Filters
total: 3268
filtered: 2524
-
Catalog
- Publications 2524 available results
- Journals 95 available results
- Conferences 88 available results
- Publishing Houses 1 available results
- People 110 available results
- Projects 9 available results
- e-Learning Courses 53 available results
- Events 8 available results
- Open Research Data 380 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: COIN NETWORK
-
A method of the UMTS-FDD network design based on universal load characteristics
PublicationIn the paper an original method of the UMTS radio network design was presented. The method is based on simple way of capacity-coverage trade-off estimation for WCDMA/FDD radio interface. This trade-off is estimated by using universal load characteristics and normalized coverage characteristics. The characteristics are useful for any propagation environment as well as for any service performance requirements. The practical applications...
-
Evaluation of a sat-type fairness mechanism implemented in a dual-ring network
PublicationThe fairness problem was presented. Popular fairness concepts and measures were shown. The RPR fairness mechanism and the SAT mechanism were described. A modification of the SAT algorithm, adapted to the possibilities of Ethernet cards used for implementation of a dual-ring RPR-based network, was proposed. Performance of the proposed modification was measured. Jain's and Chen's fairness indexes were calculated. Effectiveness comparison...
-
Selfie and Personal Branding Phenomena in the Context of the Network Economy. A Literature Review
PublicationSelf-taken pictures called “selfies” shared in social media have become a worldwide phenomenon. This is due to the increased need of human being to share to other people their daily lives and to build their own personal brand in the networked world. Despite that, the subject of personal branding has not been sufficiently discussed in academic marketing literature over the past decade. The objective of the study is to present the...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublicationRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublicationProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Next generation ITS implementation aspects in 5G wireless communication network
PublicationIn the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...
-
Brand loyalty creation in the social network. Does the product category matter?
PublicationThe final goal of all marketers’ effort is to achieve a high level of loyalty toward their brands. Social network brand sites are increasingly attracting the attention of scientists and managers intrigued by their potential application for brand loyalty creation. The aim of this research, based on European sample, is to fill the gap in understanding the product category loyalty and brand loyalty relation as an output of brand identification...
-
Smart Grid in Practise - Implementation of the Billaterall Supply in Gdynia Trolleybus Network
PublicationSince 2001, trolleybus system in Gdynia has been involved in many activities related to the reduction of power consumption, both in terms of implementation and research and development. In 2011 was introduced the first supercapacitor storage energy system. In PKT started applications of Smart Grid technologies in supply network: the bilateral supply. The paper presents results of these this novel investitions.
-
ReFlexeNN - the Wearable EMG Interface with Neural Network Based Gesture Classification
PublicationThe electromyographic activity of muscles was measured using a wireless biofeedback device. The aim of the study was to examine the possibility of creating an automatic muscle tension classifier. Several measurement series were conducted and the participant performed simple physical exercises - forcing the muscle to increase its activity accordingly to the selected scale. A small wireless device was attached to the electrodes placed...
-
Traffic Type Influence on QoS Network Performance of Streaming Traffic Class
PublicationFeasibility study on QoS routing proved that the traffic type influence the network performance. The performance is defined here as a number of packets serviced by the network. In the paper additional element - buffers lengths used in service system was verified in terms of dependencies with routing performance. We present results obtained by simulation for many simulation scenarios. Analysis was done for two different network...
-
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Network Approach to Increments of RR-intervals for Visualization of Dynamics of Cardiac Regulation
PublicationThe transition network for RR -increments is pre- sented in a directed and weighted graph, with vertices represent- ing RR -increments and edges corresponding to the order in a sequence of increments. The adjacency matrix and the transition matrix of this network provide a graphical tool which could be useful in the assessment of cardiac regulation. As an example, the method is applied in detecting differences between diurnal activity...
-
The impact of road network structure and mobility on the national traffic fatality rate
PublicationW pracy określono wpływ wybranych miar struktury sieci drogowej i mobilności mieszkańców na wskaźnik śmiertelności w wypadkach drogowych na bazie dostępnych danych z wielu krajów świata. Opracowano wieloczynnikowe modele nieliniowe pozwalające na określenie wpływu wielu istotnych czynników: ekonomicznych, systemowych, motoryzacyjnych i infrastrukturalnych na bezpieczeństwo ruchu drogowego mierzonego wskaźnikiem śmiertelności RFR.
-
An Improved Convolutional Neural Network for Steganalysis in the Scenario of Reuse of the Stego-Key
PublicationThe topic of this paper is the use of deep learning techniques, more specifically convolutional neural networks, for steganalysis of digital images. The steganalysis scenario of the repeated use of the stego-key is considered. Firstly, a study of the influence of the depth and width of the convolution layers on the effectiveness of classification was conducted. Next, a study on the influence of depth and width of fully connected...
-
Surface effects of network materials based on strain gradient homogenized media
PublicationThe asymptotic homogenization of periodic network materials modeled as beam networks is pursued in this contribution, accounting for surface effects arising from the presence of a thin coating on the surface of the structural beam elements of the network. Cauchy and second gradient effective continua are considered and enhanced by the consideration of surface effects. The asymptotic homogenization technique is here extended to...
-
5G Technologies in Intelligent Transport Systems - Architectures, Virtualization and Network Slicing
PublicationIn the paper, 5G communication technologies implemented for Intelligent Transport Systems are discussed. Firstly, the essence of the 5G system concept is presented, and the problem of network functions virtualization (NFV) is analyzed. Moreover, the principle of virtualization is explained. Secondly, the analysis of network slicing is performed, from the point of view of transport systems implementation in the...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Global Digital Technology Convergence: Driving Diffusion via Network Effects
PublicationSince the 1970s, we have witnessed unprecedented diffusion of digital technologies in both speed and geographic coverage. These technologies are pervasive and disruptive, and lead to profound shifts and transformations in societies and economies. Many claim that emerging network externalities are the principal phenomenon driving the process of technology diffusion and determining its in-time dynamics. This book analyses the unique...
-
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublicationThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
PublicationThis document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled...
-
The Impact of Road Network Structure and Mobility on the National Traffic Fatality Rate
Publication -
The Effect of Diets Containing High-Moisture Corn or Triticale Grain on Animal Performance and the Fatty Acid Composition of Lamb Muscles
Publication -
The European Training Network ETUDE (Encompassing Training in fUnctional Disorders across Europe): a new research and training program of the EURONET-SOMA network recruiting 15 early stage researchers
Publication -
Robustness in Compressed Neural Networks for Object Detection
PublicationModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
Primary role identification in dynamic social networks
PublicationIdentyfikacja ról w sieci społecznej jest jednym z podstawowych zagadnień analizy takich sieci. W artykule przedstawiamy nowe podejście do tego zagadnienia. Pokazujemy w jaki sposób można dokonać identyfikacji ról poprzez wykorzystanie zaproponowanego modelu zachowań aktorów. Model taki tworzą podgrafy wzorcowe oraz diagramy stanów okreslające sekwencje aktywności w zachowaniu aktorów. Na bazie wyznaczonych modeli zachowań oraz...
-
Region protection/restoration scheme in survivable networks
PublicationW artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...
-
Ship Resistance Prediction with Artificial Neural Networks
PublicationThe paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Service-based Resilience for Embedded IoT Networks
PublicationEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Comparison of centralized and decentralized preemption in MPLS networks
PublicationPreemption is one of the crucial parts of the traffic engineering in MPLS networks. It enables allocation of high-priority paths even if the bandwidth on the preferred route is exhausted. This is achieved by removing previously allocated low-priority traffic, so as enough free bandwidth becomes available. The preemption can be performed either as a centralized or a decentralized process. In this article we discuss the differences...
-
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Cluster-Dependent Feature Selection for the RBF Networks
Publication -
AGENT-BASED APPROACH TO THE DESIGN OF RBF NETWORKS
Publication -
Delamination Identification Using Global Convolution Networks
Publication -
Applying artificial intelligence for cellular networks optimization
Publication -
Cost minimisation in unbounded multi-interface networks
PublicationW pracy badano problem odłączania niektórych urządzeń komunikacyjnych w wielointerfejsowych sieciach bezprzewodowych w taki sposób, by zapewnić realizację wymaganego grafu połączeń przy jednoczesnej minimalizacji zużycia energii. Sformułowano problem optymalizacyjny, podano wyniki dotyczące jego trudności i zaproponowano algorytmy optymalizacyjne dla wariantu, w którym liczba interfejsów komunikacyjnych jest potencjalnie nieograniczona...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Rearrangeability in multicast Clos networks is NP-complete
PublicationPrzestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...
-
RSVP-TE as a reservation protocol for optical networks
PublicationIn this paper, we consider the reservation of optical resources problem. We implement extensions for RSVP-TE (Resource ReSerVation Protocol with Traffic Engineering Extension) to achieve the new functionality for optical resources reservation. Based on ASON/GMPLS architecture we examine an open source implementation KOM RSVP-Engine and extend its functionality according to ITU-T and IETF recommendations. The transport plane consists...
-
Minimization of label usage in (G)MPLS networks
Publication -
Traffic Modeling in IMS-based NGN Networks
PublicationIn the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Annual signals observed in regional GPS networks
PublicationAbstract: This paper describes analyses concerning annual signals in GPS-derived coordinates. The data was processed in the Military University of Technology Local Analysis Centre with Bernese 5.0 software. We used observations from 129 permanent GPS stations which belong to the Polish Active Geodetic Network (ASG-EUPOS), for the period of GPS weeks 1465-1729, corresponding to about 5 years. The annual signals have been estimated...
-
Cooperative Data Transmission in Wireless Vehicular Networks
PublicationThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
Overview of Scalability and Reliability Problem in SDN Networks
PublicationIn the paper an overview of scalability and reliability in the SDN (Software Defined Networks) networks has been presented. Problems and limitations for guaranteeing scalability and reliability in SDN networks have been indicated. Known methods for assuring scalability and reliability in SDN networks have been described. Projects from research communities for resolving issues with scalability and reliability in SDN networks have...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...