Search results for: NETWORKED WORLD - Bridge of Knowledge

Search

Search results for: NETWORKED WORLD

Filters

total: 4306
filtered: 3521

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: NETWORKED WORLD

  • Cluster-Dependent Feature Selection for the RBF Networks

    Publication

    - Year 2015

    Full text to download in external service

  • AGENT-BASED APPROACH TO THE DESIGN OF RBF NETWORKS

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2013

    Full text to download in external service

  • Rearrangeability in multicast Clos networks is NP-complete

    Publication

    Przestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...

    Full text to download in external service

  • Comparison of centralized and decentralized preemption in MPLS networks

    Publication

    - Year 2007

    Preemption is one of the crucial parts of the traffic engineering in MPLS networks. It enables allocation of high-priority paths even if the bandwidth on the preferred route is exhausted. This is achieved by removing previously allocated low-priority traffic, so as enough free bandwidth becomes available. The preemption can be performed either as a centralized or a decentralized process. In this article we discuss the differences...

  • Service restoration in survivable networks under attacks

    Publication

    W artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...

  • Quality of service in optical burst switched networks

    Publication

    In the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...

  • DETERMINATION OF VERTICAL DISPLACEMENTS IN RELATIVE MONITORING NETWORKS

    The problem of determining displacements of objects is an important and current issue, in particular in terms of operational safety. This is a requirement that covers geodetic, periodic control measurements in order to determine horizontal and vertical displacements. The paper is focused on the analysis of vertical displacements. Geodetic measurements and their interpretation allow to reduce the risk of possible structural catastrophes....

    Full text available to download

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • Traffic Modeling in IMS-based NGN Networks

    In the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...

  • Performance Evaluation of Preemption Algorithms in MPLS Networks

    Preemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...

    Full text available to download

  • Primary role identification in dynamic social networks

    Publication

    - Year 2011

    Identyfikacja ról w sieci społecznej jest jednym z podstawowych zagadnień analizy takich sieci. W artykule przedstawiamy nowe podejście do tego zagadnienia. Pokazujemy w jaki sposób można dokonać identyfikacji ról poprzez wykorzystanie zaproponowanego modelu zachowań aktorów. Model taki tworzą podgrafy wzorcowe oraz diagramy stanów okreslające sekwencje aktywności w zachowaniu aktorów. Na bazie wyznaczonych modeli zachowań oraz...

  • RSVP-TE as a reservation protocol for optical networks

    Publication

    In this paper, we consider the reservation of optical resources problem. We implement extensions for RSVP-TE (Resource ReSerVation Protocol with Traffic Engineering Extension) to achieve the new functionality for optical resources reservation. Based on ASON/GMPLS architecture we examine an open source implementation KOM RSVP-Engine and extend its functionality according to ITU-T and IETF recommendations. The transport plane consists...

  • Applying artificial intelligence for cellular networks optimization

    Publication
    • O. Semenova
    • A. Semenov
    • O. Bisikalo
    • V. Kucheruk
    • P. Kulakov
    • R. Romaniuk
    • P. Komada
    • K. Nurseitova
    • R. S. Romaniuk

    - Year 2019

    Full text to download in external service

  • Application of wavelength division multiplexing in sensor networks

    Publication

    - Year 2012

    Over the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...

  • Minimization of label usage in (G)MPLS networks

    Publication

    - Year 2009

    Full text to download in external service

  • Cooperative Data Transmission in Wireless Vehicular Networks

    Publication

    - Year 2017

    The paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.

  • Annual signals observed in regional GPS networks

    Publication
    • J. Bogusz
    • M. Figurski

    - Acta Geodynamica et Geomaterialia - Year 2014

    Abstract: This paper describes analyses concerning annual signals in GPS-derived coordinates. The data was processed in the Military University of Technology Local Analysis Centre with Bernese 5.0 software. We used observations from 129 permanent GPS stations which belong to the Polish Active Geodetic Network (ASG-EUPOS), for the period of GPS weeks 1465-1729, corresponding to about 5 years. The annual signals have been estimated...

    Full text available to download

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download

  • Trust Management Method for Wireless Sensor Networks

    Publication

    - Year 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Full text available to download

  • Ship Resistance Prediction with Artificial Neural Networks

    Publication

    - Year 2015

    The paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...

    Full text available to download

  • The Transmission Protocol of Sensor Ad Hoc Networks

    Publication

    - Year 2015

    This paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

  • Overview of Scalability and Reliability Problem in SDN Networks

    In the paper an overview of scalability and reliability in the SDN (Software Defined Networks) networks has been presented. Problems and limitations for guaranteeing scalability and reliability in SDN networks have been indicated. Known methods for assuring scalability and reliability in SDN networks have been described. Projects from research communities for resolving issues with scalability and reliability in SDN networks have...

  • Robustness in Compressed Neural Networks for Object Detection

    Publication

    - Year 2021

    Model compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...

    Full text available to download

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Statistical significance of displacements in heterogeneous control networks

    Publication

    - Geodesy and Cartography - Year 2013

    This paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...

    Full text available to download

  • Region protection/restoration scheme in survivable networks

    Publication

    - Year 2005

    W artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...

  • The Modernist Centre of Gdynia. Management Plan for the Nominated Property for the Years 2022-2027. Attachment to: Nomination Dossier on the inscription on the UNESCO World Heritage List of a part of Gdynia City Centre, Poland

    Publication

    - Year 2021

    The Management Plan is a document that helps in managing the Nominated Property and follows the Operational Guidelines for the Implementation of the Convention. The Plan is intended as a management tool to ensure the protection and maintenance of the Outstanding Universal Value (OUV) and the features that determine the integrity and authenticity of the place.

  • Specjalistyczne laboratorium techniki wysokich napięć. Materiały pomocnicze.P. Gdań. [online] [dostęp 30.12.2003]. Dostępny w World Wide Web: http:// www.ely.pg.gda.pl/wnae/index1.html) [84 s.]

    Publication

    .

  • Networkig activities of general judiciary - from theory to practice

    Publication

    - e-mentor - Year 2018

    Over the last three decades, networks - as a field of research - have acquired a significant place among management sciences. Unfortunately, in the judiciary they have become a subject of more careful analyses only recently, which resulted in a large discrepancy of knowledge - both in theory and in its practical adaptation for the needs of the courts. In order to fill this cognitive gap, an attempt was made to identify levels of...

    Full text available to download

  • Zaufanie do marek jako mediator pomiędzy postrzeganym ryzykiem i skłonnością do elektronicznego word-of-mouth

    Publication

    - Handel Wewnętrzny - Year 2017

    Rozwój Internetu oraz dostęp konsumentów do mediów społecznościowych wpływają na ich zaangażowanie on-line. Odzwierciedla to również sposób, w jaki konsumenci wyrażają opinie o markach i produktach w Sieci. Celem ankiety było zbadanie wpływu postrzeganego ryzyka i zaufania do marki na skłonność konsumentów do electronic word-of-mouth (eWOM). Ponadto, autorzy zbadali rolę zaufania do marki jako mediatora w relacji między postrzeganym...

    Full text available to download

  • A novel method based on adaptive cuckoo search for optimal network reconfiguration and distributed generation allocation in distribution network

    Publication
    • T. Nguyen
    • A. Truong
    • T. Phung

    - INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS - Year 2016

    Full text to download in external service

  • Localization in wireless sensor networks based on zigbee platform

    Publication

    W artykule porównano dwie różne metody lokalizacji w sieciach sensorów bezprzewodowych. Jedną z metod jest implementacja sprzętowa algorytmu w układzie nadawczo odbiorczym CC2431. Drugą metodą jest implementacja programowa. Wyniki testów przeprowadzonych na otwartym terenie oraz w pomieszczeniach zamkniętych zostały przedstawione i porównane w pracy.

  • Algorithms of fast service restoration in survivable multilayer networks

    Publication

    - Year 2009

    Głównym celem rozprawy jest zaproponowanie nowych modeli/algorytmów doboru tras zapewniających przeżywalność usług w sieciach IP-MPLS/WDM poprzez zastosowanie wyznaczonych zawczasu ścieżek zabezpieczających. Zakres pracy obejmuje: dokonanie przeglądu mechanizmów transmisji informacji w warstwowych sieciach teleinformatycznych IP-MPLS/WDM; szczegółowy opis sposobów zapewniania przeżywalności usług; zaproponowanie nowych metod doboru...

  • Application of Bayesian Networks for Forecasting Future Model of Farm

    Publication

    - Agricultural Engineering - Year 2017

    Full text to download in external service

  • Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2009

    Rozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.

    Full text to download in external service

  • CRVG - a new model for wireless networks topology generation

    Publication

    This paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.

  • Performance of LSP preemption methods in different MPLS networks

    Publication

    - Year 2008

    Preemption in Multiprotocol Label Switching (MPLS) is an optional traffic engineering technique used to create a new path of high priority when there is not enough bandwidth available. In such case the path is admitted by removing one or more previously allocated paths of lower priority. As there are usually many possible sets of low priority paths which can be selected, a preemption algorithm is being started to select the best...

  • Service restoration in survivable networks under malicious attacks

    Publication

    W artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...

  • End-to-end service survivability under attacks on networks

    W artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...

    Full text available to download

  • Accuracy analysis of a mobile station location in the cellular networks

    Jakość usług lokalizacyjnych oferowanych w sieciach komórkowych zależy od efektywności estymacji położenia terminala ruchomego. Dokładność obecnie stosowanych metod lokalizacyjnych jest niewystarczająca, szczególnie w odniesieniu do wywołań w niebezpieczeństwie. Modyfikacja istniejących algorytmów może istotnie wpłynąć na zwiększenie dokładności lokalizowania terminala ruchomego przy jednocześnie niewielkich nakładach finansowych....

  • Pattern matching localization in ZigBee wireless sensor networks.

    Publication

    Lokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.

    Full text to download in external service

  • Survivability of unicast and anycast flows under attacks on networks

    Publication

    - Year 2010

    W artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...

  • A New Heuristic Algorithm for Effective Preemption in MPLS Networks

    Publication

    - Year 2006

    W artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...

  • passive spice networks from non-passive data

    Publication

    - Year 2006

    Artykuł przestawia technike generacji schematow zastepczych w formacie SPICE dla pasywnych układów mikrofalowych. Wynikowy schemat zastepczy ma zagwarantowana pasywnosc. Schematy zastepcze powstaja na podstawie symulacji lub pomiarow w dziedzinie czestotliwosci i moga byc wykorzystane do symulacji w dziedzinie czasu.

  • Wireless Networks as an Infrastructure for Mission-Critical Business Applications

    Publication

    Despite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...

  • NETWORKS, STAKEHOLDERS AND ENTREPRENEURIAL ECOSYSYSTEMS IN CURRENT POLISH ECONOMYGUT

    Publication
    • B. Detyna
    • A. Gardocki
    • S. Kaczyński
    • M. F. Kaszubowski
    • U. Kobylińska
    • A. Mroczek-Czetwertyńska
    • Ł. Siemieniuk

    - Year 2019

    This book is dedicated to widely understood entrepreneurship and financial system in different polish ecosystems. In particular, there is described influence of supporting entrepreneurship to investment development in Walbrzych agglomerations communes with the results of questionnaires for varied groups of inhabitants, entrepreneurs and territorial self-governments. There is also presented analysis of relations within academic...

    Full text available to download

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Outlier detection method by using deep neural networks

    Publication

    - Year 2017

    Detecting outliers in the data set is quite important for building effective predictive models. Consistent prediction can not be made through models created with data sets containing outliers, or robust models can not be created. In such cases, it may be possible to exclude observations that are determined to be outlier from the data set, or to assign less weight to these points of observation than to other points of observation....

    Full text to download in external service

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service