Search results for: NADES - Bridge of Knowledge

Search

Search results for: NADES

Search results for: NADES

  • WSN for intelligent street lighting system

    In this article authors propose to apply WSN to intelligent street lighting system. As a result of such a combination one obtains a system designed to increase functionality of light installations for a wide range of applications and introduce a platform for new additional services, which meets current and future user needs. The system is composed of WSN nodes integrated with light sources based on high power LED diodes, which...

  • Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks

    Publication

    - Year 2013

    The paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...

    Full text available to download

  • Complex Root Finding Algorithm Based on Delaunay Triangulation

    A simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...

    Full text available to download

  • Microstructure and corrosion behaviour of carbon steel and ferritic and austenitic stainless steels in NaCl solutions and the effect of p-nitrophenyl phosphate disodium salt

    Publication

    - International Journal of Electrochemical Science - Year 2016

    The microstructure and corrosion behavior of carbon steel (CSA516) and ferritic (SS410) and austenitic (SS304L) stainless steels were studied and compared. Corrosion tests were carried out in 0.5 M NaCl solutions. Rates of corrosion were monitored based on weight loss, Tafel extrapolation and linear polarization resistance (LPR) methods. Rates of corrosion were ranked following the order: CSA516 >> SS410 > SS304L. The impact of...

    Full text available to download

  • Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids

    Publication

    - Year 2016

    In this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...

    Full text to download in external service

  • Multi-agent systems registration and maintenance of address mapping without agent self-registation

    Monitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...

    Full text to download in external service

  • Visual Data Encryption for Privacy Enhancement in Surveillance Systems

    Publication

    In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...

    Full text to download in external service

  • TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH

    Due to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...

    Full text available to download

  • System Loss in UWB Off-Body Communications in a Ferry Environment

    Publication

    In this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Global Complex Roots and Poles Finding Algorithm Based on Phase Analysis for Propagation and Radiation Problems

    A flexible and effective algorithm for complex roots and poles finding is presented. A wide class of analytic functions can be analyzed, and any arbitrarily shaped search region can be considered. The method is very simple and intuitive. It is based on sampling a function at the nodes of a regular mesh, and on the analysis of the function phase. As a result, a set of candidate regions is created and then the roots/poles are verified...

    Full text available to download

  • Natural deep eutectic solvent based ultrasound assisted liquid-liquid micro-extraction method for methyl violet dye determination in contaminated river water

    Publication

    - Water Resources and Industry - Year 2023

    Simple and green natural deep eutectic solvent (NADES) based ultrasound assisted liquid-liquid micro-extraction (UA-LLME) method was developed for extraction and determination of methyl violet dye in contaminated river water samples using UV/Vis spectrophotometry. Choline chloride - decanoic acid based natural deep eutectic solvent was used for extraction. Important analytical parameters like pH, deep eutectic solvent volume/phase...

    Full text available to download

  • Exploiting multi-interface networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2010

    Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...

    Full text to download in external service

  • Settlement Networks in Polish Spatial Development Regional Plans

    In 1999, ten years after the great political changes in Poland, 16 self-governed regions (in Polish: voivodeship) were created. According to Polish law, voivodeship spatial development plans, or regional plans in short, determine basic elements of the settlement network. No detailed regulations indicate the specific elements of the settlement network or what features of these elements should be determined. For this reason, centres...

    Full text available to download

  • Gossiping by energy-constrained mobile agents in tree networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2021

    Every node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...

    Full text to download in external service

  • Daylight in Architecture 2022/23

    e-Learning Courses
    • N. Sokół
    • J. Martyniuk-Pęczek

    Tutor: Professor Claudia Naves David Amorim (University of Brasilia) Project: 60 h (lectures + online platform + individual consultations) With a support of e-platform NLITED educational content; http://lms.nlited.eu/,  Students will become familiar with the different methods of daylight assessment within the built environment. Innovative daylight design is understood as a better user-centred and energy-efficient design strategy. The...

  • Optimization of Execution Time under Power Consumption Constraints in a Heterogeneous Parallel System with GPUs and CPUs

    Publication

    The paper proposes an approach for parallelization of computations across a collection of clusters with heterogeneous nodes with both GPUs and CPUs. The proposed system partitions input data into chunks and assigns to par- ticular devices for processing using OpenCL kernels defined by the user. The sys- tem is able to minimize the execution time of the application while maintaining the power consumption of the utilized GPUs and...

    Full text to download in external service

  • Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm

    Publication

    In this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...

    Full text to download in external service

  • Tribological model of porous bearings with particular attention given to the lubricant lubricity

    Publication

    - Journal of KONBiN - Year 2011

    The friction and wear problems, accompanying all the tribological systems, lead to reduced service life. In order to prevent such situation, it is necessary to maintain fluid friction, which improves durability of all friction nodes in a tribological system. In the paper, the tribological system consists of porous bearings and the model deals with their weakest spots - the oil outflow points in the porous wall. A kinetic model...

    Full text available to download

  • ZARZADZANIE ORGANIZACJĄ TYPU SMART

    Publication

    Zaprezentowano organizacji, w której charakterystykę wpisano następujące cechy: strategiczne uwarunkowanie, maksymalną innowacyjność, atrakcyjność dla interesariuszy, rozwijanie osobowości pracowników oraz twórczość w działaniu. Te atrybuty, tworzą koncepcję organizacji SMART (akronim od pierwszych liter powyższych cech), która wyróżnia się dodatkowo strukturą opartą o dynamicznie kreowane zespoły oraz skutecznym wspomaganiem...

  • Zastosowanie modułu symulacji dynamicznej programu CAD w analizie układu napędowego elektronarzędzia

    Publication

    W referacie przedstawiono analizę mechanicznego układu przeniesienia napędu elektronarzędzia (wyrzynarki elektrycznej) przy zastosowaniu Modułu Symulacji Dynamicznej (MSD) programu Autodesk Inventor (AI). Opracowano modele 3D poszczególnych części elektronarzędzia i połączono je przy zachowaniu tzw. kinematyki odwrotnej. Przeprowadzono analizę wpływu poszczególnych węzłów kinetycznych na przebieg momentu na wale silnika elektrycznego....

    Full text available to download

  • Theory and implementation of a virtualisation level Future Internet defence in depth architecture

    Publication
    • J. Konorski
    • P. Pacyna
    • G. Kolaczek
    • Z. Kotulski
    • K. Cabaj
    • P. Szalachowski

    - International Journal of Trust Management in Computing and Communications - Year 2013

    An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...

    Full text to download in external service

  • Fast Calibration-Free Single-Anchor Indoor Localization Based on Limited Number of ESPAR Antenna Radiation Patterns

    Publication

    - Year 2023

    — In this article, we investigate how the calibrationfree single-anchor indoor localization algorithm developed for base stations equipped with electronically steerable parasitic array radiator (ESPAR) antennas can further be improved. By reducing the total number of ESPAR antenna radiation patterns used in localization process, one can significantly reduce the time needed for an object localization. Performed localization measurements...

    Full text to download in external service

  • Tryton Supercomputer Capabilities for Analysis of Massive Data Streams

    The recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...

    Full text available to download

  • Design of Resilient Vehicle-to-Infrastructure Systems

    Publication

    - Year 2020

    Vehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...

    Full text to download in external service

  • Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud

    Publication

    - Year 2020

    In a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...

    Full text to download in external service

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • How to meet when you forget: log-space rendezvous in arbitrary graphs

    Publication

    - DISTRIBUTED COMPUTING - Year 2011

    Two identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...

    Full text to download in external service

  • Processing of Satellite Data in the Cloud

    Publication

    The dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...

    Full text available to download

  • Literature review of user needs, toward user requirements

    Publication

    - Year 2020

    This report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...

    Full text to download in external service

  • Damage detection in plates based on Lamb wavefront shape reconstruction

    Publication

    - MEASUREMENT - Year 2021

    Many of the current studies in the area of damage detection using elastic wave propagation are based on deploying sensor networks with a large number of piezoelectric transducers to detect small-size cracks. A major limitation of these studies is that cracks are usually larger and have different shapes in real cases. Moreover, using a large number of sensing nodes for damage detection is both costly and computationally intensive....

    Full text available to download

  • RSS-Based DoA Estimation for ESPAR Antennas Using Support Vector Machine

    In this letter, it is shown how direction-of-arrival (DoA) estimation for electronically steerable parasitic array radiator (ESPAR) antennas, which are designed to be integrated within wireless sensor network nodes, can be improved by applying support vector classification approach to received signal strength (RSS) values recorded at an antenna's output port. The proposed method relies on ESPAR antenna's radiation patterns measured...

    Full text available to download

  • Disciplines and measures of information resilience

    Publication
    • J. Rak
    • M. Jonsson
    • D. Hutchison
    • J. Sterbenz

    - Year 2017

    Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...

    Full text to download in external service

  • The literature review on boundary conditions of use for non-residential buildings. Educational buildings.

    Publication

    - Year 2022

    This paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The studies were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, and Web of Science databases. The boundary conditions are understood as special characteristics for use and or precondition, determining specific features of...

    Full text to download in external service

  • Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems

    Publication

    - Year 2014

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...

    Full text to download in external service

  • Toward Human Chromosome Knowledge Engine

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2024

    Human chromosomes carry genetic information about our life. Chromosome classification is crucial for karyotype analysis. Existing chromosome classification methods do not take into account reasoning, such as: analyzing the relationship between variables, modeling uncertainty, and performing causal reasoning. In this paper, we introduce a knowledge engine for reasoning-based human chromosome classification that stores knowledge...

    Full text available to download

  • Does the coordinated development of two-way FDI increase the green energy efficiency of Chinese cities? Evidence from Chinese listed companies

    Publication

    - Year 2023

    Based on the evidence from listed company microdata and data from 285 cities in China, this paper studies the coordinated development of two-way FDI (CDFDI) in improving green energy efficiency (GEE). In particular, this paper examines the spatial heterogeneity effects of CDFDI on GEE. The results showed that CDFDI had a positive impact on the GEE of local and surrounding cities. Mechanistic examinations show that the effects...

    Full text to download in external service

  • A survey of strategies for communication networks to protect against large-scale natural disasters

    Publication
    • T. Gomes
    • J. Tapolcai
    • C. Esposito
    • D. Hutchison
    • F. Kuipers
    • J. Rak
    • D. Amaro
    • A. Iossifides
    • R. Travanca
    • J. Andre... and 8 others

    - Year 2016

    Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...

    Full text to download in external service

  • Bounds on the cover time of parallel rotor walks

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Full text available to download

  • A Centralized Reputation System for MANETs Based on Observed Path Performance

    Publication

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • Leader election for anonymous asynchronous agents in arbitrary networks

    Publication

    - DISTRIBUTED COMPUTING - Year 2014

    We consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...

    Full text available to download

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publication
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Year 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Full text to download in external service

  • 3D Imaging Of Underwater Objects Using Multi-Beam Data

    Publication

    One of the main applications of multibeam sonars is high resolution bathymetry measurement, as well as detecting and imaging of underwater objects like shipwrecks. In order to obtain the visualisation quality good enough to allow the researcher to investigate an object in more detail, the approach relying on construction of three-dimensional model of an imaged object, e.g. consisting of nodes, edges and plane elements (facets)...

    Full text available to download

  • A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache

    The paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...

    Full text available to download

  • Boundary conditions for non-residential buildings from the user’s perspective: literature review

    Publication

    - ENERGY AND BUILDINGS - Year 2022

    Background and objective: This paper aims to review the boundary conditions (B/C) in specific categories (energy, building use, and lighting) within non-residential buildings to pave the way to a better understanding of users’ requirements and needs of the built environment. For this paper, B/C are understood as unique preconditions, specific characteristics for use, determining specific features of buildings, enabling an accurate...

    Full text available to download

  • The literature review on boundary conditions of use for non-residential buildings

    Publication

    - Year 2022

    This paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The reviews were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, Web of Science databases. The boundary conditions understood as special characteristics for use and or precondition, determining specific features of buildings...

    Full text to download in external service

  • Od Safony do Sibylli : o twórczości kobiet, które miały odwagę zmieniać świat

    Publication

    - Year 2015

    "From Sappho to Sibylla. About the women’s research and literary output preserved in the PAS Gdańsk Library early printed books collection (15th-18th c.)" The main purpose of this study was to present women’s research and literary output preserved in the early printed books collection (15th-18th c.) of the PAS Gdańsk Library (PAN Biblioteka Gdańska). The author mentions the phenomenon of women writing and participation in the...

  • The realization of ASON/GMPLS control plane

    Publication

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...

  • Time versus space trade-offs for randezvous in trees

    Publication

    - DISTRIBUTED COMPUTING - Year 2014

    Two identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...

    Full text to download in external service

  • Sésame, ouvre-toi: internationalisme phraséologique à contenu universel

    Publication

    - Studia Linguistica - Year 2023

    Phraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....

    Full text available to download