Filters
total: 1711
filtered: 1104
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: AIRBAND COMMUNICATION
-
Identification of X-DING-CD4, a new member of human DING protein family that is secreted by HIV-1 resistant CD4+ T cells and has anti-viral activity
Publication -
Graphene-encapsulated iron nanoparticles as a non-viral vector for gene delivery into melanoma cells
Publication -
Pivotal participation of nitrogen dioxide in l-arginine induced acute necrotizing pancreatitis: protective role of superoxide scavenger 4-OH-TEMPO
Publication -
Ionization of tocopherols and tocotrienols in atmospheric pressure chemical ionization
Publication -
The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro
Publication -
Corrigendum to “The role of phoenixin in the proliferation and migration of ectopic epithelial cells in vitro” [Biochem. Biophys. Res. Commun. 646 (26 February 2023) 44–49]
Publication -
Correction: Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Slaughtered like animals. Revealing the atrocities committed by the Nazis on captives at Treblinka I by skeletal trauma analysis
Publication -
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublicationCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Contextualizing a Knowledge Base by Approximation – A Case Study
PublicationModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Reasoning with Projection in Multimodular Description Logics Knowledge Bases
PublicationWe present an approach to reasoning with projection, i.e. reasoning in which it is possible to focus on a selected part of knowledge (by neglecting some non-interesting fragments). Projection is most useful for modular knowledge bases in which only parts of knowledge have to be exchanged or imported to other modules. In this paper we present an optimized method of reasoning over results of projection. The tests indicate that the...
-
Effects of metallic silver particles on resonance energy transfer in label-led bovine serum albumin
PublicationZbadano wpływ cząstek metalicznego srebra na rezonansowe przekazywanie energii od wewnętrznych residów tryptofanowych w proteinie do zewnętrznie dowiązanego akceptora. W tych warunkach zaobserwowano istotny wzrost odległości Fórstera z 28,6 A do 63 A, co wskazuje na możliwość użycia cząstek srebra przy mierzeniu dużych odległości między molekułami i ich o przydatność w zastosowaniach biotechnologicznych.
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
Multiple sound sources localization in real time using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Multi-Option Model of Railway Traffic Organization Including the Energy Recuperation
PublicationThe article presents the issue of organization of railway traffic within the station, taking into account energy recuperation. We identified a number of factors which affect the energy efficiency of recuperation, including the issue of transfer of energy technology between a few vehicles. We presented some aspects of the decision problem of graphic train timetable construction with regard to recuperation. As an indicator of quality...
-
Mining relations between wikipedia categories
PublicationOpisano metody indukcji powiązań pomiędzy kategoriami organizującymi zbiór dokumentów. Przedstawiono wyniki zastosowania proponowanego podejścia dla poprawy systemu kategorii Wikipedii.
-
Regional observatory as a part of road safety information system
PublicationEU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublicationThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
Traffic Noise Analysis Applied to Automatic Vehicle Counting and Classification
PublicationProblems related to determining traffic noise characteristics are discussed in the context of automatic dynamic noise analysis based on noise level measurements and traffic prediction models. The obtained analytical results provide the second goal of the study, namely automatic vehicle counting and classification. Several traffic prediction models are presented and compared to the results of in-situ noise level measurements. Synchronized...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Seafloor Characterisation Using Underwater Acoustic Devices
PublicationThe problem of seafloor characterisation is important in the context of management as well as investigation and protection of the marine environment. In the first part of the paper, a review of underwater acoustic technology and methodology used in seafloor characterisation is presented. It consists of the techniques based on the use of singlebeam echosounders and seismic sources, along with those developed for the use of sidescan...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
A Framework for Enhancing Supplier Selection Process by Using SOEKS and Decisional DNA
PublicationAbstract. Supplier selection process is one of the significant stages in supply chain management for industrial manufactured products. It plays an integral role in the success of any manufacturing organization and is an important part starting right from selecting raw material to dispatch of finished products. This paper contributes to enhance the supplier selection process by proposing a multi-criteria decision making framework...
-
How ethics combine with big data: a bibliometric analysis
PublicationThe term Big Data is becoming increasingly widespread throughout the world, and its use is no longer limited to the IT industry, quantitative scientific research, and entrepreneurship, but entered as well everyday media and conversations. The prevalence of Big Data is simply a result of its usefulness in searching, downloading, collecting and processing massive datasets. It is therefore not surprising that the number of scientific...
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
Design and Evaluation of the Platform for Weight-Shifting Exercises with Compensatory Forces Monitoring
PublicationDetails of a platform for the rehabilitation of people with severe balance impairment are discussed in the paper. Based upon a commercially available static parapodium, modified to fit force sensors, this device is designed to give a new, safe tool to physiotherapists. It is designed for the patients who cannot maintain equilibrium during a bipedal stance and need to hold to or lean on something during the rehabilitation. Visual,...
-
Automated Classifier Development Process for Recognizing Book Pages from Video Frames
PublicationOne of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...
-
Architecture Design of a Networked Music Performance Platform for a Chamber Choir
PublicationThis paper describes an architecture design process for Networked Music Performance (NMP) platform for medium-sized conducted music ensembles, based on remote rehearsals of Academic Choir of Gdańsk University of Technology. The issues of real-time remote communication, in-person music performance, and NMP are described. Three iterative steps defining and extending the architecture of the NMP platform with additional features to...
-
Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi podejście dynamiczne
PublicationAbstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...
-
Depolarisation Model for a BAN Indoor Scenario
PublicationIn this paper, an analysis of depolarisation in Body Area Networks for Body-to-Infrastructure communications based on a measurement campaign in the 5.8 GHz band in an indoor environment is performed. Measurements were made with an offbody antenna transmitting linearly polarised signals and dualpolarised receiving antennas carried by the user on the body. A Normal Distribution with a mean of 2.0 dB and a standard deviation of 4.3...
-
Designing Intelligent Factory: Conceptual Framework and Empirical Validation
PublicationThis paper presents a framework for monitoring, analysing and decision making for a smart manufacturing environment. We maintain that this approach could play a vital role in developing an architecture and implementation of Industry 4.0. The proposed model has features like experience based knowledge representation and semantic analysis of engineering objects and manufacturing process. It is also capable of continuous real time...
-
Radio programowalne - nowoczesna platforma dydaktyczna
PublicationPrzedstawiono technologię radia programowalnego jako nowoczesną platformę dydaktyczną. Zaproponowane podejście pozwala na efektywniejsze planowanie stanowisk laboratoryjnych. Umożliwia skrócenie czasu realizacji etapów związanych z projektowaniem, symulacją i testowaniem działania łącza radiowego. Pozwala również na elastyczną zmianę stanowisk laboratoryjnych zgodnie z dynamicznym rozwojem współczesnych systemów radiokomunikacyjnych.
-
A multithreaded CUDA and OpenMP based power‐aware programming framework for multi‐node GPU systems
PublicationIn the paper, we have proposed a framework that allows programming a parallel application for a multi-node system, with one or more GPUs per node, using an OpenMP+extended CUDA API. OpenMP is used for launching threads responsible for management of particular GPUs and extended CUDA calls allow to manage CUDA objects, data and launch kernels. The framework hides inter-node MPI communication from the programmer who can benefit from...
-
To meet or to connect? Face-to-face contacts vs ICT in cluster organisations
PublicationThe main purpose of the paper is to explore how cluster organisations (COs) take advantage of direct (F2F) and indirect (ICT) contacts in fulfilling their main roles. The paper addresses the research question: “How important are Information and Communication Technologies at each level of advancement of cluster cooperation?” The research was conducted in 2016 in four purposefully selected cluster organisations representing metal...