Filters
total: 2846
filtered: 2343
-
Catalog
- Publications 2343 available results
- Journals 90 available results
- Conferences 86 available results
- Publishing Houses 1 available results
- People 105 available results
- Projects 8 available results
- e-Learning Courses 34 available results
- Events 4 available results
- Open Research Data 175 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: SOHO NETWORKS
-
Intelligent thermal imaging camera with network interface
Publication -
Network heat is the comfort in winter and summer - TRIGENERATION
PublicationPrzedstawiono międzynarodowe uwarunkowania prawne oraz techniczne stosowania kogeneracji w aspekcie wykorzystania ciepła sieciowego na potrzeby ogrzewania i klimatyzacji obiektów.
-
Network-centric warfare: a strategy for homeland security
PublicationPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Comparative study of learning methods for artificial network
PublicationW artykule przedstawiono wyniki badań porównawczych metod uczenia sieci neuronowych takich jak: metoda propagacji wstecznej błędów, rekurencyjna metoda najmniejszych kwadratów, metoda Zangwill'a, metoda algorytmów ewolucyjnych. Celem tych badań jest dobieranie najefektywniejszej metody uczenia do projektowania adaptacyjnego neuronowego regulatora napięcia generatora synchronicznego.metody uczenia, sieć neuronowa, neuronowy regulator...
-
Self-Organizing Wireless Nodes Monitoring Network
PublicationThe concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.
-
Model of control plane of ASON/GMPLS network
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...
-
Application tool for IP QoS network design
PublicationDespite the fact that differentiated-service-aware network implementation has been a widely discussed topic for quite some time, network design still proofs nontrivial. Well developed software could put an end to network designer's problems. This chapter describes work, which has been aimed at creating a comprehensive network design tool, offering a fair range of functionality and high reliability. The presented tool is able to...
-
SNDlib 1.0—Survivable Network Design Library
Publication -
An optimization model for robust FSO network dimensioning
Publication -
Artificial Neural Network for Multiprocessor Tasks Scheduling
Publication -
A wireless network for off-shore marine research
PublicationThis paper presents functionality, the most important technology developments and potential use cases of digital communication system, developed to facilitate selected tasks commonly required during off-shore operations and marine research, including: broadband information sharing between platforms isolated from an on-shore communication infrastructure, acquisition of large data-sets from variety of off-shore...
-
Network society: a concept of smart information management
PublicationAutomatic enhancement of Internet broadcasted news has been recently gaining increasing importance and interest. Existing applications and models of textual Event Detection in online media are based on the analysis of news distributed via RSS (Rich Site Summary called also Really Simple Syndication) channels or available at news websites. It assumes that each piece of news is equally available to the reader and, therefore, describes...
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublicationThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
Approximation task decomposition for artificial neural network.
PublicationW pracy przedstawiono wpływ dekompozycji zadania na czasochłonność projektowania oraz dokładność i szybkość obliczeń sztucznej sieci neuronowej wykorzystanej do rozwiązania rzeczywistego problemu technicznego, którego matematyczny model był znany. Celem obliczeń prowadzonych przez sieć neuronową było określenie wartości współczynnika przepływu m na podstawie znajomości wartości: przewodności dźwiękowej C i średnicy przewodu d (a...
-
Analysis of the reliability of any-hop star network
PublicationZałożono, że sieć ma wielostopniową strukturę gwiaździstą. Jako oceny niezawodności tych sieci przyjęto: 1) średnią liczbę sprawnych par węzłów, które mogą komunikować się wzajemnie; 2) średnią liczbę sprawnych par węzłów, które mogą komunikować się poprzez węzeł centralny; 3) średnią liczbę sprawnych par węzłów, które mogą komunikować się z węzłem centralnym; 4) prawdopodobieństwo zdarzenia, że sprawne węzły mogą komunikować...
-
Consumer social network brand identification and personal branding. How do social network users choose among brand sites?
PublicationBrands’ social networking sites (fan pages) are increasingly attracting the attention of scientists and managers intrigued by their potential application for brand value creation. The aim of this research is to understand better how users choose among social networking sites as an act of brand identification. The study presents a new model whose structure of identification drivers for social networking brand sites varies for customer...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Simultaneous Optimization of Unicast and Anycast Flows and Replica Location in Survivable Optical Networks
PublicationDotychczasowe prace z zakresu ochrony sieci przed awariami dotyczyły przypadku transmisji unicast. W niniejszym artykule rozważamy problem ochrony transmisji anycast (jeden-do-jednego-z-wielu). Jako wariant ochrony stosujemy podejście pojedynczej ścieżki zabezpieczającej (ang. path protection), chroniącej przed awarią pojedynczego węzła.Wprowadzono nowe modele programowania całkowitoliczbowego optymalnego znajdowania tras oraz...
-
Using trust management model for detection of faulty nodes in Wireless Sensor Networks
Publication -
Towards the boundary between easy and hard control problems in multicast Clos networks
PublicationIn this article we study 3-stage Clos networks with multicast calls in general and 2-cast calls, in particular. We investigate various sizes of input and output switches and discuss some routing problems involved in blocking states. To express our results in a formal way we introduce a model of hypergraph edge-coloring. A new class of bipartite hypergraphs corresponding to Clos networks is studied. We identify some polynomially...
-
A bound on the number of middle-stage crossbars in f-cast rearrangeable Clos networks
PublicationIn 2006 Chen and Hwang gave a necessary and sufficient condition under which a three-stage Clos network is rearrangeable for broadcast connections. Assuming that only crossbars of the first stage have no fan-out property, we give similar conditions for f-cast Clos networks, where f is an arbitrary but fixed invariant of the network. Such assumptions are valid for some practical switching systems, e.g. high-speed crossconnects....
-
Towards bees detection on images: study of different color models for neural networks
PublicationThis paper presents an approach to bee detection in videostreams using a neural network classifier. We describe the motivationfor our research and the methodology of data acquisition. The maincontribution to this work is a comparison of different color models usedas an input format for a feedforward convolutional architecture appliedto bee detection. The detection process has is based on a neural...
-
Multi-Camera Vehicle Tracking Using Local Image Features and Neural Networks
PublicationA method for tracking moving objects crossing fields of view of multiple cameras is presented. The algorithm utilizes Artificial Neural Networks (ANNs). Each ANN is trained to recognize images of one moving object acquired by a single camera. Local image features calculated in the vicinity of automatically detected interest points are used as object image parameters. Next, ANNs are employed to identify the same objects captured...
-
Application 2D Descriptors and Artificial Neural Networks for Beta-Glucosidase Inhibitors Screening
PublicationBeta-glucosidase inhibitors play important medical and biological roles. In this study, simple two-variable artificial neural network (ANN) classification models were developed for beta-glucosidase inhibitors screening. All bioassay data were obtained from the ChEMBL database. The classifiers were generated using 2D molecular descriptors and the data miner tool available in the STATISTICA package (STATISTICA Automated Neural...
-
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
PublicationPrzekazywanie pakietów w sieciach ad hoc z transmisją wieloetapową zależy od współpracy ruchomych terminali oraz stworzenia właściwego systemu motywacyjnego. Zaproponowany protokół wykorzystuje elementy podejścia systemu reputacyjnego dla stworzenia funkcji wypłaty w grze niekooperacyjnej, w której strategie dotyczą konfiguracji progu admisji pakietów źródłowych w stacjach. Dla symetrycznego modelu sieci pokazano, że istnieją punkty...
-
Self-organizing Artificial Neural Networks into Hydrographic Big Data Reduction Process
Publication -
Priority-enabled optimization of resource utilization in fault-tolerant optical transport networks.
PublicationW artykule zaproponowano nowe podejście do optymalizacji rozdziału zasobów przeżywalnych sieci rozległych, które uzależnia szybkość przywracania ciągłości połączenia od klasy usługi. Wykazano, iż proponowana metoda nie powoduje wydłużania ścieżek zabezpieczających (w przypadku usług w wymaganej wysokiej jakości obsługi) lub czyni to w sposób minimalny (dla pozostały usług). Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych...
-
Detection of roles of actors in social networks using the properties of actors' neighborhood structure.
PublicationArtykuł opisuje metodę identyfikacji ról aktorów sieci społecznej. Metoda ta może być szczególnie przydatna w sieciach społecznych, o których posiadamy ograniczoną wiedzę, głównie zawężoną do lokalnych powiązań pomiędzy aktorami. Przedstawiona w artykule metoda korzysta z grafu relacji społecznych, algorytmu identyfikacji ról oraz zbioru grafów wzorców relacji. Rozwiązanie zostało przetestowane w społeczności użytkowników serwisu...
-
An optimization approach to coexistence of Bluetooth and Wi-Fi networks operating in ISM environment
PublicationW artykule rozważono problem wzajemnych interferencji pomiedzy urządzeniami standardów IEEE 802.11b oraz Bluetooth (BT). Zaproponowano model optymalizacyjny bazujący na podejściu programowania liniowego. Uzyskano znaczącą porawę wykorzystania pasma ISM w przypadku koegzystencji sieci rozważanych standardów.
-
Fast method for IEEE 802.16-2004 standard-based networks coverage measuring
PublicationThis paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...
-
WiMA: Towards a Multi-Criterion Association in Software Defined Wi-Fi Networks
Publication -
Brain-Inspired Deep Networks for Facial Expression Recognition. Frontiers in Biomedical Technologies
Publication -
Artificial Neural Networks in Classification of Steel Grades Based on Non-Destructive Tests
Publication -
Designing the Composition of Cement Stabilized Rammed Earth Using Artificial Neural Networks
Publication -
The Influence of Input Data Standardization Method on Prediction Accuracy of Artificial Neural Networks
Publication -
A new role-switching mechanism optimizing the coexistence of bluetooth and wi-fi networks
PublicationPasmo ISM jest wykorzystywane przez sieci bezprzewodowe różnych technologii. Z tego powodu niezbędne jest opracowanie odpowiednich mechanizmów podnoszących efektywność pracy urządeń w środowisku współistniejących sieci. W artykule rozpatrywany jest problem wzajemnych interferencji pomiędzy nadajnikami IEEE 802.11b (Wi-Fi) oraz urządzeniami Bluetooth. Zaproponowano metodę optymalizacji określania topologii sieci BT, skutkującą...
-
Router Selfishness in Community Wireless Mesh Networks: Cross-Layer Benefits and Harms
PublicationWęzły sieci mesh nie są poddane administracyjnej kontroli, zarazem nie odczuwają ograniczeń energetycznych. Są przez to skłonne do zachowań egoistycznych w warstwach 2 i 3 OSI, w szczególności w odniesieniu do protokołów MAC i routingowych. W pracy przebadano symulacyjnie wybrane aspekty środowiska mesh uzasadniające podjęcie ataków egoistycznych i zidentyfikowano trzy: gęstość rozmieszczenia i położenie routerów oraz warstwa OSI...
-
Adsorption chiller in a combined heating and cooling system: simulation and optimization by neural networks
Publication -
Packet routing and frame length optimization in wireless mesh networks with multicast communications
Publication -
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publication -
Application ofMsplitestimation to determine control points displacements in networks with unstable reference system
Publication -
Comparison of Impedance-Source Networks for Two and Multilevel Buck–Boost Inverter Applications
Publicationmpedance-source networks are an increasingly popular solution in power converter applications, especially in single-stage buck-boost power conversion to avoid additional front-end dc-dc power converters. In the survey papers published, no analytical comparisons of different topologies have been described, which makes it difficult to choose the best option. Thus, the aim of this paper is to present a comprehensive analytical comparison...
-
New approach for determining the QoS of MP3-coded voice signals in IP networks
PublicationPresent-day IP transport platforms being what they are, it will never be possible to rule out conflicts between the available services. The logical consequence of this assertion is the inevitable conclusion that the quality of service (QoS) must always be quantifiable no matter what. This paper focuses on one method to determine QoS. It defines an innovative, simple model that can evaluate the QoS of MP3-coded voice data transported...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
The application of neural networks in forecasting the influence of traffic-induced vibrations on residential buildings
PublicationTraffic-induced vibrations may cause the cracking of plaster, damage to structural elements and, in extreme cases, may even lead to the structural collapse of residential buildings. The aim of this article is to analyse the effectiveness of a method of forecasting the impact of vibrations on residential buildings using the concept of artificial intelligence. The article presents several alternative forecasting systems for which...
-
Spatio-temporal filtering for determination of common mode error in regional GNSS networks
PublicationThe spatial correlation between different stations for individual components in the regional GNSS networks seems to be significant. The mismodelling in satellite orbits, the Earth orientation parameters (EOP), largescale atmospheric effects or satellite antenna phase centre corrections can all cause the regionally correlated errors. This kind of GPS time series errors are referred to as common mode errors (CMEs). They are usually...
-
Methods for physical impairment constrained routing with selected protection in all-optical networks
PublicationIn this paper, we investigate the problem of survivable all-optical routing in WDM networks with physical impairments. One of the recent key issues in survivable optical network design refers to maximization of the ratio of routeable demands while keeping the overall network cost low. In WDM networks, this goal can be achieved by routing as many demands in all-optical way as possible. Based on the latest technical trends driven...
-
A Novel Method for the Deblurring of Photogrammetric Images Using Conditional Generative Adversarial Networks
PublicationThe visual data acquisition from small unmanned aerial vehicles (UAVs) may encounter a situation in which blur appears on the images. Image blurring caused by camera motion during exposure significantly impacts the images interpretation quality and consequently the quality of photogrammetric products. On blurred images, it is difficult to visually locate ground control points, and the number of identified feature points decreases...
-
Supply current signal and artificial neural networks in the induction motor bearings diagnostics
PublicationThis paper contains research results of the diagnostics of induction motor bearings based on measurement of the supply current with usage of artificial neural networks. Bearing failure amount is greater than 40% of all engine failures, which makes their damage-free operation crucial. Tests were performed on motors with intentionally made bearings defects. Chapter 2 introduces the concept of artificial neural networks. It presents...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...