Filters
total: 2703
filtered: 2388
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: HANDOVER ALGORITHMS
-
Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6
PublicationMultimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublicationA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublicationA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Analysis of IPv6 Handovers in IEEE 802.16 environment
PublicationZaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...
-
Analysis of IPv6 handovers in IEEE 802.16 environment
PublicationThe second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...
-
Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers
PublicationHandover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublicationThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
A Test-Bed Analysis of Simultaneous PMIPv6 Handover in 802.11 WLANs Environment
PublicationProviding mobility in access networks is a challenge that we have to deal with. Due to networks’ convergence and migration to all-IP networks, mobility management at the network layer is required. However, there is a need for cooperation mechanisms between the network layer and lower layers to support multimedia services and make handover more efficient. This paper presents experimental research on simultaneous handover performance...
-
Effect of Soft Handover on the Capacity of WCMDA/FDD Interfece Using MRC RAKE Receiver in Uplink
PublicationIn the paper the mechanism of soft and hard hanover in UMTS is presented. Simulation tests for different services having various performance requirements and transmission rates have beeen made. Simulation results showing effect of soft handover in comparison with hard handover on the capacity of WCMDA/FDD radio interfaceare described, when the RAKE receiver with Maximal Ratio Combining has been implemented in RNC.
-
Efficient handover scheme for Mobile IPv4 over IEEE 802.11 networks with IEEE 802.21 triggers.
PublicationEfektywność przełączania jest bardzo istotnym parametrem, decydującym o pracy sieci bezprzewodowych, realizujacych usługi multimedialne na wysokim poziomie jakości. Użytkownicy takich sieci oczekują ciągłej obsługi podczas procesu przemieszczania się. Okazuje się, że istotnym źródlem opóźnień są nieefektywne procedury przełączania w warstwach drugiej i trzeciej, wynikający częściowo z postulatu o separacji funkcji realizowanych...
-
Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS
PublicationCelem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...
-
Long-term simulation of the activated sludge process at the Hanover-Gümmerwald pilot WWTP
PublicationCelem badań było uzyskanie zweryfikowanego modelu ASM3P, który mógłby być wykorzystany jako narzędzie decyzyjne do wyznaczania maksymalnych przepływów w oczyszczalniach ścieków. Symulacje przeprowadzono w oparciu o wyniki badań obciążeń hydraulicznych w pilotowej oczyszczalni ścieków Hanower-Gummerwald. Wyniki symulacji zostały porównane z wynikami pomiarów on-line w komorach osadu czynnego (N-NH4, N-NO3) oraz w odpływie z osadnika...
-
Continuous Optimisation Algorithms
PublicationKsiążka poświęcona jest zagadnieniom optymalizacji ciągłej. Oprócz klasycznych algorytmów gradientowych omawiane są w współczesne algorytmy bezgradientowe, które stosowane są z powodzeniem w optymalizacji globalnej. Większość prezentowanych algorytmów określona może być mianem metaheurystycznych. Zaliczyć do nich można metody optymalizacji inspirowane procesami zachodzącymi w przyrodzie, które dalej można dzielić na inspirowane...
-
Subspace Algorithms for Face Verification
PublicationW rzeczywistych zastosowaniach problem weryfikacji wydaje się ważniejszy od klasyfikacji. Na ogół dysponujemy jedynie niewielkim zbiorem obrazów uczących reprezentujących daną osobę, a naszym zadaniem jest podjęcie decyzji odnośnie tego, czy nowo pozyskana fotografia jest do nich wystarczająco podobna - bez użycia oddzielnego zbioru przykładów negatywnych. W takim przypadku uzasadnione wydaje się zastosowanie metody podprzestrzeni,...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Finite-window RLS algorithms
PublicationTwo recursive least-squares (RLS) adaptive filtering algorithms are most often used in practice, the exponential and sliding (rectangular) window RLS algorithms. This popularity is mainly due to existence of low-complexity versions of these algorithms. However, these two windows are not always the best choice for identification of fast time-varying systems, when the identification performance is most important. In this paper, we...
-
Comparative Analysis of microRNA-Target Gene Interaction Prediction Algorithms - The Attempt to Compare the Results of Three Algorithms
Publication -
New Algorithms for Adaptive Notch Smoothing
PublicationThe problem of extraction/elimination of a nonstationary complex sinusoidal signal buried in noise is considered. This problem is usually solved using adaptive notch filtering (ANF)algorithms. It is shown that accuracy of signal estimation can be increased if the results obtained from ANF are further processed using a cascade of appropriately designed filters. The resulting adaptive notch smoothing (ANS) algorithms can be employed...
-
Extinction Event Concepts for the Evolutionary Algorithms
PublicationThe main goal of this present paper is to propose a structure for a tool helping to determine how algorithm would react in a real live application, by checking it's adaptive capabilities in an extreme situation. Also a different idea of an additional genetic operator is being presented. As Genetic Algorithms are directly inspired by evolution, extinction events, which are elementary in our planet's development history, became...
-
Evolutionary Algorithms in MPLS network designing
PublicationMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Compression algorithms for multibeam sonar records
PublicationJednym z najczęściej używanych urządzeń służących do szeroko rozumianego telemonitoringu morskiego są sonary wielowiązkowe (ang. Multibeam systems MBS). Ich wysoka wydajność w tworzeniu informacji o obiektach znajdujących się pod wodą skutkuje w dużych ilościach danych pozyskiwanych podczas rejsów badawczych i pomiarowych. W tym kontekście, proces przechowywania i zarządzania takim magazynem danych staje się istotnym problemem...
-
Prototype selection algorithms for distributed learning
Publication -
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Marine and Cosmic Inspirations for AI Algorithms
PublicationArtificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...
-
Interoperability Constraints in Service Selection Algorithms
PublicationIn Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...
-
Iterative Algorithms for Multilayer Optimizing Control
PublicationMonografia przedstawia struktury, koncepcje i algorytmy dla wielowarstwowego sterowania optymalizującego procesami przemysłowymi będące w przeważającym stopniu wynikiem badań prowadzonych przez jej autorów. Metodologie i algorytmy sterowania są starannie ilustrowane wynikami symulacji dla wybranych przykładowych systemów. Oprócz tego przedstawione są zastosowania do realnych obiektów przemysłowych: kolumny destylacyjnej etyliny,...
-
Fast algorithms for identyfication of periodiccaly varying systems.
PublicationPraca dotyczy identyfikacji obiektów o parametrach zmieniających się w sposób okresowy. Zaproponowane algorytmy śledzenia parametrów cechują się niską złożonością obliczeniową, typową dla podejścia gradientowego a zarazem wysoką jakością śledzenia typową dla złożonych algorytmów opartych na metodzie funkcji bazowych.
-
STRUCTURE AND ALGORITHMS OF A DIAGNOSTIC DEVICE IN A WHEELED TRACTOR
PublicationDiagnostic device monitors the tractor’s technical condition and identifies the location of damaged components during operation. The diagnostic device detects and identifies the following types of defects: functional defects (uf) which affect performance, exhaust defects (ue) which increase toxic emissions and fuel consumption, defects that jeopardize driving safety (us), defects that affect engine performance (ud). The key component...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Comparison of satellite chlorophyll a algorithms for the Baltic Sea
Publication -
Transient detection algorithms for speech coding applications
Publication -
A Survey on the Datasets and Algorithms for Satellite Data Applications
PublicationRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...
-
Application of genetic algorithms in graph searching problem
PublicationGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Algorithms of chemicals detection using raman spectra
PublicationRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Intelligent algorithms for movie sound track restoration
PublicationW artykule przedstawiono dwa algorytmy do rekonstruowania optycznych ścieżek dźwiękowych. Pierwszy z nich jest zastosowaniem miary nieprzewidywalności do obliczeń parametrów modelu psychoakustycznego stosowanego do redukowania szumów. Drugi stanowi precyzyjną procedurę oceny pasożytniczej modulacji częstotliwości, opartej na analizie składowych harmonicznych. Wyniki zastosowania obu wymienionych algorytmów są zawarte w artykule.
-
Microphone placement through meta-heuristic algorithms
Publication -
Swarm Algorithms in Modern Engineering Optimization Problems
PublicationComplexity of today engineering problems is constantly increasing. Scientists no longer are facing issues, for which simple, mathematical programming methods are sufficient. Issues like autonomic vehicle navigation or classification are considered to be challenging, and although there exist valid means to solve them, in some cases there still is some place for improvement. With emergence of a new type of optimization techniques...
-
Parallelization of video stream algorithms in kaskada platform
PublicationThe purpose of this work is to present different techniques of video stream algorithms parallelization provided by the Kaskada platform - a novel system working in a supercomputer environment designated for multimedia streams processing. Considered parallelization methods include frame-level concurrency, multithreading and pipeline processing. Execution performance was measured on four time-consuming image recognition algorithms,...
-
On zero-error codes produced by greedy algorithms
PublicationWe present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.
-
SEMANTIC ANALYSIS ALGORITHMS FOR KNOWLEDGE WORKERS SUPPORT
PublicationThe paper examines various aspects of text analysis application for knowledge worker’s activity realization. Conclusions are drawn about the relevance and importance of processing the non-structured textual information in order to increase knowledge worker’s efficiency, as well as their awareness in different branches of science. The paper considers the existing algorithms of texts semantic analysis as the sphere of documents topical...
-
Multi-agent graph searching and exploration algorithms
PublicationA team of mobile entities, which we refer to as agents or searchers interchangeably, starting from homebases needs to complete a given task in a graph.The goal is to build a strategy, which allows agents to accomplish their task. We analyze strategies for their effectiveness (e.g., the number of used agents, the total number of performed moves by the agents or the completion time).Currently, the fields of on-line (i.e., agents...
-
An experimental study of distributed algorithms for graph coloring.
PublicationW pracy podano algorytm rozproszonego kolorowania grafówi porównano ze znanym wcześniej algorytmem.
-
Analysis of bandwidth reservation algorithms in HIPERLAN/2.
PublicationZaprezentowano metody alokacji zasobów (pasma) w systemie HIPERLAN/2. Przedyskutowano efektywność funkcjonowania typowych algorytmów pracy podwarstwy MAC oraz zaproponowano modyfikację jednego z algorytmów, polegającą na wstępnej rezerwacji pasma i okresowym uaktualnianiu przydziału zasobów. Dokonano weryfikacji symulacyjnej zaproponowanych rozwiązań.
-
Intelligent algorithms for optical track audio restoration
PublicationW referacie przedstawiono dwa algorytmy dedykowane redukcji pasożytniczych zniekształceń dźwięku spotykanych w optycznych ścieżkach dźwiękowych. Pierwszy algorytm umożliwia redukcję szerokopasmowego szumu w nagraniach fonicznych. Wykorzystano w nim psycho-akustyczny model słuchu oparty o miarę nieprzewidywalność sygnału (ang. Unpredictability Measure). Ocena jakości redukcji szumu została wykonana z wykorzystaniem metod inteligentnych....
-
Performance comparison of new modified gradient algorithm and Foy algorithm for iterative position calculation
PublicationIn the paper a new position calculation algorithm is presented. It is proposed for indoor environments and is called modified gradient algorithm. This algorithm is compared with well-known Foy algorithm. The comparative analysis is based on real distance measurements conducted in indoor environment.
-
Evolutional algorithm in stock control
Publication -
A New Heuristic Algorithm for Effective Preemption in MPLS Networks
PublicationW artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...