Filters
total: 3462
filtered: 286
Search results for: NADES
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferry Environment
PublicationIn the article an off-body narrowband and ultra-wide band channel model for Body Area Networks in a ferry environment is described. A mobile, heterogeneous measurement stand, that consists of three types of devices: miniaturized mobile nodes, stationary reference nodes and a data acquisition server was developed. A detailed analysis of both radio channels parameters in untypical indoor environment was carried out. An analysis of...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublicationIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
Layered Morphology of Gdansk: Past, Present and Future.
PublicationThis study aims to analyze the urban fabric and form of the city of Gdańsk based on the Muratorian and Italian school of urban morphology, to deepen the understanding of the morphological process of the urban fabric. It can be seen that the urban fabric of the city is a juxtaposition of all these layers, and based on Muratori’s approach these are indicative of not just the past, present but also the future. The study sample is...
-
Transmission protocol simulation framework for the resource-constrained sensor network
PublicationIn this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...
-
Wstępny plan badań węzła z mimośrodem dodatnim w kratownicy z kształtowników o przekrojach poprzecznych otwartych. -(Autorka otrzymała wyróżnienie za tą publikację)
PublicationW celu określenia wpływu mimośrodowego przecinania się prętów w kratownicy z kształtowników giętych na zimno, o przekrojach poprzecznych otwartych na nośność i stateczność węzłów dźwigarów kratowych, opracowano model badawczy oraz przeprowadzono wstępną analizę numeryczną przedmiotowego węzła, w programie Marc Mentat. Uzyskane wyniki wskazują na potrzebę uzupełnienia obciążenia o parę sił poziomych w modelu badawczym.
-
Wirelessly Interfacing Objects and Subjects of Healthcare System – IoT Approach
PublicationWireless sensor networks, WSN, for which development has begun by military applications, are nowadays applied to all human activities; e.g. in medicine for patience monitoring or to reduce the effects of disasters. Therefore, the WSNs area has been also one of the emerging and fast growing scientific fields. Increasing interest of WSNs is even caused by equally intense growth of interest in the Internet of Things domain, IoT, in...
-
Resilient Routing in Communication Networks
PublicationThis important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...
-
A method for evaluating durability of porous slide bearings
PublicationThe article presents the structures of porous bearings bushes and greasy lubricants, and the similarity criterion resulting from this structures. A phisical model is proposed which describes the operation of the porous slide bearing bush taking into account, via analogy, the phenomena taking place in the grease lubricant nodes instead of those observed in the bush structures.Included are the result of experimental tests of three...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Effect of cobalt addition on the corrosion behaviorof near equiatomic NiTi shape memory alloy in normal saline solution: electrochemical and XPS studies
PublicationThe electrochemical and corrosion (uniform and localized) behavior of a binary Ni52Ti48 shape memory alloy (SMA) and two ternary Ni52Ti48-xCox (x = 1.5 and 4.0 wt.%) SMAs were studied. Measurements were conducted in 0.9% NaCl solution at 37 oC employing various electrochemical methods. These include: linear polarization resistance (LPR), linear sweep voltammetry (LSV), chronoamperometry and dynamic electrochemical impedance spectroscopy...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Toward Fast Calculation of Communication Paths for Resilient Routing
PublicationUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Application of mesh deformation for modeling of conformal RF components with 3D FEM
PublicationIn this paper, a method of analysis of conformal RF components has been proposed. In this approach, modeling of a curved structure is based on mesh deformation of planar objects rather than the construction of conformal geometry at CSG level. Since the model is represented as a 3D mesh, the deformation only requires the calculation of nodes position in the bent structure. The results of the proposed algorithm have been validated...
-
Biomechanics of the front abdominal wall as a potential factorleading to recurrence with laparoscopic ventral hernia repair
PublicationThis study investigated the front abdominal wallto describe its elasticity in vivo and searched for elongationsthat possibly stretched an implanted mesh, therebycausing fixation failure and subsequent recurrence.To measure front abdominal wall elongations, amodel of fascia movements was created. Eight healthyvolunteers were measured during exercise to determine theextent of elongations in their front abdominal wall. Videoswere...
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublicationThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
Multichannel Human Body Communication
PublicationHuman Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...
-
Topology Discovery of Hierarchical Ethernet LANs without SNMP support
PublicationThis paper presents an algorithm that allows for discovery of layer-2 hierarchical Ethernet network topology using agents running on selected end nodes. No SNMP, MIB, hardware, firmware, or operating system-level software modification is required. The method is based on transmission of customized Ethernet frames among installed software agents. It can be used to discover the topology of LAN or one VLAN segment as long as no MAC...
-
Computer-aided analysis of resonance risk in power system with Static Var Compensators
PublicationStatic Var Compensators operation in a power system may significantly improve voltage profiles in nodes and the reactive power balance, as well as ensure greater system stability in emergency conditions. However these devices may be a cause of a resonance in the system. The aim of this paper is to call attention to the need to include resonance phenomena in a compensator’s location evaluation process. The analysis performed in...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
Methylene Blue Near-Infrared Fluorescence Imaging in Breast Cancer Sentinel Node Biopsy
PublicationIntroduction: Fluorescence-based navigation for breast cancer sentinel node biopsy is a novel method that uses indocyanine green as a fluorophore. However, methylene blue (MB) also has some fluorescent properties. This study is the first in a clinical series presenting the possible use of MB as a fluorescent dye for the identification of sentinel nodes in breast sentinel node biopsy. Material and methods: Forty-nine patients with...
-
A multithreaded CUDA and OpenMP based power‐aware programming framework for multi‐node GPU systems
PublicationIn the paper, we have proposed a framework that allows programming a parallel application for a multi-node system, with one or more GPUs per node, using an OpenMP+extended CUDA API. OpenMP is used for launching threads responsible for management of particular GPUs and extended CUDA calls allow to manage CUDA objects, data and launch kernels. The framework hides inter-node MPI communication from the programmer who can benefit from...
-
TDOA versus ATDOA for wide area multilateration system
PublicationThis paper outlines a new method of a location service (LCS) in the asynchronous wireless networks (AWNs) where the nodes (base stations) operate asynchronously in relation to one another. This method, called asynchronous time difference of arrival (ATDOA), enables the calculation of the position of the mobile object (MO) through the measurements taken by a set of non-synchronized fixed nodes and is based on the measurement of...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publicationartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Embedded Representations of Wikipedia Categories
PublicationIn this paper, we present an approach to building neural representations of the Wikipedia category graph. We test four different methods and examine the neural embeddings in terms of preservation of graphs edges, neighborhood coverage in representation space, and their influence on the results of a task predicting parent of two categories. The main contribution of this paper is application of neural representations for improving the...
-
The validation process of truss model with joint eccentricities
PublicationNowadays, due to the technological reasons in modern lightweight steel trusses, fabricated from cold-formed sections, positive eccentricities appear in the truss nodes, to induce additional forces truss chords. In order to account for the real load-carrying capacity of truss node area the steel structure research was conducted in scale 1:1. As a result of experimental research, the forms of deformation and strains of the walls...
-
Guanosine Dianions Hydrated by One to Four Water Molecules
PublicationIntermolecular interactions such as those present in molecule···water complexes may profoundly influence the physicochemical properties of molecules. Here, we carried out an experimental–computational study on doubly deprotonated guanosine monophosphate···water clusters, [dGMP – 2H]2–·nH2O (n = 1–4), using a combination of negative anion photoelectron spectroscopy (NIPES) with molecular dynamics (MD) and quantum chemical (QM) calculations....
-
Distributed Evacuation in Graphs with Multiple Exits
PublicationWe consider the problem of efficient evacuation using multiple exits. We formulate this problem as a discrete problem on graphs where mobile agents located in distinct nodes of a given graph must quickly reach one of multiple possible exit nodes, while avoiding congestion and bottlenecks. Each node of the graph has the capacity of holding at most one agent at each time step. Thus, the agents must choose their movements strategy...
-
Stationary underwater channel experiment: Acoustic measurements and characteristics in the Bornholm area for model validations
PublicationThe underwater acoustical channel is time-variant, and even on small time scales there is often existing no ‘acoustical frozen ocean’. Popular is the use of WSSUS-channel transmission modeling (Wide-Sense Stationary Uncorrelated Scattering) for the stochastic description of bandpass signals in GSM mobile phones with moving participants; since this results in a halved number of model parameters. For underwater sound applications...
-
Reconstruction of 3D image of corona discharge streamer
PublicationIn this paper, the method of reconstruction of the 3D structure of streamers in DC positive corona discharge in nozzle-to-plate electrode configuration is presented. For reconstructing of 3D image of corona discharge streamer we propose a stereographical method, where streamers are observed from several directions simultaneously. The multi-directional observation enabled to obtain fine positional coordinates of streamers for a...
-
Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring
PublicationOne of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...
-
Rendezvous of Distance-Aware Mobile Agents in Unknown Graphs
PublicationWe study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size...
-
Collision-Free Network Exploration
PublicationA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Long Distance Geographically Distributed InfiniBand Based Computing
PublicationCollaboration between multiple computing centres, referred as federated computing is becom- ing important pillar of High Performance Computing (HPC) and will be one of its key components in the future. To test technical possibilities of future collaboration using 100 Gb optic fiber link (Connection was 900 km in length with 9 ms RTT time) we prepared two scenarios of operation. In the first one, Interdisciplinary Centre for Mathematical...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Deterministic Rendezvous in Restricted Graphs
PublicationIn this paper we consider the problem of synchronous rendezvous in which two anonymous mobile entities (robots) A and B are expected to meet at the same time and point in a graph G = (V;E). Most of the work devoted to rendezvous in graphs assumes that robots have access to the same sets of nodes and edges, where the topology of connections may be initially known or unknown. In our work we assume the movement of robots is restricted...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublicationThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Możliwości satelitarnej oceny położenia geometrycznego tramwajowych węzłów rozjazdowych
PublicationW referacie skupiono się na kwestii oceny złożonych układów geometrycznych linii tramwajowych, w rejonach krańcówek, ze szczególnym uwzględnieniem węzłów rozjazdowych. Przedstawiono wyniki ciągłych pomiarów satelitarnych przeprowadzonych w eksploatowanym torze. Omówiono metodykę opracowywania wyników, uwzględniającą specyfikę projektowania rozjazdów tramwajowych. Stwierdzono poprawność geometrycznego ukształtowania badanych układów,...
-
Catalytic impact of alloyed Al on the corrosion behavior of Co50Ni23Ga26Al1.0 magnetic shape memory alloy and catalysis applications for efficient electrochemical H2 generation
PublicationThe electrochemical and corrosion behaviour of Co50Ni23Ga27-xAlx (x = 0 and 1.0 wt%) magnetic shape memory alloys (MSMAs) was studied in 0.5 M NaCl solutions using various electrochemical techniques. Results showed remarkable activation of the tested MSMA toward pitting corrosion upon alloying it with Al. XPS examination confirmed the activation influence of alloyed Al. It proved that the presence of Al in the alloy's matrix weakens...
-
Reliability Modeling for SPMD and DAC Applications in MERPSYS
PublicationIn this chapter we shall see a method for modeling of reliability of application execution in the MERPSYS system, and the results of reliability simulation of the same SPMD and DAC application which we have previously presented in this book. Unlike energy usage modeling and modeling of execution efficiency we could not compare the reliability model and simulation results to real experiment just because the experiment would last too...
-
Modelowanie kratownicy z kształtowników giętych na zimno z mimośrodami dodatnimi w węźle = Modelling of truss with cold-formed section and positive eccentricyty in the node.
PublicationThe topic of this research is establishing load-carrying capacity of compressed and tensed chords of trusses made of cold-formed open cross-sections. Occurrence of bending in the truss’ chord is the result of specific production technology assumed by the designer and producer of lattice girder’s systems. The aim of this research is to present methodology of conduct while creating numerical models that best depict the behaviour...
-
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublicationIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
Calculation of an ultimate load value of a silo with geometric imperfections in the shape of eigenforms
PublicationThe ultimate load value of a silo with initial geometric imperfections was measured. The structure was loaded with wind. Imperfections were assumed as translations of the shell nodes from perfect geometry taken from eigenforms and their combinations. Two variants of the maximum deflection placement with respect to the direction of wind pressure were proposed. The first consists in applying the maximum wind pressure to the element...
-
Complex Root Finding Algorithm Based on Delaunay Triangulation
PublicationA simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...
-
WSN for intelligent street lighting system
PublicationIn this article authors propose to apply WSN to intelligent street lighting system. As a result of such a combination one obtains a system designed to increase functionality of light installations for a wide range of applications and introduce a platform for new additional services, which meets current and future user needs. The system is composed of WSN nodes integrated with light sources based on high power LED diodes, which...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Microstructure and corrosion behaviour of carbon steel and ferritic and austenitic stainless steels in NaCl solutions and the effect of p-nitrophenyl phosphate disodium salt
PublicationThe microstructure and corrosion behavior of carbon steel (CSA516) and ferritic (SS410) and austenitic (SS304L) stainless steels were studied and compared. Corrosion tests were carried out in 0.5 M NaCl solutions. Rates of corrosion were monitored based on weight loss, Tafel extrapolation and linear polarization resistance (LPR) methods. Rates of corrosion were ranked following the order: CSA516 >> SS410 > SS304L. The impact of...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...