Filters
total: 8070
filtered: 5719
-
Catalog
- Publications 5719 available results
- Journals 112 available results
- Conferences 2 available results
- People 142 available results
- Projects 1 available results
- Research Equipment 1 available results
- e-Learning Courses 118 available results
- Events 5 available results
- Open Research Data 1970 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: tree protection
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Impulse Impedance Measurements of Lightning Protection Earthings
PublicationLightning protection earthing systems should be tested at currents with time parameters similar to those of lightnings. A method and definition of a measured value of impulse impedance are introduced. The impulse impedance was determined by a quotient of voltage drop on the tested earthing to a value of current in measure circuit. The usefulness of the impulse method for lightning protection evaluation is tested on radio base stations...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublicationThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Multimodal Surveillance Based Personal Protection System
PublicationA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Evaluation of Lightning Protection Earthings by Impulse Tests
PublicationW artykule zamieszczono opis nowej procedury pomiaru uziemień odgromowych metodą udarową. Zgodnie z propozycję podczas testu udarowego można pomierzyć nie tylko impedancję udarową uziemienia, ale także ocenić jego rezystancję oraz współczynnik udaru. Wynik takiego badania uwzględnia tylko tę część uziomu, którą określa się jako jego długość efektywną.
-
Threats to Rural Landscape and Its Protection in Poland
PublicationThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
METHODS OF TEACHING NOISE PROTECTION AT ENVIRONMENTAL ENGINEERING
PublicationNoise strongly influences both our health and behavior in everyday life and as employees or employers. The lost of hearing and other effects of noise on humans result not only in a significant decrease in the quality of life or work efficiency but have also have economic consequences. As noise can be preventable in part by the Environmental Engineers, but it is necessary to introduce them noise issues during their education process....
-
Region protection/restoration scheme in survivable networks
PublicationW artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...
-
Integrated protection/restoration in survivable multilayer architectures
PublicationArtykuł przedstawia nową koncepcję projektowania wielowarstwowych architektur sieci przeżywalnych, wykorzystującą informację międzywarstwową do zabezpieczania odtwarzania na wypadek pojedyńczej awarii węzła lub łącza w sposob zapobiegający propagacji awarii. Oryginalne zadanie optymalizacji całej zintegrowanej architektury przeżywalnej sformułowano jako zadanie programowania całkowitego. Jest ono NP-zupełne i zaproponowano algorytm...
-
Protection of bridges against stray current corrosion
PublicationA case study of Siennicki Bridge stray current corrosion hazard is presented. A corrosion risk was caused by incorrectly designed tram line traction which goes over the bridge. No dielectric insulation between running rails and bridge steel construction was used. A variety of protection methods against stray currents are described. Characteristics of the endangered bridge were described. Impressed current cathodic protection system...
-
Conducting composites as cable anodes in cathodic protection
PublicationOpisano zasadę działania oraz podstawowe parametry charakteryzujące układ anodowy z wykorzystaniem anod kablowych w systemie ochrony katodowej podziemnych konstrukcji. W tej metodzie ochrony jako materiał anodowy wykorzystywany jest kompozyt przewodzący, którego właściwości mechaniczne umożliwiają budowę anody w formie kabla biegnącego wzdłuż trasy konstrukcji podziemnej. Wykazano, że zawartość grafitu w elektrodzie kompozytowej...
-
Protection system against electromagnetic leak of information
PublicationW pracy omówiono problem zabezpieczenia przed ulotem elektromagnetycznym informacji. Scharakteryzowano obowiązujace w tym względzie wybrane dokumenty normatywne. Opisano stosowane sposoby zapobiegania ulotowi informacji oraz prezentowano metodykę badawczą. Przedstawiono wybrane wyniki pomiarowe.
-
Built Heritage, Sustainable Development, and Natural Hazards: Flood Protection and UNESCO World Heritage Site Protection Strategies in Krakow, Poland
Publication -
An upper bound on the 2-outer-independent domination number of a tree
PublicationA 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)D has a at least two neighbors in D, and the set V(G)D is independent. The 2-outer-independent domination number of a graph G, denoted by gamma_2^{oi}(G), is the minimum cardinality of a 2-outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_2^{oi}(T) <= (n+l)/2,...
-
An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree
PublicationA 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...
-
A lower bound on the total outer-independent domination number of a tree
PublicationA total outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_t^{oi}(T) >= (2n-2l+2)/3,...
-
An upper bound on the total outer-independent domination number of a tree
PublicationA total outer-independent dominating set of a graph G=(V(G),E(G)) is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every tree T of order n >= 4, with l leaves and s support vertices we have...
-
A lower bound on the double outer-independent domination number of a tree
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)D is independent. The double outer-independent domination number of a graph G, denoted by gamma_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We...
-
An upper bound for the double outer-independent domination number of a tree
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)\D is independent. The double outer-independent domination number of a graph G, denoted by γ_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We prove...
-
An algorithm for listing all minimal double dominating sets of a tree
PublicationWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Anti‐corrosion protection of chimneys and flue gas ducts
Publication -
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Gate Driver with Overcurrent Protection Circuit for GaN Transistors
PublicationThe improvement of the gate driver for GaN transistor is presented in this paper. The proposed topology contains the overcurrent protectionwith the two-stage turning off and independent control of turn on and off time of the GaN transistor. The operation of driver and its application in thehalf-bridge converter are described using both simulation and prototype measurements. The overcurrent protection was tested in Double Pulse...
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublicationThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
The role of a planned management in the protection and preservation of wooden architecture
PublicationArtykul dokumentuje role i zasady ochrony dziedzictwa architektury drewnianej przy uzyciu nowego instruumentu jakim jest plan zarzadzania obiektem zabytkowym. Przedstawione zostalo w powiazaniu z Planem Zarzadzania Koscioła Gotyckiego w Mariance koło Pasłeka, wykonanego we wspolpracy Politechniki Gdańskiej oraz SBH ICOMOS, PKN ICOMOS.
-
Modernist Industrial Architecture and Its Protection - the Port of Gdynia
PublicationOchrona międzywojennej architektury przemysłowej na tak specyficznym obszarze jak funkcjonujący port morski, jest zadaniem trudnym - niezbędne są kompromisy pomiędzy względami konserwatorskimi i użytkowymi. Artykuł prezentuje architekturę portu gdyńskiego oraz złożoną problematykę jej ochrony konserwatorskiej.
-
Reliable Anycast and Unicast Routing: Protection against Attacks
PublicationObecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...
-
Research on protection mechanisms of Resilient Packet Ring Network.
PublicationPaper describes iSteering - a new method to control traffic in case of RPR network failure. There's comparison of packet wrapping, steering and our proposed method iSteering, which can be used in case of transmitter/receiver or fiber failure. Numerical analysis for even and random traffic flow has been made in order to compare packet wrapping, steering and iSteering. The results of all the tests are included.
-
Research on protection mechanisms of Resilient Packet Ring Network.
Publication.
-
PROBLEMS WITH CORROSION PROTECTION STEEL STACKS IN FGD SYSTEMS
PublicationThis paper presents problems associated with corrosion of steel stacks and changes in philosophy of corrosion protection when implemented into flue gas desulphurization systems. In-situ tests were taken by means of electrochemical impedance spectroscopy at a stack which discharges flue gas before wet lime/limestone desulphurization. A very rapid soaking of spherical infill vinylester coating with electrolyte has been observed....
-
Fire Protection and Materials Flammability Control by Artificial Intelligence
PublicationFire safety has become a major challenge of materials developers because of the massive production of organic materials, often combustibles, and their use for different purposes. In this sense, fire safety is critically considered in the development of engineering materials [1, 2]. The multiplicity of parameters contributing to the development of formulation of flame-retardant materials from one side and the sustainability concerns...
-
Hybridized PWM Strategy for Three- and Multiphase Three-Level NPC Inverters
PublicationA simple hybridized pulsewidth modulation (PWM) algorithm for three- and multiphase three-level neutral point clamped (NPC) inverters is proposed. The proposed solution is based on classical space vector PWM (SVPWM) algorithms for two-level inverters but can also be based on sinusoidal PWM with min–max injection. An additional level of output voltage is obtained by modifying the resulting switching patterns taking into account...
-
The asymptotic formula for the error in orthogonal projection
PublicationW pracy podano formułę asymptotyczną błędu aproksymacji dla rzutów ortogonalnych w normie L^p.
-
Paired bondage in trees
PublicationW pracy zdefiniowano pojęcie liczby zniewolenia parami jako moc najmniejszego zbioru krawędzi, którego usunięcie z grafu spowoduje wzrost liczby dominowania parami. W szczególności scharakteryzowane są wszystkie drzewa, w których liczba zniewolenia wynosi 0, czyli takie, w których usunięcie dowolnego podzbioru krawędzi nie zwiększy liczby dominowania parami.
-
Preserving Trees in Automata
PublicationWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
On the partition dimension of trees
PublicationGiven an ordered partition Π={P1,P2,…,Pt} of the vertex set V of a connected graph G=(V,E), the partition representation of a vertex v∈V with respect to the partition Π is the vector r(v|Π)=(d(v,P1),d(v,P2),…,d(v,Pt)), where d(v,Pi) represents the distance between the vertex vv and the set Pi. A partition Π of V is a resolving partition of G if different vertices of G have different partition representations, i.e., for every...
-
Isocyanate-Free Polyurethanes
PublicationIsocyanate-free polyurethanes (also called non-isocyanate polyurethanes, or NIPUs) are alternatives to the conventional (commercially used) polyurethanes synthesized using di- or polyisocyanates, polyols, and chain extenders with low molecular weight. The major routes of NIPUs’ synthesis involve polyaddition of cyclic carbonates and di- or polyamines, polycondensation of carbamates, and diols. The most important intermediates are...
-
The delocalization of production to Poland
Publication -
Perfect hashing with pseudo-minimal bottom-up deterministic tree automata
PublicationWe describe a technique that maps unranked trees to their hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to techniques implemented with minimal tree automata, our procedure builds a pseudo-minimal DTA. Pseudo-minimal automata are larger than the minimal ones but in turn the mapping can be arbitrary, so it can be determined prior to the automaton construction. We also provide procedures to build incrementally...
-
Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform
PublicationBirth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...
-
A city is not a tree: a multi-city study on street network and urban life
PublicationChristopher Alexander, a British-American scholar, differentiated an old (natural) city from a new (planned) one by structure. The former resembles a “semilattice”, or a complex system encompassing many interconnected sub-systems. The latter is shaped in a graph-theoretical “tree”, which lacks the structural complexity as its sub-systems are compartmentalized into a single hierarchy. This structural distinction explains why, or...
-
Empirical analysis of tree-based classification models for customer churn prediction
PublicationCustomer churn is a vital and reoccurring problem facing most business industries, particularly the telecommunications industry. Considering the fierce competition among telecommunications firms and the high expenses of attracting and gaining new subscribers, keeping existing loyal subscribers becomes crucial. Early prediction of disgruntled subscribers can assist telecommunications firms in identifying the reasons for churn and...
-
A self-stabilizing algorithm for finding a spanning tree in a polynomial number of moves
PublicationW pracy rozważa się rozproszony model obliczeń, w którym struktura systemu jest reprezentowana przez graf bezpośrednich połączeń komunikacyjnych. W tym modelu podajemy nowy samostabilizujący algorytm znajdowania drzewa spinającego. Zgodnie z naszą wiedzą jest to pierwszy algorytm dla tego problemu z gwarantowaną wielomianową liczbą ruchów.
-
Efficacy of rice husk biochar and compost amendments on the translocation, bioavailability, and heavy metals speciation in contaminated soil: Role of free radical production in maize (Zea mays L.)
Publication -
Evaluation of the current output of polymer anodes used in cathodic protection
Publication -
Chromatographic Examinations of Tea's Protection Against Lipid Oxidative Modifications
Publication -
Evaluation and characterisation of the condition of individual components of cathodic protection systems
Publication -
Present state and future of wetland technology in environmental protection in Poland
Publication: Polish experience with implementation and operation of constructed wetland systems are presented. Wetland technology can be applied for the removal of contaminants from aerial sources, point sources and for utilization of sewage sludge.From 1994-2002 monitoring of three different facilities for water protection was carried out. Substantial im-provement of water quality after implementation of the facilities was observed.From...