Filters
total: 3462
filtered: 286
Search results for: NADES
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Global Complex Roots and Poles Finding Algorithm Based on Phase Analysis for Propagation and Radiation Problems
PublicationA flexible and effective algorithm for complex roots and poles finding is presented. A wide class of analytic functions can be analyzed, and any arbitrarily shaped search region can be considered. The method is very simple and intuitive. It is based on sampling a function at the nodes of a regular mesh, and on the analysis of the function phase. As a result, a set of candidate regions is created and then the roots/poles are verified...
-
System Loss in UWB Off-Body Communications in a Ferry Environment
PublicationIn this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Natural deep eutectic solvent based ultrasound assisted liquid-liquid micro-extraction method for methyl violet dye determination in contaminated river water
PublicationSimple and green natural deep eutectic solvent (NADES) based ultrasound assisted liquid-liquid micro-extraction (UA-LLME) method was developed for extraction and determination of methyl violet dye in contaminated river water samples using UV/Vis spectrophotometry. Choline chloride - decanoic acid based natural deep eutectic solvent was used for extraction. Important analytical parameters like pH, deep eutectic solvent volume/phase...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Settlement Networks in Polish Spatial Development Regional Plans
PublicationIn 1999, ten years after the great political changes in Poland, 16 self-governed regions (in Polish: voivodeship) were created. According to Polish law, voivodeship spatial development plans, or regional plans in short, determine basic elements of the settlement network. No detailed regulations indicate the specific elements of the settlement network or what features of these elements should be determined. For this reason, centres...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm
PublicationIn this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...
-
Optimization of Execution Time under Power Consumption Constraints in a Heterogeneous Parallel System with GPUs and CPUs
PublicationThe paper proposes an approach for parallelization of computations across a collection of clusters with heterogeneous nodes with both GPUs and CPUs. The proposed system partitions input data into chunks and assigns to par- ticular devices for processing using OpenCL kernels defined by the user. The sys- tem is able to minimize the execution time of the application while maintaining the power consumption of the utilized GPUs and...
-
Tribological model of porous bearings with particular attention given to the lubricant lubricity
PublicationThe friction and wear problems, accompanying all the tribological systems, lead to reduced service life. In order to prevent such situation, it is necessary to maintain fluid friction, which improves durability of all friction nodes in a tribological system. In the paper, the tribological system consists of porous bearings and the model deals with their weakest spots - the oil outflow points in the porous wall. A kinetic model...
-
ZARZADZANIE ORGANIZACJĄ TYPU SMART
PublicationZaprezentowano organizacji, w której charakterystykę wpisano następujące cechy: strategiczne uwarunkowanie, maksymalną innowacyjność, atrakcyjność dla interesariuszy, rozwijanie osobowości pracowników oraz twórczość w działaniu. Te atrybuty, tworzą koncepcję organizacji SMART (akronim od pierwszych liter powyższych cech), która wyróżnia się dodatkowo strukturą opartą o dynamicznie kreowane zespoły oraz skutecznym wspomaganiem...
-
Zastosowanie modułu symulacji dynamicznej programu CAD w analizie układu napędowego elektronarzędzia
PublicationW referacie przedstawiono analizę mechanicznego układu przeniesienia napędu elektronarzędzia (wyrzynarki elektrycznej) przy zastosowaniu Modułu Symulacji Dynamicznej (MSD) programu Autodesk Inventor (AI). Opracowano modele 3D poszczególnych części elektronarzędzia i połączono je przy zachowaniu tzw. kinematyki odwrotnej. Przeprowadzono analizę wpływu poszczególnych węzłów kinetycznych na przebieg momentu na wale silnika elektrycznego....
-
Fast Calibration-Free Single-Anchor Indoor Localization Based on Limited Number of ESPAR Antenna Radiation Patterns
Publication— In this article, we investigate how the calibrationfree single-anchor indoor localization algorithm developed for base stations equipped with electronically steerable parasitic array radiator (ESPAR) antennas can further be improved. By reducing the total number of ESPAR antenna radiation patterns used in localization process, one can significantly reduce the time needed for an object localization. Performed localization measurements...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Tryton Supercomputer Capabilities for Analysis of Massive Data Streams
PublicationThe recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublicationVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublicationIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Processing of Satellite Data in the Cloud
PublicationThe dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...
-
Literature review of user needs, toward user requirements
PublicationThis report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...
-
RSS-Based DoA Estimation for ESPAR Antennas Using Support Vector Machine
PublicationIn this letter, it is shown how direction-of-arrival (DoA) estimation for electronically steerable parasitic array radiator (ESPAR) antennas, which are designed to be integrated within wireless sensor network nodes, can be improved by applying support vector classification approach to received signal strength (RSS) values recorded at an antenna's output port. The proposed method relies on ESPAR antenna's radiation patterns measured...
-
Disciplines and measures of information resilience
PublicationCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Damage detection in plates based on Lamb wavefront shape reconstruction
PublicationMany of the current studies in the area of damage detection using elastic wave propagation are based on deploying sensor networks with a large number of piezoelectric transducers to detect small-size cracks. A major limitation of these studies is that cracks are usually larger and have different shapes in real cases. Moreover, using a large number of sensing nodes for damage detection is both costly and computationally intensive....
-
The literature review on boundary conditions of use for non-residential buildings. Educational buildings.
PublicationThis paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The studies were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, and Web of Science databases. The boundary conditions are understood as special characteristics for use and or precondition, determining specific features of...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublicationRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
Does the coordinated development of two-way FDI increase the green energy efficiency of Chinese cities? Evidence from Chinese listed companies
PublicationBased on the evidence from listed company microdata and data from 285 cities in China, this paper studies the coordinated development of two-way FDI (CDFDI) in improving green energy efficiency (GEE). In particular, this paper examines the spatial heterogeneity effects of CDFDI on GEE. The results showed that CDFDI had a positive impact on the GEE of local and surrounding cities. Mechanistic examinations show that the effects...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
3D Imaging Of Underwater Objects Using Multi-Beam Data
PublicationOne of the main applications of multibeam sonars is high resolution bathymetry measurement, as well as detecting and imaging of underwater objects like shipwrecks. In order to obtain the visualisation quality good enough to allow the researcher to investigate an object in more detail, the approach relying on construction of three-dimensional model of an imaged object, e.g. consisting of nodes, edges and plane elements (facets)...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublicationWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublicationA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Toward Human Chromosome Knowledge Engine
PublicationHuman chromosomes carry genetic information about our life. Chromosome classification is crucial for karyotype analysis. Existing chromosome classification methods do not take into account reasoning, such as: analyzing the relationship between variables, modeling uncertainty, and performing causal reasoning. In this paper, we introduce a knowledge engine for reasoning-based human chromosome classification that stores knowledge...
-
Boundary conditions for non-residential buildings from the user’s perspective: literature review
PublicationBackground and objective: This paper aims to review the boundary conditions (B/C) in specific categories (energy, building use, and lighting) within non-residential buildings to pave the way to a better understanding of users’ requirements and needs of the built environment. For this paper, B/C are understood as unique preconditions, specific characteristics for use, determining specific features of buildings, enabling an accurate...
-
The literature review on boundary conditions of use for non-residential buildings
PublicationThis paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The reviews were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, Web of Science databases. The boundary conditions understood as special characteristics for use and or precondition, determining specific features of buildings...
-
Od Safony do Sibylli : o twórczości kobiet, które miały odwagę zmieniać świat
Publication"From Sappho to Sibylla. About the women’s research and literary output preserved in the PAS Gdańsk Library early printed books collection (15th-18th c.)" The main purpose of this study was to present women’s research and literary output preserved in the early printed books collection (15th-18th c.) of the PAS Gdańsk Library (PAN Biblioteka Gdańska). The author mentions the phenomenon of women writing and participation in the...
-
A Mesh Deformation Technique Based on Solid Mechanics for Parametric Analysis of High-Frequency Devices With 3-D FEM
PublicationIn this paper, a versatile technique for mesh defor- mation is discussed, targeted at the electromagnetic (EM) field simulation of high-frequency devices using the 3-D finite element method (FEM). The approach proposed applies a linear elasticity model to compute the displacements of the internal mesh nodes in 3-D when the structure geometry is changed. The technique is compared with an alternative approach...
-
Towards truly sustainable IoT systems: the SUPERIOT project
PublicationThis paper provides an overview of the SUPERIOT project, an EU SNS JU (Smart Networks and Services Joint Undertaking) initiative focused on developing truly sustainable IoT systems. The SUPERIOT concept is based on a unique holistic approach to sustainability, proactively developing sustainable solutions considering the design, implementation, usage and disposal/reuse stages. The concept exploits radio and optical technologies...
-
Sésame, ouvre-toi: internationalisme phraséologique à contenu universel
PublicationPhraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....
-
The realization of ASON/GMPLS control plane
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
Time versus space trade-offs for randezvous in trees
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...
-
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix
PublicationIn this paper we build on our previously proposed MPI I/O NVRAM distributed cache for high performance computing. In each cluster node it incorporates NVRAMs which are used as an intermediate cache layer between an application and a file for fast read/write operations supported through wrappers of MPI I/O functions. In this paper we propose optimizations of the solution including handling of write requests with a synchronous mode,...
-
Examples of numerical simulations of two-dimensional unsaturated flow with VS2DI code using different interblock conductivity averaging schemes
PublicationFlow in unsaturated porous media is commonly described by the Richards equation. This equation is strongly nonlinear due to interrelationships between water pressure head (negative in unsaturated conditions), water content and hydraulic conductivity. The accuracy of numerical solution of the Richards equation often depends on the method used to estimate average hydraulic conductivity between neighboring nodes or cells of the numerical...
-
The Method of Multi-criteria Analysis to Support the Decision on Load or Micro-generation Connection to a Low- or Medium-voltage Power Grid
PublicationThis paper presents a method that supports the decision in terms on selecting the best option of a load connection to a low- or medium-voltage power distribution grid, and of a micro-generation source connection to a low-voltage grid. The method is based on the search for the option with the lowest aggregate assessment measure, which is the weighted average of partial assessment measures determined for each of eight considered...
-
Multiaxial Fatigue Behaviour of SLM 18Ni300 Steel
PublicationFatigue behaviour of SLM 18Ni300 steel under proportional bending-torsion loading is studied. The fatigue tests are conducted under pulsating loading conditions using tubular specimens with a transversal circular hole. Three ratios of the normal stress to shear stress are considered, namely σ/τ=4,σ/τ=2 and σ/τ = 4/3. Crack initiation sites were found for two diametrically opposite points around the hole, whose locations are governed...
-
Decontaminating Arbitrary Graphs by Mobile Agents: a Survey
PublicationA team of mobile agents starting from homebases need to visit and clean all nodes of the network. The goal is to find a strategy, which would be optimal in the sense of the number of needed entities, the number of moves performed by them or the completion time of the strategy. Currently, the field of distributed graph searching by a team of mobile agents is rapidly expanding and many new approaches and models are being presented...