Filters
total: 1655
-
Catalog
displaying 1000 best results Help
Search results for: communication
-
The first manganese trialkoxysilanethiolates: formation, properties and structure of solvent ligated complexes - [Mn{SSi(OBut)3}2(MeCN)] and [Mn{SSi(OBut)3}2(MeOH)4]
PublicationW pracy przedstawiono otrzymywanie i strukturę pierwszych trialkoksysilanotiolanowych kompleksów manganu(II). Syntezy prowadzone były reakcji 2≡SiSH+ MnCl2 + 2Et3N = (≡SiS)2Mn + 2Et3N.HCl doprowadziły do otrzymania nowych kompleksów: [Mn{SSi(OBut)3}2(MeOH)4] (gdy jako rozpuszczalnik zastosowano MeOH) oraz [Mn{SSi(OBut)3}2(NCCH3)], gdy w badaniach posłużono się acetonitrylem.
-
Effect of a characteristic length on crack spacing in a reinforced concrete bar under tension.
PublicationW artykule przedstawiono wyniki numerycznej obliczenia rozstawu rys w pręcie żelbetowym poddanemu rozciąganiu. Obliczenia wykonano przy zastosowaniu sprężysto-plastycznego modelu rozszerzonego o długość charakterystyczna mikrostruktury przy pomocy teorii nielokalnej.
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Architecture Design of a Networked Music Performance Platform for a Chamber Choir
PublicationThis paper describes an architecture design process for Networked Music Performance (NMP) platform for medium-sized conducted music ensembles, based on remote rehearsals of Academic Choir of Gdańsk University of Technology. The issues of real-time remote communication, in-person music performance, and NMP are described. Three iterative steps defining and extending the architecture of the NMP platform with additional features to...
-
Toward 6G Optical Fronthaul: A Survey on Enabling Technologies and Research Perspectives
PublicationThe anticipated launch of the Sixth Generation (6G) of mobile technology by 2030 will mark a significant milestone in the evolution of wireless communication, ushering in a new era with advancements in technology and applications. 6G is expected to deliver ultra-high data rates and almost instantaneous communications, with three-dimensional coverage for everything, everywhere, and at any time. In the 6G Radio Access Networks (RANs)...
-
Substrate Integrated Waveguide-Based Frequency-Tunable Self-Octaplexing Antenna
PublicationThis communication presents the first-ever substrate integrated waveguide (SIW)-based frequency-tunable self-octaplexing antenna (SOA) for wireless communication. The structure is arranged by implementing eight distinct patches with planar 50-ohm feedlines at the top of the SIW cavity, which realize eight distinct resonant frequencies. Independent tuning of each resonant frequency is achieved by incorporating appropriately allocated...
-
On possible applications of media described by fractional-order models in electromagnetic cloaking
PublicationThe purpose of this paper is to open a scientific discussion on possible applications of media described by fractional-order (FO) models (FOMs) in electromagnetic cloaking. A 2-D cloak based on active sources and the surface equivalence theorem is simulated. It employs a medium described by FOM in communication with sources cancelling the scattered field. A perfect electromagnetic active cloak is thereby demonstrated with the use...
-
High Isolation Metamaterial-based Dual-band MIMO Antenna for 5G Millimeter-wave Applications
PublicationThis article presents a high-isolation metamaterial-based dual-band multiple-input multiple-output (MIMO) antenna for 5G millimeter-wave communication networks. The proposed antenna is a pentagon-shaped monopole that provides a dual-band response with a wide operating bandwidth at 5G 28/28 bands. The antenna is printed on 0.508-mm-thick Rogers RT5880 substrate of relative permittivity ɛr =2.2. It exhibits a small physical size...
-
Isolation Improvement in MIMO Antenna with a Simple Hybrid Technique of Orthogonal and Inverse Currents
PublicationThis paper presents a compact high-isolation multiple-input multiple-output (MIMO) antenna developed using a hybrid approach. The proposed technique combines induced orthogonal currents and self-inverse currents to enhance the antenna's performance. Orthogonal currents are generated by strategically etching open slots on the antenna patches, while self-inverse currents are introduced by integration of annular vias. By carefully...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Multi-Option Model of Railway Traffic Organization Including the Energy Recuperation
PublicationThe article presents the issue of organization of railway traffic within the station, taking into account energy recuperation. We identified a number of factors which affect the energy efficiency of recuperation, including the issue of transfer of energy technology between a few vehicles. We presented some aspects of the decision problem of graphic train timetable construction with regard to recuperation. As an indicator of quality...
-
Mining relations between wikipedia categories
PublicationOpisano metody indukcji powiązań pomiędzy kategoriami organizującymi zbiór dokumentów. Przedstawiono wyniki zastosowania proponowanego podejścia dla poprawy systemu kategorii Wikipedii.
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
Effects of metallic silver particles on resonance energy transfer in label-led bovine serum albumin
PublicationZbadano wpływ cząstek metalicznego srebra na rezonansowe przekazywanie energii od wewnętrznych residów tryptofanowych w proteinie do zewnętrznie dowiązanego akceptora. W tych warunkach zaobserwowano istotny wzrost odległości Fórstera z 28,6 A do 63 A, co wskazuje na możliwość użycia cząstek srebra przy mierzeniu dużych odległości między molekułami i ich o przydatność w zastosowaniach biotechnologicznych.
-
Electron ionization induced fragmentation of fluorinated derivatives of bisphenols
Publication -
Quantification of key red blood cell folates from subjects with defined MTHFR 677C>T genotypes using stable isotope dilution liquid chromatography/mass spectrometry
Publication -
Human Gb3/CD77 synthase reveals specificity toward two or four different acceptors depending on amino acid at position 211, creating Pk, P1 and NOR blood group antigens
Publication -
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
Genistein inhibits activities of methylenetetrahydrofolate reductase and lactate dehydrogenase, enzymes which use NADH as a substrate
Publication -
Graphene-encapsulated iron nanoparticles as a non-viral vector for gene delivery into melanoma cells
Publication -
Distance between the Basic Group of the Amino Acid Residue's Side Chain in Position P1of Trypsin Inhibitor CMTI-III and Asp189in the Substrate Pocket of Trypsin Has an Essential Influence on the Inhibitory Activity
Publication -
A simple method for selection of trypsin chromogenic substrates using combinatorial chemistry approach
Publication -
Design, Chemical Synthesis and Kinetic Studies of Trypsin Chromogenic Substrates Based on the Proteinase Binding Loop of Cucurbita maxima Trypsin Inhibitor (CMTI-III)
Publication -
Chromogenic Substrates of Bovine β-Trypsin: The Influence of an Amino Acid Residue in P1 Position on Their Interaction with the Enzyme
Publication -
Identification of X-DING-CD4, a new member of human DING protein family that is secreted by HIV-1 resistant CD4+ T cells and has anti-viral activity
Publication -
The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro
Publication -
Corrigendum to “The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro” [Biochem. Biophys. Res. Commun. 646 (26 February 2023) 44–49]
Publication -
Ionization of tocopherols and tocotrienols in atmospheric pressure chemical ionization
Publication -
Chinifur, a Selective Inhibitor and "Subversive Substrate" for Trypanosoma congolense Trypanothione Reductase
Publication -
Rapid PD-L1 detection in tumors with PET using a highly specific peptide
Publication -
Pivotal participation of nitrogen dioxide in l-arginine induced acute necrotizing pancreatitis: protective role of superoxide scavenger 4-OH-TEMPO
Publication -
Correction: Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Science diplomacy of Poland
Publication -
Regional observatory as a part of road safety information system
PublicationEU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublicationThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...