Filters
total: 3462
filtered: 286
Search results for: NADES
-
The Symmetry of GPS Orbit Ascending Nodes
Publication -
Remote DHCPv6 autoconfiguration for mobile IPv6 nodes
PublicationPrzedstawiono ideę przełączania międzydomenowego węzłów wspierających protokół IPv6, z wykorzystaniem procedur stanowej (statefull) z użyciem serwerów autokonfiguracji DHCPv6. Dokonano analizy czasu trwania procesów przełączania w warstwach: drugiej i trzeciej. Zaproponowano zmodyfikowaną metodę autokonfiguracji węzła, pozwalającą na wyeliminowanie przerwy w transmisji związanej z wykrywaniem zduplikowanych adresów (Duplicate Address...
-
Self-Organizing Wireless Nodes Monitoring Network
PublicationThe concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.
-
The transfer of names in various translations of brothers Grimm’s "Rumpelstilzchen"
PublicationVarious scholars point out the transfer of proper nouns as a difficulty. This paper examines the transfer of names in twenty‑one translations of the Grimm Brothers’ fairy tale originally titled Rumpelstilzchen. The article analyses English,Brazilian Portuguese, Polish, Turkish, and Japanese editions of this originally German story. The analysis focuses on the true name of a title dwarf and other names provided by the Queen....
-
Lossless Compression of Binary Trees with Correlated Vertex Names
PublicationCompression schemes for advanced data structures have become the challenge of today. Information theory has traditionally dealt with conventional data such as text, image, or video. In contrast, most data available today is multitype and context-dependent. To meet this challenge, we have recently initiated a systematic study of advanced data structures such as unlabeled graphs [1]. In this paper, we continue this program by considering...
-
Pemphigus foliaceus in a patient with skin cancer with metastases to lymph nodes
Publication -
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publication -
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublicationThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
Solvent Screening for Solubility Enhancement of Theophylline in Neat, Binary and Ternary NADES Solvents: New Measurements and Ensemble Machine Learning
PublicationTheophylline, a typical representative of active pharmaceutical ingredients, was selected to study the characteristics of experimental and theoretical solubility measured at 25 °C in a broad range of solvents, including neat, binary mixtures and ternary natural deep eutectics (NADES) prepared with choline chloride, polyols and water. There was a strong synergistic effect of organic solvents mixed with water, and among the experimentally...
-
Quality control of cheese samples for the presence of natamycin preservative – A natural deep eutectic solvent (NADES) based extraction coupled with HPLC
PublicationA new protocol for the determination of natamycin – an antifungal agent used as a food preservative - in cheese samples – is described. This new method is based on a natural deep eutectic solvent (NADES) green extraction procedure. High-performance liquid chromatography (HPLC) was used for detection and quantification. NADESs with different molar ratios were evaluated for efficient and selective extraction. NADES made of thymol...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publication. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions
PublicationAbility to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...
-
Using trust management model for detection of faulty nodes in Wireless Sensor Networks
Publication -
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublicationDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...
-
The application of magnetic fluids in sealing nodes designed for operation in difficult conditions and in machines used in sea environment
PublicationPresented in article MF seals are being researched for sea technology purposes due to their excellenttightness and low resistance of motion. These features are most valuable for ring propellers and ship'smain propeller shaft. There are more reasons why technologists payf significant attention for various MFseals applications in their difficult operating conditions. For instance, an advanced pumping systemsare designed with contactless...
-
The application of magnetic fluids in sealing nodes designed for operation in difficult conditions and in machines used in sea environment
PublicationPresented in article MF seals are being researched for sea technology purposes due to their excellent tightness and low resistance of motion. These features are most valuable for ring propellers and ship's main propeller shaft. There are more reasons why technologists payf significant attention for various MFseals applications in their difficult operating conditions. For instance, an advanced pumping systems are designed with contactless...
-
Person Tracking in Ultra-Wide Band Hybrid Localization System Using Reduced Number of Reference Nodes
PublicationIn this article a novel method of positional data integration in an indoor hybrid localization system combining inertial navigation with radio distance measurements is presented. A point of interest is the situation when the positional data and the radio distance measurements are obtained from less than thee reference nodes and it is impossible to unambiguously localize the moving person due to undetermined set of positional equations....
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublicationArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Accurate PPCC-Based DoA Estimation Using Multiple Calibration Planes for WSN Nodes Equipped with ESPAR Antennas
PublicationIn this paper, we have introduced a new direction-of-arrival (DoA) estimation method, which relies on received signal strength (RSS) values measured at the output port of electronically steerable parasitic array radiator (ESPAR) antenna and uses the power pattern cross-correlation (PPCC) estimator. In the method, we have successfully incorporated measurements of ESPAR antenna's radiation patterns performed at multiple calibration...
-
Molecular Heterogeneity of Papillary Thyroid Cancer: Comparison of Primary Tumors and Synchronous Metastases in Regional Lymph Nodes by Mass Spectrometry Imaging
Publication -
BRCA1 Loss Preexisting in Small Subpopulations of Prostate Cancer Is Associated with Advanced Disease and Metastatic Spread to Lymph Nodes and Peripheral Blood
Publication -
Influence of nodes with positive eccentricity on load-carrying capasity of truss' top chords in trusses made of welded cold-formed members.
PublicationIn order to establish the influence of eccentric crossing of truss members on the load-carrying capacity of the folded chord of a hat-section truss, a research model was created and preliminary numerical analysis of the truss was performed with the use of Marc Mentat programme. Distorial instability of crossheads caused by deviation of loose (unmounted) channel section web’s bends was observed. Due to the slenderness of the section’s...
-
Inverse Nonlinear Eigenvalue Problem Framework for the Synthesis of Coupled-Resonator Filters With Nonresonant Nodes and Arbitrary Frequency-Variant Reactive Couplings
PublicationA novel, general circuit-level description of coupledresonator microwave filters is introduced in this article. Unlike well-established coupling-matrix models based on frequency-invariant couplings or linear frequency-variant couplings (LFVCs), a model with arbitrary reactive frequencyvariant coupling (AFVC) networks is proposed. The engineered formulation is more general than prior-art ones—with the only restriction that the coupling...
-
Architecture of ecumenical spaces in public buildings in the 21st century: Links among the architecture of multi-faith spaces, their names, and the functions they serve in Polish airports
PublicationThis study explores the architecture and arrangement of prayer spaces in public buildings. It examines whether Polish airports have prayers spaces and whether a correlation exists between the name (e.g., “multi-faith space,” “place of prayer,” and “place of focus”) and design. The study is supported by analyses of ecumenical spaces, which have recently been brought into service andwhere a visible symbiosis exists between their...
-
Investigation of use of hydrophilic/hydrophobic NADESs for selective extraction of As(III) and Sb(III) ions in vegetable samples: Air assisted liquid phase microextraction and chemometric optimization
PublicationIn this paper, a green, cost-effective sample preparation method based on air assisted liquid phase microextraction (AA-LPME) was developed for the simultaneous extraction of As(III) and Sb(III) ions from vegetable samples using hydrophilic/hydrophobic natural deep eutectic solvents (NADESs). Central composite design was used for the optimization of extraction factors including NADES volume, extraction cycle, pH, and curcumin concentration....
-
Selectivity Tuning by Natural Deep Eutectic Solvents (NADESs) for Extraction of Bioactive Compounds from Cytinus hypocistis—Studies of Antioxidative, Enzyme-Inhibitive Properties and LC-MS Profiles
PublicationIn the present study, the extracts of Cytinus hypocistis (L.) L using both traditional solvents (hexane, ethyl acetate, dichloromethane, ethanol, ethanol/water, and water) and natural deep eutectic solvents (NADESs) were investigated in terms of their total polyphenolic contents and antioxidant and enzyme-inhibitive properties. The extracts were found to possess total phenolic and total flavonoid contents in the ranges of 26.47–186.13...
-
Effect of choline chloride based natural deep eutectic solvents on aqueous solubility and thermodynamic properties of acetaminophen
PublicationIn this work, natural deep eutectic solvents (NADESs) containing choline chloride as hydrogen bond acceptor and 1,2-propanediol, malic acid and tartaric acid as hydrogen bond donors have been synthesized and applied to enhance the aqueous solubility of model sparingly water-soluble drug – acetaminophen. The results indicate that the greatest impact on the solubility of acetaminophen have deep eutectic solvents based on 1,2-propanediol...
-
Natural Deep Eutectic Solvents as Agents for Improving Solubility, Stability and Delivery of Curcumin
PublicationPurpose Study on curcumin dissolved in natural deep eutectic solvents (NADES) was aimed at exploiting their beneficial properties as drug carriers. Methods The concentration of dissolved curcumin in NADES was measured. Simulated gastrointestinal fluids were used to determine the concentration of curcumin and quantum chemistry computations were performed for clarifying the origin of curcumin solubility enhancement in NADES. Results NADES...
-
NATURAL DEEP EUTECTIC SOLVENTS IN EXTRACTION PROCESS
PublicationDeveloping new, eco-friendly solvents which would meet technological and economic demands is perhaps the most popular aspects of Green Chemistry. Natural deep eutectic solvents (NADES) fully meet green chemistry principles. These solvents offer many advantages including biodegradability, low toxicity, sustainability, low costs and simple preparation. This paper provides an overview of knowledge regarding NADES with special emphasis...
-
2-outer-independent domination in graphs
PublicationWe initiate the study of 2-outer-independent domination in graphs. A 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)\D has at least two neighbors in D, and the set V(G)\D is independent. The 2-outer-independent domination number of a graph G is the minimum cardinality of a 2-outer-independent dominating set of G. We show that if a graph has minimum degree at least two,...
-
Some Progress on Total Bondage in Graphs
PublicationThe total bondage number b_t(G) of a graph G with no isolated vertex is the cardinality of a smallest set of edges E'⊆E(G) for which (1) G−E' has no isolated vertex, and (2) γ_t(G−E')>γ_t(G). We improve some results on the total bondage number of a graph and give a constructive characterization of a certain class of trees achieving the upper bound on the total bondage number.
-
Techno‐economic evaluation of a natural deep eutectic solvent‐based biorefinery: Exploring different design scenarios
PublicationThis paper presents a comprehensive techno‐economic evaluation of an integrated natural deep eutectic solvent (NADES)‐based biorefinery – a 1 ton day−1 capacity design plant. The key parameters include payback period, net present value (NPV), and internal rate of return (IRR). These were compared with the parameters of conventional biorefineries. The ‘n th plant’ results clearly revealed that the single product‐based biorefinery...
-
Solubility advantage of sulfanilamide and sulfacetamide in natural deep eutectic systems: experimental and theoretical investigations
PublicationObjective: The aim of this study was to explore the possibility of using natural deep eutectic solvents (NADES) as solvation media for enhancement of solubility of sulfonamides, as well as gaining some thermodynamic characteristics of the analyzed systems. Significance: Low solubility of many active pharmaceutical ingredients is a well-recognized difficulty in pharmaceutical industry, hence the need for different strategies addressing...
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublicationIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Polychlorinated biphenyls (PCBs) and polychlorodibenzo-p-dioxins (PCDDs) determination in disposable baby diapers with the application of natural deep eutectic solvent
PublicationIn this work a new method involving solvent extraction of porous membrane-packed solid samples (SE-PMSS) coupled to gas chromatography-mass spectrometry (GC–MS) has been developed for the determination of six polychlorinated biphenyls (PCBs) and five polychlorodibenzo-p-dioxines (PCDDs) in disposable baby diapers. In that aim, a terpenoid-based natural deep eutectic solvent (NADES) composed of carvone and camphor in a 1:1 M ratio...
-
Runtime Visualization of Application Progress and Monitoring of a GPU-enabled Parallel Environment
PublicationThe paper presents design, implementation and real life uses of a visualization subsystem for a distributed framework for parallelization of workflow-based computations among clusters with nodes that feature both CPUs and GPUs. Firstly, the proposed system presents a graphical view of the infrastructure with clusters, nodes and compute devices along with parameters and runtime graphs of load, memory available, fan speeds etc. Secondly,...
-
KernelHive: a new workflow-based framework for multilevel high performance computing using clusters and workstations with CPUs and GPUs
PublicationThe paper presents a new open-source framework called KernelHive for multilevel parallelization of computations among various clusters, cluster nodes, and finally, among both CPUs and GPUs for a particular application. An application is modeled as an acyclic directed graph with a possibility to run nodes in parallel and automatic expansion of nodes (called node unrolling) depending on the number of computation units available....
-
Identyfikacja trajektorii obiektów dynamicznych w przestrzeni kartezjańskiej na podstawie informacji z wielu estymatorów stanu
PublicationW rozprawie przedstawiono metodologię umożliwiającą implementację rozproszonego asynchronicznego systemu wyznaczania trajektorii. System tego typu jest złożony ze zbioru tzw. węzłów (estymatorów lokalnych), które komunikują się ze sobą. Każdy węzeł wyznacza trajektorię obserwowanego obiektu/procesu na podstawie dwóch zbiorów danych. Pierwszym zbiorem są pomiary dostarczane przez skojarzone z danym...
-
Data Partitioning and Task Management in the Clustered Server Layer of the Volunteer-based Computation System
PublicationWhile the typical volunteer-based distributed computing system focus on the computing performance, the Comcute system was designed especially to keep alive in the emergency situations. This means that designers had to take into account not only performance, but the safety of calculations as well. Quadruple-layered architecture was proposed to separate the untrusted components from the core of the system. The main layer (W) consists...
-
A note on total reinforcement in graphs
PublicationIn this note we prove a conjecture and inprove some results presendet in a recent paper of N. Sridharan, M.D. Elias, V.S.A. Subramanian, Total reinforcement number of a graph, AKCE Int. J. Graphs Comb. 4 (2) (2007) 197-202.
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...