displaying 1000 best results Help
Search results for: call set-up delay
-
Toward Fast Calculation of Communication Paths for Resilient Routing
PublicationUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Overhead wires detection by FPGA real-time image processing
PublicationThe paper presents design and hardware implementation of real-time image filtering for overhead wires detection divided on image processing and results presentation blocks. The image processing block was separated from the whole implementation, and its delay and hardware complexity was analysed. Also the maximum frequency of image processing of the proposed implementation was estimated.
-
Nonstandard Equivalence Scales and their Applications for European Union Countries
PublicationThe aim of this study is twofold. First, we propose new methods of estimating equivalence scales. We call these methods nonstandard to distinguish them from the standard procedures based on the microeconomic theory of demand systems. Searching for the ‘as simple as possible’ method has been a leitmotiv of this study. Second, we estimate various forms of equivalence scales for 28 European Union (EU) member countries and four non-member...
-
Bio-inspired Urban Design: Smart Growth and Sustainable Development Frameworks for a New Urban Unit in Cracow
PublicationIn March 2012, architects João Diniz (Brazil) and Dorota Wiśniewska (Poland) answered a call to competition from the City of Cracow, submitting an entry for the redesign of 5600 ha of the Nowa Huta district in eastern Cracow, focusing on economic revitalization within a framework of smart growth and sustainable development. The scenario included an ArcerolMittal Steelworks and incorporated a strong ecological analysis for the easternmost...
-
Towards hardware built-in support for computer system safety
PublicationArtykuł omawia dostępne technologie wirtualizacji zasobów pamięci i systemów I/O w systemach komputerowych takie jak Execute Disable Bit (EDB) capability i Virtual Machine Architecture (VMA). Nastepnie wprowadza założenia na rozszerzenie tych technologii w celu uzyskania funkcjonalności Safe Call Execution dzieki technologii Execution Disabling Policies (EDP). Wprowadzono również założenia na funkcjonalność Memory Virtualization...
-
Computer-aided analysis of resonance risk in power system with Static Var Compensators
PublicationStatic Var Compensators operation in a power system may significantly improve voltage profiles in nodes and the reactive power balance, as well as ensure greater system stability in emergency conditions. However these devices may be a cause of a resonance in the system. The aim of this paper is to call attention to the need to include resonance phenomena in a compensator’s location evaluation process. The analysis performed in...
-
The (Un)Real City by Magdalena Abakanowicz: Guidelines for Cities in Times of Planetary Crisis
PublicationThree decades have passed since Magdalena Abakanowicz presented her concept of Bois de Nanterre — Arboreal Architecture, in response to a call for a broader reflection on approaches to urban landscaping and a reinterpretation of the meaning and evolution of the Grand Axis in Paris. This paper analyses the work presented by the artist from an urban planning perspective. It shows how the rich and multi-layered metaphor for the 21st-century...
-
Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing
PublicationIn this article authors present an application of spatial processing methods for GPS spoofing detection and mitigation. In the first part of this article, a spoofing detection method, based on phase delay measurements, is proposed. Accuracy and precision of phase delay estimation is assessed for various qualities of received signal. Spoofing detection thresholds are determined. Efficiency of this method is evaluated in terms of...
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublicationIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Self-optimizing narrowband interference canceller - can reference signal help?
PublicationSONIC (Self-Optimizing Narrowband Interference Canceller) is an acronym of the recently proposed active noise control algorithm with interesting adaptivity and robustness properties. SONIC is a purely feedback controller, capable of rejecting nonstationary sinusoidal disturbances (with time-varying amplitudes and/or frequencies) in the presence of plant (secondary path) uncertainties. We show that even though SONIC can work reliably...
-
Collective Uncertainty Entanglement Test
PublicationFor a given pure state of a composite quantum system we analyze the product of its projections onto aset of locally orthogonal separable pure states. We derive a bound for this product analogous to theentropic uncertainty relations. For bipartite systems the bound is saturated for maximally entangled statesand it allows us to construct a family of entanglement measures, we shall call collectibility. As thesequantities are experimentally...
-
How Machine Learning Contributes to Solve Acoustical Problems
PublicationMachine learning is the process of learning functional relationships between measured signals (called percepts in the artificial intelligence literature) and some output of interest. In some cases, we wish to learn very specific relationships from signals such as identifying the language of a speaker (e.g. Zissman, 1996) which has direct applications such as in call center routing or performing a music information retrieval task...
-
Rigorous numerics for critical orbits in the quadratic family
PublicationWe develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...
-
Hybrid SONIC: joint feedforward–feedback narrowband interference canceler
PublicationSONIC (self-optimizing narrowband interference canceler) is an acronym of a recently proposed active noise control algorithm with interesting adaptivity and robustness properties. SONIC is a purely feedback controller, capable of rejecting nonstationary sinusoidal disturbances (with time-varying amplitude and/or frequency) in the presence of plant (secondary path) uncertainty. We show that although SONIC can work reliably without...
-
Empirically adjusted and consistent set of EHT valence orbital parametersfor all elements of the periodic table. Modelling Simul. Mater. Sci. Eng. [online]. 2004 vol. 12 [dostęp..] s. 21-32, 3 rys. 3 tab. bibliogr. 35 poz. Dostępny w Internecie stacks.iop.org/MSMSE/12/21.ISSN 0965-0393 Jednorodny skorygowany empirycznie zbiór parametrów EHT dla orbitali walen- cyjnych pierwiastków.
PublicationModel atomu HFS został zmodyfikowany poprzez przypisanie każdemu z atomówindywidualnego parametru ŕ. Wartości ŕ dobrano w oparciu o pierwszy poten-cjał jonizacji atomu. Parametry EHT wyznaczono w oparciu o tak zmodyfikowa-ny model HFS.
-
Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services
Publicationn its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...
-
Sample Rate Conversion with Fluctuating Resampling Ratio
PublicationIn this paper a sample rate conversion with continuouslychanging resampling ratio has been presented. The proposed implementation is based on variable fractional delay filter implemented using a Farrow structure. It have been demonstrated that using the proposed approach instantaneous resampling ratio can be freely changed. This allows for simulation of audio recored on magnetic tape with nonuniform velocity as well as removal...
-
Geo-location of the commune of an IP user
PublicationThis paper describes a system of geo-location of an IP user that would enable VoIP users to call 112. Basic requirement is fast (under 50ms) determination of the commune of the subscriber. To obtain as accurate information as possible aggregation of several methods was proposed: using a database of locations of IP ranges created by specialized companies, traceroute using history of user locations to assume his current one.It is...
-
Peer assessment as a method for measuring harmful internet use
PublicationHarmful Internet use (HIU) describes unintended use of the Internet. It could be both self-harm and harming others. Our research goal is to develop a more accurate method for measuring HIU by this novel peer assessment. As such, it may become, with our call for more research, a paradigm shift supplementing every rating scale or other type of Internet use assessment. In addition to classic statistical analysis, structural equations...
-
Sample Rate Conversion with Fluctuating Resampling Ratio
PublicationIn this paper a sample rate conversion with continuously changing resampling ratio has been presented. The proposed implementation is based on variable fractional delay filter implemented using a Farrow structure. It have been demonstrated that using the proposed approach instantaneous resampling ratio can be freely changed. This allows for simulation of audio recored on magnetic tape with nonuniform velocity as well as removal...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publicationartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
No-Wait & No-Idle Open Shop Minimum Makespan Scheduling with Bioperational Jobs
PublicationIn the open shop scheduling with bioperational jobs each job consists of two unit operations with a delay between the end of the first operation and the beginning of the second one. No-wait requirement enforces that the delay between operations is equal to 0. No-idle means that there is no idle time on any machine. We model this problem by the interval incidentor (1, 1)-coloring (IIR(1, 1)-coloring) of a graph with the minimum...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Weak Solutions within the Gradient-Incomplete Strain-Gradient Elasticity
PublicationIn this paper we consider existence and uniqueness of the three-dimensional static boundary-value problems in the framework of so-called gradient-incomplete strain-gradient elasticity. We call the strain-gradient elasticity model gradient-incomplete such model where the considered strain energy density depends on displacements and only on some specific partial derivatives of displacements of first- and second-order. Such models...
-
A novel method of local chirp-rate estimation of LFM chirp signals in the time-frequency domain
PublicationIn the paper, novel dynamic representations of a complex signal in the time-frequency domain are introduced. The proposed approach is based on using the gradient of the short-time Fourier transform complex phase. A channelized instantaneous complex frequency (CICF) and a complex local group delay (CLGD) are included in the presented signal representations. An application of the newly-introduced distributions is demonstrated by...
-
Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network
PublicationIn this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The...
-
GPU Power Capping for Energy-Performance Trade-Offs in Training of Deep Convolutional Neural Networks for Image Recognition
PublicationIn the paper we present performance-energy trade-off investigation of training Deep Convolutional Neural Networks for image recognition. Several representative and widely adopted network models, such as Alexnet, VGG-19, Inception V3, Inception V4, Resnet50 and Resnet152 were tested using systems with Nvidia Quadro RTX 6000 as well as Nvidia V100 GPUs. Using GPU power capping we found other than default configurations minimizing...
-
Implementation of failover and load balancing algorithms in SIP PBX High Availability system
PublicationGoal of the project was to design a High Availability SIP VoIP system that guarantees access to additional services like auto-attendent and automatic call distribution. The realization of the project required system to have load balancing and failover algorithms implemented. From the end users’ point of view the whole system had to figure as a single element. After taking under consideration the known methods of implementations...
-
A simple way of increasing estimation accuracy of generalized adaptive notch filters
PublicationGeneralized adaptive notch filters are used for identification/tracking of quasi-periodically varying dynamic systems and can be considered an extension, to the system case, of classical adaptive notch filters. It is shown that frequency biases, which arisein generalized adaptive notch filtering algorithms, can be significantly reduced by incorporating in the adaptive loop an appropriately chosen decision delay. The resulting performance...
-
Aktualność "Sporu o istnienie świata" Romana Ingardena w świetle współczesnych mu stanowisk filozoficznych
PublicationParadoksalnie Ingarden nie jest w stanie wykazać, że świat realny istnieje w pewnym zasadniczym sensie „istnienia”, bo przyjmuje taki sam jak Husserl egologiczny, przeżyciowy model czystej świadomości i sam podążając za Husserlem przyjmuje istnienie dwóch dziedzin przedmiotów indywidualnych: dziedzinę czystej świadomości (rozumianej po husserlowsku jako strumień przeżyć) i dziedzinę świata realnego za punkt wyjścia swoich rozważań....
-
Soft skills among academics: Five theoretically informed lessons for current times
PublicationRESEARCH OBJECTIVE: The aim of this article is to provide a comprehensive examination of the role of soft skills among academics in the context of the evolving higher-education landscape. THE RESEARCH PROBLEM AND METHODS: We use a scoping review of existing literature to discuss the importance of soft skills in academia. Through critical analysis and synthesis, we identify patterns and gaps in current knowledge and develop five...
-
The ONETEP linear-scaling density functional theory program
PublicationWe present an overview of the ONETEP program for linear-scaling density functional theory (DFT) calculations with large basis set (planewave) accuracy on parallel computers. The DFT energy is computed from the density matrix, which is constructed from spatially localized orbitals we call Non-orthogonal Generalized Wannier Functions (NGWFs), expressed in terms of periodic sinc (psinc) functions. During the calculation, both the...
-
A Nonlinear Model of a Mesh Shell
PublicationFor a certain class of elastic lattice shells experiencing finite deformations, a continual model using the equations of the so-called six-parameter shell theory has been proposed. Within this model, the kinematics of the shell is described using six kinematically independent scalar degrees of freedom — the field of displacements and turns, as in the case of the Cosserat continuum, which gives reason to call the model under consideration...
-
Chirp-rate estimation of FM signals in the time-frequency domain
PublicationNovel dynamic representations of a complex signal in the time-frequency domain including: a channelized instantaneous complex frequency (CICF), a complex local group delay (CLGD) and a channelized instantaneous chirp-rate (CICR) are introduced. The proposed approach is based on the use of the gradient of the short-time Fourier transform complex phase. An interpretation of the newly-introduced distributions especially of the CICR...
-
Marek Kowalewski dr
People -
On the ratio between 2-domination and total outer-independent domination numbers of trees
PublicationA 2-dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)D has a at least two neighbors in D. A total outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The 2-domination (total outer-independent domination, respectively) number of a graph G is the minimum cardinality of a 2-dominating (total...
-
On proper (1,2)‐dominating sets in graphs
PublicationIn 2008, Hedetniemi et al. introduced the concept of (1,)-domination and obtained some interesting results for (1,2) -domination. Obviously every (1,1) -dominating set of a graph (known as 2-dominating set) is (1,2) -dominating; to distinguish these concepts, we define a proper (1,2) -dominating set of a graph as follows: a subset is a proper (1,2) -dominating set of a graph if is (1,2) -dominating and it is not a (1,1) -dominating...
-
Mathematical analysis of a generalised p53-Mdm2 protein gene expression model
PublicationWe propose the generalisation of the p53-Mdm2 protein gene expression model introduced by Monk (2003). We investigate the stability of a unique positive steady state and formulate conditions which guarantee the occurrence of the Hopf bifurcation. We show that oscillatory behaviour can be caused not only by time lag in protein transcription process, but also can be present in the model without time delay. Moreover, we investigate...
-
Using phase of short-term Fourier transform for evaluation of spectrogram performance
PublicationThe concept of spectrogram performance evaluation which exploits information on phase of short-term Fourier transform (STFT) is presented. A spectrograph which is time-frequency analyzing tool, is compared to a filter bank that demultiplexes a signal. Local group delay (LGD) and channelized instantaneous frequency (CIF) is obtained for each filtered component signal. In presented solution the performance is evaluated using so-called...
-
On trees with double domination number equal to 2-outer-independent domination number plus one
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G is the minimum cardinality of a double dominating set of G. For a graph G=(V,E), a subset D subseteq V(G) is a 2-dominating set if every vertex of V(G)D has at least two neighbors...
-
Unicyclic graphs with equal total and total outer-connected domination numbers
PublicationLet G = (V,E) be a graph without an isolated vertex. A set D ⊆ V (G) is a total dominating set if D is dominating and the in- duced subgraph G[D] does not contain an isolated vertex. The total domination number of G is the minimum cardinality of a total domi- nating set of G. A set D ⊆ V (G) is a total outer–connected dominating set if D is total dominating and the induced subgraph G[V (G)−D] is a connected graph. The total outer–connected...
-
Assessment of the Impact of GNSS Processing Strategies on the Long-Term Parameters of 20 Years IWV Time Series
PublicationAdvanced processing of collected global navigation satellite systems (GNSS) observations allows for the estimation of zenith tropospheric delay (ZTD), which in turn can be converted to the integrated water vapour (IWV). The proper estimation of GNSS IWV can be affected by the adopted GNSS processing strategy. To verify which of its elements cause deterioration and which improve the estimated GNSS IWV, we conducted eight reprocessings...
-
Sensorless Control of Induction Motor Based on Super-Twisting Sliding Mode Observer With Speed Convergence Improvement
PublicationThe super twisting sliding-mode observer (ST-SMO) has been proposed to achieve an effective method for alleviating low-order harmonics of measured quantities, issues related to DC drift, and suppression of chattering due to low-frequency sampling. The conventional ST-SMO, on the other hand, suffers from control delay in the convergence trajectory due to the system disturbance, resulting in decreased anti-disturbance capability...
-
Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network
PublicationIn recent times, visible light communication is an emerging technology that supports high speed data communication for wireless communication systems. However, the performance of the visible light communication system is impaired by inter symbol interference, the time dispersive nature of the channel, and nonlinear features of the light emitting diode that significantly reduces the bit error rate performance. To address these problems,...
-
Total Domination Versus Domination in Cubic Graphs
PublicationA dominating set in a graph G is a set S of vertices of G such that every vertex not in S has a neighbor in S. Further, if every vertex of G has a neighbor in S, then S is a total dominating set of G. The domination number,γ(G), and total domination number, γ_t(G), are the minimum cardinalities of a dominating set and total dominating set, respectively, in G. The upper domination number, \Gamma(G), and the upper total domination...
-
Global defensive sets in graphs
PublicationIn the paper we study a new problem of finding a minimum global defensive set in a graph which is a generalization of the global alliance problem. For a given graph G and a subset S of a vertex set of G, we define for every subset X of S the predicate SEC ( X ) = true if and only if | N [ X ] ∩ S | ≥ | N [ X ] \ S | holds, where N [ X ] is a closed neighbourhood of X in graph G. A set S is a defensive alliance if and only if for...
-
On trees with double domination number equal to total domination number plus one
PublicationA total dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D. A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The total (double, respectively) domination number of a graph G is the minimum cardinality of a total (double,...
-
Hybrid no-signaling-quantum correlations
PublicationFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
Analysis of radiometric signal in sedimentating suspension flow in open channel
PublicationThe article discusses issues related to the estimation of the sedimentating solid particles average flow velocity in an open channel using radiometric methods. Due to the composition of the compound, which formed water and diatomite, received data have a very weak signal to noise ratio. In the process analysis the known determining of the solid phase transportation time delay the classical cross-correlation function is the most...
-
Implementation of magnitude calculation of complex numbers using improved alpha max plus beta min algorithm
PublicationThe paper presents the hardware implementation of the improved alpha max plus beta min algorithm for calculating the magnitude of complex numbers. This version of the algorithm requires the general division which is performed using a noniterative multiplicative division algorithm. We analyze in detail the division algorithm, its error and the impact of finite word-length signal representations on the assumed total computation error....