytic Hierarchy Process) jest jedną z metod szeroko stosowaną w wieloatrybutowym podejmowaniu decyzji. Zwykle ekspert lub grupa ekspertów jest proszona o wyrażenie swojej subiektywnej opinii o każdej z par wariantów decyzyjnych. Na tej podstawie tworzone są tzw. macierze ocen. Zdarza się często, że macierze takie są niekompletne i wtedy występuje problem brakujących danych. Referat dotyczy wybranych metod ich uzupełnienia.

  • Factors Affecting the Rheological Properties of Foods

    Publication

    - Year 2023

    In this chapter, engineering aspects concerning real body mechanics and the impact of respective food ingredients on said properties are presented together. Food is a complex matrix and each of macro and micro ingredients plays its role in the formation of rheologic properties, and minor changes in the basic ingredient structure may affect the change of these properties significantly. Basic analytic techniques are presented for...

  • An Extended Control of the Input Angle for Matrix Converters Connected with the Non-Unity Power Factor Loads.

    This paper proposes a novel PWM modulation algorithm for Multiphase Conventional Matrix Converters (MCMC), with 3 inputs and k outputs, using the transfer function of the load angle. The proposed approach extends the range of power angle control at the input during the operation with a maximum voltage transfer ratio. The proposed concept is based on the Direct Analytic Voltage PWM (DAV--PWM) modulation with an elliptical trajectory...

    Full text to download in external service

  • Important Facts and Observations about Pairwise Comparisons (the special issue edition)

    Publication
    • W. W. Koczkodaj
    • L. Mikhailov
    • G. Redlarski
    • M. Soltys
    • J. Szybowski
    • G. Tamazian
    • E. Wajch
    • K. K. F. Yuen

    - FUNDAMENTA INFORMATICAE - Year 2016

    This study has been inspired by numerous requests for clarification from researchers who often confuse Saaty’s Analytic Hierarchy Process (AHP) with the pairwise comparisons (PC) method, taking AHP as the only representation of PC. This study should be regarded as an interpretation and clarification of past investigations of PC. In addition, this article is a reflection on general PC research at a higher level of abstraction: the...

    Full text to download in external service

  • Modeling and experimental investigation of the small UPQC systems

    Publication

    - Year 2005

    In this paper the basis of analytical modelling of the UPQC arrangements (Unified Power Quality Conditioner) in d-q rotating coordinates, as well as select results of investigations conducted on the simplified small power laboratory model were talked over. In short form power balance as well as fundamental dependences and analytic model with regard of decoupling circuits were investigated. Applied method for DC link capacity selection...

    Full text available to download

  • Approximate models and parameter analysis of the flow process in transmission pipelines

    Publication

    the paper deals with the problem of early leak detection in transmission pipelines. First we present the derivation of state-space equations of the flow process in the pipelines. This description is then aggregated in order to obtain a principal model. Next, the problem of process model parameterization is addressed, taking into account the maximization of a model stability margin. The location of the maximum is determined using...

    Full text to download in external service

  • On DoA estimation for rotating arrays using stochastic maximum likelihood approach

    The flexibility needed to construct DoA estimators that can be used with rotating arrays subject to rapid variations of the signal frequency is offered by the stochastic maximum likelihood approach. Using a combination of analytic methods and Monte Carlo simulations, we show that for low and moderate source correlations the stochastic maximum likelihood estimator that assumes noncorrelated sources has accuracy comparable to the...

    Full text available to download

  • Global Complex Roots and Poles Finding Algorithm Based on Phase Analysis for Propagation and Radiation Problems

    A flexible and effective algorithm for complex roots and poles finding is presented. A wide class of analytic functions can be analyzed, and any arbitrarily shaped search region can be considered. The method is very simple and intuitive. It is based on sampling a function at the nodes of a regular mesh, and on the analysis of the function phase. As a result, a set of candidate regions is created and then the roots/poles are verified...

    Full text available to download

  • Uogólniona metoda agregacji w sensie AHP w analizie ryzyka systemów technicznych.

    Publication

    Przedstawiono problematykę badawczą związaną z uwzględnieniem czynników wpływu w ocenie bezpieczeństwa oraz jakościowej i ilościowej analizie ryzyka systemów technicznych. Podkreśla się znaczenie oceny czynników środowiskowych, ludzkich i organizacyjnych w procesie analizy ryzyka i podejmowania decyzji. Proponowana metoda stosowania HID (hierarchical influence diagrams)wspomagająca analizę i szeregowanie opcji sterowania...

  • Information Logistics as a Paradigm

    This paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...

    Full text available to download

  • Parallel implementation of the DGF-FDTD method on GPU Using the CUDA technology

    Publication

    The discrete Green's function (DGF) formulation of the finite-difference time-domain method (FDTD) is accelerated on a graphics processing unit (GPU) by means of the Compute Unified Device Architecture (CUDA) technology. In the developed implementation of the DGF-FDTD method, a new analytic expression for dyadic DGF derived based on scalar DGF is employed in computations. The DGF-FDTD method on GPU returns solutions that are compatible...

    Full text to download in external service

  • MULTI-CRITERIA COMPARATIVE ANALYSIS OF THE USE OF SUBTRACTIVE AND ADDITIVE TECHNOLOGIES IN THE MANUFACTURING OF OFFSHORE MACHINERY COMPONENTS

    The dynamic development of additive manufacturing technologies, especially over the last few years, has increased the range of possible industrial applications of 3D printed elements. This is a consequence of the distinct advantages of additive techniques, which include the possibility of improving the mechanical strength of products and shortening lead times. Offshore industry is one of these promising areas for the application...

    Full text available to download

  • Ranking ecosystem services delivered by trees in urban and rural areas

    Publication

    - AMBIO - Year 2022

    Policies and strategies for tree management and protection on a national, regional, and local level have not sufficiently considered differences between rural and urban areas. We used expert knowledge to compare rural and urban areas in a case study evaluating the relative importance of ecosystem services (ES) in policy development. The Analytic Hierarchy Process (AHP) and focus group discussions were used to rank 17 ES, representing...

    Full text available to download

  • Use of the AHP Method for Preference Determination in Yacht Design

    Publication

    A sailing yacht is a human-centred product, the design of which revolves primarily around the wants and desires of the future owner. In most cases, these preferences are not measurable, such as a personal aesthetic feeling, or a need for comfort, speed, safety etc. The aims of this paper are to demonstrate that these preferences can be classified and represented numerically, and to show that they are correlated with the type...

  • Analytical Expression for the Time-Domain Discrete Green's Function of a Plane Wave Propagating in the 2-D FDTD Grid

    In this letter, a new closed-form expression for the time-domain discrete Green's function (DGF) of a plane wave propagating in the 2-D finite-difference time-domain (FDTD) grid is derived. For the sake of its verification, the time-domain implementation of the analytic field propagator (AFP) technique was developed for the plane wave injection in 2-D total-field/scattered-field (TFSF) FDTD simulations. Such an implementation of...

    Full text to download in external service

  • Use of the AHP Method for Preference Determination in Yacht Design

    A sailing yacht is a human-centred product, the design of which revolves primarily around the wants and desires of the future owner. In most cases, these preferences are not measurable, such as a personal aesthetic feeling, or a need for comfort, speed, safety etc. The aims of this paper are to demonstrate that these preferences can be classified and represented numerically, and to show that they are correlated with the type of...

    Full text available to download

  • Ocena ryzyka i wieloatrybutowe modele decyzyjne.

    Publication

    rzedstawiono zagadnienia związane z uwzględnieniem czynników wpływun do oceny bezpieczeństwa oraz jakościowej i ilościowej ocenie ryzyka systemów technicznych. Podkreśla się znaczenie oceny czynników środowiskowych, ludzkich i organizacyjnych w procesie analizy ryzyka i podejmowania decyzji. Proponowana metodsa stosowanie HID (hierarchical influence diagrams), wspomagaj ąca analizę i szeregowanioe opcji sterowania ryzykiem (OSR),...

  • Superadditivity of two quantum information resources

    Publication

    - Science Advances - Year 2017

    Entanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...

    Full text available to download

  • A Direct Modulation for Matrix Converters based on the Onecycle Atomic operation developed in Verilog HDL.

    This paper presents a fast direct Pulse Width Modulation (PWM) algorithm for the Conventional Matrix Converters (CMC) developed in Verilog Hardware Description language (HDL). All PWM duty cycle calculations are performed in one cycle by an atomic operation designed as a digital module using FPGA basic blocks. The algorithm can be extended to any number of output phase. The improved version of the discontinuous Direct Analytic...

    Full text available to download

  • Zastosowanie metody AHP do porównania kryteriów wyboru lokalizacji budowy farmy wiatrowej

    W artykule przedstawiono opis oraz porównanie kryteriów wyboru lokalizacji farmy wiatrowej. Kryteria te uwzględniają pomiary wietrzności na rozpatrywanym terenie, lokalizację turbin wiatrowych, lokalizację linii elektroenergetycznej służącej do przesyłu wyprodukowanej energii elektrycznej od farmy wiatrowej do stacji elektroenergetycznej (GPZ), infrastrukturę towarzyszącą, warunki techniczne przyłączenia do sieci elektroenergetycznej...

    Full text available to download

  • Relating Information Culture to Information Policies and Management Strategies

    Publication

    - Year 2021

    Business and information managers have struggled to meet several challenges in aligning information strategies and business cultures. The consequences of a misalignment or misfit of strategy and culture are well known in business literature, and better guidance on how to better align strategy and culture is needed. This means expanding the puzzle to align business and information cultures, align business and information strategies,...

    Full text to download in external service

  • Numerical-analytic methods for differential-algebraic systems

    Publication

    Metodę numeryczno-analityczną połączoną z metodą porównawczą zastosowano do układów równań różniczkowo-algebraicznych z linowymi warunkami brzegowymi otrzymując warunki dostateczne na istnienie rozwiązania. O prawych stronach zagadnienia zakładano warunek Lipschitza. Otrzymano oszacowania błędów. Problem z odchylonymi argumentami był również przedmiotem rozważań tej pracy.

  • Monotone and numerical analytic- methods for differential equations.

    Praca dotyczy problemu różniczkowo-całkowego (typu Fredholma) z ogólnym warunkiem początkowo-brzegowo-całkowym. W pierwszej części pracy, stosując metodę iteracji monotonicznych, sformułowano warunki dostateczne które gwarantują, że dyskutowany problem ma rozwiązanie ekstremalne w zbiorze generowanym przez dolne i górne rozwiązania. Rozważania teoretyczne poparto przykładem i dyskusją. W drugiej części pracy zastosowano metodę...

  • Determination of magnetisation conditions in a Double-Core Barkhausen Noise measurement set-up

    The magnetic Barkhausen effect is useful forassessing 1D and 2D stress states of ferromagnetic steelobjects. However, its extension to technically importantmaterials, such as duplex anisotropic steels, remains challenging. The determination of magnetisation inside the studied object and the electromagnet for various geometries, materials and magnetisation angles is a key issue.Three-dimensional, dynamic finite element analysis...

    Full text available to download

  • Simulation model for evaluation of packet sequence changed order of stream in DiffServ network

    Publication

    Current packet networks use a large variety of mechanisms which should support QoS (Quality of Service). One of those mechanisms is routing (calculating connection paths for incoming service requests). The most effective mechanism in QoS context is dynamic routing, which is based on the current network state described by the offered traffic matrix and link states. After switching between calculated available paths, connection...

    Full text to download in external service

  • Resonances and Dissociative Electron Attachment in HNCO

    Publication
    • M. Zawadzki
    • M. Čížek
    • K. Houfek
    • R. Čurík
    • M. Ferus
    • S. Civiš
    • J. Kočišek
    • J. Fedor

    - PHYSICAL REVIEW LETTERS - Year 2018

    In a combined experimental and theoretical study, we probe the dissociative electron attachment in isocyanic acid HNCO. The experimental absolute cross section for the NCO− fragment shows a sharp onset and fine structures near the threshold. The autoionizing state responsible for the dissociative attachment is found in both the R-matrix calculation and using analytic continuation in the coupling constant. The involved A' resonance...

    Full text to download in external service

  • SDN testbed for validation of cross-layer data-centric security policies

    Publication

    - Year 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Full text to download in external service

  • The Selection of Anchoring System for Floating Houses by Means of AHP Method

    This paper indicates and analyses the use of anchoring systems, such as mooring piles, booms, mooring cables, and deadweight anchors with additional elastic connectors, which are the most frequently applied by the producers of floating houses. The selection of the most advantageous anchoring system is complicated and requires the application of quantitative and qualitative data and methods. This publication presents the results...

    Full text available to download

  • Simulation of Wave Propagation in Media Described by Fractional-Order Models

    Publication

    - Year 2020

    In this paper, algorithms for simulation of the wave propagation in electromagnetic media described by fractional-order (FO) models (FOMs) are presented. Initially, fractional calculus and FO Maxwell's equations are introduced. The problem of the wave propagation is formulated for media described by FOMs. Then, algorithms for simulation of the non-monochromatic wave propagation are presented which employ computations in the time...

    Full text available to download

  • On the Structure of Time in Computational Semantics of a Variable-Step Solver for Hybrid Behavior Analysis

    Publication
    • J. Zander
    • P. J. Mosterman
    • G. Hamon
    • B. Denckla

    - Year 2011

    Hybrid dynamic systems combine continuous and discrete behavior. Often, computational approaches are employed to derive behaviors that approximate the analytic solution. An important part of this is the approximation of differential equation behavior by numerical integration. The accuracy and computational efficiency of the integration usually depend on the complexity of the method and its implicated approximation errors, especially...

    Full text to download in external service

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text to download in external service

  • Direct modulation for conventional matrix converters using analytical signals and barycentric coordinates

    Publication

    - IEEE Access - Year 2020

    This paper proposes the generalized direct modulation for Conventional Matrix Converters (CMC) using the concept of analytical signals and barycentric coordinates. The paper proposes a novel approach to the Pulse Width Modulation (PWM) duty cycle computing, which allows faster prototyping of direct control algorithms. The explanation of the new idea using analytical considerations demonstrating the principles of direct voltage...

    Full text available to download

  • Information content of systems as a physical principle

    Publication

    - PHYSICAL REVIEW A - Year 2017

    To explain the conceptual gap between classical and quantum and other, hypothetical descriptions of the world, several principles have been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle ( ICP ) which represents a constrained uncertainty principle. The principle, by taking into account the encoding and decoding properties of a single physical...

    Full text available to download

  • Distributed representation of information on cyclic events

    A representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...

  • Zastosowanie metody AHP do porównania kryteriów wyboru lokalizacji budowy farmy wiatrowej

    Publication

    Artykuł przedstawia opis oraz porównanie kryteriów wyboru lokalizacji farmy wiatrowej. Kryteria te uwzględniają pomiary wietrzności na rozpatrywanym terenie, lokalizację turbin wiatrowych, lokalizację linii elektroenergetycznej służącej do przesyłu wyprodukowanej energii elektrycznej od farmy wiatrowej do stacji elektroenergetycznej (GPZ), infrastrukturę towarzyszącą, warunki techniczne przyłączenia do sieci elektroenergetycznej...

    Full text available to download

  • A framework for risk matrix design: A case of MASS navigation risk

    Publication

    - ACCIDENT ANALYSIS AND PREVENTION - Year 2024

    Risk matrix, a tool for visualizing risk assessment results, is essential to facilitate the risk communication and risk management in risk-based decision-making processes related to new and unexplored socio-technical systems. The use of an appropriate risk matrix is discussed in the literature, but it is overlooked for emerging technologies such as Maritime Autonomous Surface Ships (MASS). In this study, a comprehensive framework...

    Full text to download in external service

  • An analytic approach to the conductance and I-V characteristics of polymeric chains

    Publication
    • T. Kostyrko

    - JOURNAL OF PHYSICS-CONDENSED MATTER - Year 2002

    Full text to download in external service

  • Data Model Development for Security Information Sharing in Smart Grids

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text available to download

  • Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model

    Publication

    - Year 2013

    Tries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...

  • Sphere Drive and Control System for Haptic Interaction With Physical, Virtual, and Augmented Reality

    A system for haptic interaction with physical, virtual, and augmented realities, founded on drive and measurement elements (DMEs), is considered. The system consists of eight DME rolls equipped with linear actuators, able to measure their angular velocity, drive the sphere, and adjust downforce (pressing the roll against the sphere). Two modeling issues are addressed. Special effort is put in to compensate for various technical...

    Full text available to download

  • Multi-criteria Robot Selection Problem for an Automated Single-Sided Lapping System

    Publication

    Flat lapping is a crucial process in a number of precision manufacturing technologies. Its aim is to achieve extremely high flatness of the workpiece. Single-sided lapping machines have usually standard kinematic systems and are used in conjunction with conditioning rings, which are set properly be-tween the center and the periphery of the lapping plate. In this paper, instead of conventional single-side lapping machine, an automated...

    Full text to download in external service

  • Towards Resource Theory of Coherence in Distributed Scenarios

    Publication

    - Physical Review X - Year 2017

    The search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....

    Full text available to download

  • Disciplines and measures of information resilience

    Publication
    • J. Rak
    • M. Jonsson
    • D. Hutchison
    • J. Sterbenz

    - Year 2017

    Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...

    Full text to download in external service

  • Novel Analytic-Numerical Model of Free Convection: with Leading Edge Considered

    Publication

    A novel solution of the free convection boundary problem is represented in analytical form for velocity and temperature for an isothermal vertical plate, as an example. These fields are built as a Taylor Series in the x coordinate with coefficients as functions of the vertical coordinate (y). We restrict ourselves by cubic approximation for both functions. The basic Navier-Stokes and Fourier-Kirchhoff equations and boundary conditions...

    Full text available to download

  • The Use of Information and Communication Technologies in Cluster Organizations

    Publication

    - Year 2019

    The purpose of the paper is to explore how cluster organizations (COs) take advantage of Information and Communication Technologies (ICT). The paper addresses the research question: “How do cluster organizations take advantage of ICT in fulfilling their main roles?”. The research was carried out in the first half of 2016 in four purposefully selected cluster organizations. The main research strategy involved Grounded Theory; the...

    Full text to download in external service

  • Simulation model for evaluation of QOS dynamic routing

    Publication

    - Year 2009

    Current informational networks use a large variety of technologies to support data exchange. Most of them are focused on IP protocol and include mechanisms which by definition should supply demanded QoS. One of those mechanisms is efficient path calculation - routing. Traffic offered to the network can change very rapidly in short term. Routing should support such traffic changes and all the time calculate valid paths in terms...

  • Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis

    Publication

    The paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....

    Full text available to download

  • Redundant information encoding in QED during decoherence

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Broadly understood decoherence processes in quantum electrodynamics, induced by neglecting either the radiation [L. Landau, Z. Phys. 45, 430 (1927)] or the charged matter [N. Bohr and L. Rosenfeld, K. Danske Vidensk. Selsk, Math.-Fys. Medd. XII, 8 (1933)], have been studied from the dawn of the theory. However, what happens in between, when a part of the radiation may be observed, as is the case in many real-life situations, has...

    Full text available to download

  • Survey on fuzzy logic methods in control systems of electromechanical plants

    Publication
    • R. Strzelecki
    • G. Demidova
    • D. Lukichev
    • N. Polyakov
    • A. Abdullin
    • S. Lovlin

    - Science, Technology and Arts Research Journal - Year 2019

    Рассмотрены алгоритмы управления электромеханическими системами с использованием теории нечеткой логики, приводятся основные положения их синтеза, рассматриваются методы анализа их устойчивости на основе нечетких функций Ляпунова. Эти алгоритмы чаще всего реализуются в виде различных регуляторов, применение которых целесообразно в системах, математическая модель которых не известна, не детерминирована или является строго нелинейной,...

    Full text available to download

  • On Applications of Fractional Derivatives in Circuit Theory

    Publication

    - Year 2020

    In this paper, concepts of fractional-order (FO) derivatives are discussed from the point of view of applications in the circuit theory. The properties of FO derivatives required for the circuit-level modelling are formulated. Potential problems related to the generalization of transmission line equations with the use of FO derivatives are presented. It is demonstrated that some of formulations of the FO derivatives have limited...

    Full text to download in external service

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • The Technological Advancement of New Products, Product Newness and Market Information

    Publication

    The purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...

    Full text available to download

  • Information and Communication Technologies for Economic Development

    Publication

    - Year 2017

    This chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...

    Full text to download in external service

  • On Applications of Fractional Derivatives in Electromagnetic Theory

    Publication

    - Year 2020

    In this paper, concepts of fractional-order (FO) derivatives are analysed from the point of view of applications in the electromagnetic theory. The mathematical problems related to the FO generalization of Maxwell's equations are investigated. The most popular formulations of the fractional derivatives, i.e., Riemann-Liouville, Caputo, Grünwald-Letnikov and Marchaud definitions, are considered. Properties of these derivatives are...

    Full text available to download

  • Semi-definite programming and quantum information

    This paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...

    Full text available to download

  • Semantic technologies based method of collection, processing and sharing information along food chain

    Publication

    - Information Systems in Management - Year 2016

    In the paper the method of collecting, processing and sharing information along food chain is presented. Innovative features of that method result from advantages of data engineering based on semantic technologies. The source to build ontology are standards and regulations related to food production, and data collected in databases owned by food chain participants. It allows food chain information resources can be represented in...

    Full text to download in external service

  • Module structure in Conley theory with some applications

    Publication

    A multiplicative structure in the cohomological versjon of Conley index is described . In the case of equivariant flows we apply the normalization procedure known from equivariant degree theory and we propose a new continuation invariant. The theory is then applied to obtain a mountain pass type theorem. Another application is a result on multiple bifurcations for some elliptic PDE.

    Full text available to download

  • Networkig activities of general judiciary - from theory to practice

    Publication

    - e-mentor - Year 2018

    Over the last three decades, networks - as a field of research - have acquired a significant place among management sciences. Unfortunately, in the judiciary they have become a subject of more careful analyses only recently, which resulted in a large discrepancy of knowledge - both in theory and in its practical adaptation for the needs of the courts. In order to fill this cognitive gap, an attempt was made to identify levels of...

    Full text available to download

  • The Diffusion of Information and Communication Technologies

    Publication

    - Year 2018

    This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the ‘critical mass’ and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis...

    Full text to download in external service

  • Structure of the Resource Theory of Quantum Coherence

    Publication
    • A. Streltsov
    • S. Rana
    • P. Boes
    • R. Eisert

    - PHYSICAL REVIEW LETTERS - Year 2017

    Quantum coherence is an essential feature of quantum mechanics which is responsible for the departure between the classical and quantum world. The recently established resource theory of quantum coherence studies possible quantum technological applications of quantum coherence, and limitations that arise if one is lacking the ability to establish superpositions. An important open problem in this context is a simple characterization...

    Full text to download in external service

  • Connection matrix theory for discrete dynamical systems

    In [C] and [F1] the connection matrix theory for Morse decomposition is developedin the case of continuous dynamical systems. Our purpose is to study the case of discrete timedynamical systems.

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Saint-Venant torsion based on strain gradient theory

    Publication

    In this study, the Saint-Venant torsion problem based on strain gradient theory is developed. A total form of Mindlin's strain gradient theory is used to acquire a general Saint-Venant torsion problem of micro-bars formulation. A new Finite Element formulation based on strain gradient elasticity theory is presented to solve the Saint-Venant torsion problem of micro-bars. Moreover, the problem is solved for both micro and macro...

    Full text to download in external service

  • Dynamic Semantic Visual Information Management

    Publication

    - Year 2010

    Dominant Internet search engines use keywords and therefore are not suited for exploration of new domains of knowledge, when the user does not know specific vocabulary. Browsing through articles in a large encyclopedia, each presenting a small fragment of knowledge, it is hard to map the whole domain, see relevant concepts and their relations. In Wikipedia for example some highly relevant articles are not linked with each other....

    Full text to download in external service