displaying 1000 best results Help
Search results for: NADES
-
WSN for intelligent street lighting system
PublicationIn this article authors propose to apply WSN to intelligent street lighting system. As a result of such a combination one obtains a system designed to increase functionality of light installations for a wide range of applications and introduce a platform for new additional services, which meets current and future user needs. The system is composed of WSN nodes integrated with light sources based on high power LED diodes, which...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Complex Root Finding Algorithm Based on Delaunay Triangulation
PublicationA simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...
-
Microstructure and corrosion behaviour of carbon steel and ferritic and austenitic stainless steels in NaCl solutions and the effect of p-nitrophenyl phosphate disodium salt
PublicationThe microstructure and corrosion behavior of carbon steel (CSA516) and ferritic (SS410) and austenitic (SS304L) stainless steels were studied and compared. Corrosion tests were carried out in 0.5 M NaCl solutions. Rates of corrosion were monitored based on weight loss, Tafel extrapolation and linear polarization resistance (LPR) methods. Rates of corrosion were ranked following the order: CSA516 >> SS410 > SS304L. The impact of...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
System Loss in UWB Off-Body Communications in a Ferry Environment
PublicationIn this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Global Complex Roots and Poles Finding Algorithm Based on Phase Analysis for Propagation and Radiation Problems
PublicationA flexible and effective algorithm for complex roots and poles finding is presented. A wide class of analytic functions can be analyzed, and any arbitrarily shaped search region can be considered. The method is very simple and intuitive. It is based on sampling a function at the nodes of a regular mesh, and on the analysis of the function phase. As a result, a set of candidate regions is created and then the roots/poles are verified...
-
Natural deep eutectic solvent based ultrasound assisted liquid-liquid micro-extraction method for methyl violet dye determination in contaminated river water
PublicationSimple and green natural deep eutectic solvent (NADES) based ultrasound assisted liquid-liquid micro-extraction (UA-LLME) method was developed for extraction and determination of methyl violet dye in contaminated river water samples using UV/Vis spectrophotometry. Choline chloride - decanoic acid based natural deep eutectic solvent was used for extraction. Important analytical parameters like pH, deep eutectic solvent volume/phase...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Settlement Networks in Polish Spatial Development Regional Plans
PublicationIn 1999, ten years after the great political changes in Poland, 16 self-governed regions (in Polish: voivodeship) were created. According to Polish law, voivodeship spatial development plans, or regional plans in short, determine basic elements of the settlement network. No detailed regulations indicate the specific elements of the settlement network or what features of these elements should be determined. For this reason, centres...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Daylight in Architecture 2022/23
e-Learning CoursesTutor: Professor Claudia Naves David Amorim (University of Brasilia) Project: 60 h (lectures + online platform + individual consultations) With a support of e-platform NLITED educational content; http://lms.nlited.eu/, Students will become familiar with the different methods of daylight assessment within the built environment. Innovative daylight design is understood as a better user-centred and energy-efficient design strategy. The...
-
Optimization of Execution Time under Power Consumption Constraints in a Heterogeneous Parallel System with GPUs and CPUs
PublicationThe paper proposes an approach for parallelization of computations across a collection of clusters with heterogeneous nodes with both GPUs and CPUs. The proposed system partitions input data into chunks and assigns to par- ticular devices for processing using OpenCL kernels defined by the user. The sys- tem is able to minimize the execution time of the application while maintaining the power consumption of the utilized GPUs and...
-
Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm
PublicationIn this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...
-
Tribological model of porous bearings with particular attention given to the lubricant lubricity
PublicationThe friction and wear problems, accompanying all the tribological systems, lead to reduced service life. In order to prevent such situation, it is necessary to maintain fluid friction, which improves durability of all friction nodes in a tribological system. In the paper, the tribological system consists of porous bearings and the model deals with their weakest spots - the oil outflow points in the porous wall. A kinetic model...
-
ZARZADZANIE ORGANIZACJĄ TYPU SMART
PublicationZaprezentowano organizacji, w której charakterystykę wpisano następujące cechy: strategiczne uwarunkowanie, maksymalną innowacyjność, atrakcyjność dla interesariuszy, rozwijanie osobowości pracowników oraz twórczość w działaniu. Te atrybuty, tworzą koncepcję organizacji SMART (akronim od pierwszych liter powyższych cech), która wyróżnia się dodatkowo strukturą opartą o dynamicznie kreowane zespoły oraz skutecznym wspomaganiem...
-
Zastosowanie modułu symulacji dynamicznej programu CAD w analizie układu napędowego elektronarzędzia
PublicationW referacie przedstawiono analizę mechanicznego układu przeniesienia napędu elektronarzędzia (wyrzynarki elektrycznej) przy zastosowaniu Modułu Symulacji Dynamicznej (MSD) programu Autodesk Inventor (AI). Opracowano modele 3D poszczególnych części elektronarzędzia i połączono je przy zachowaniu tzw. kinematyki odwrotnej. Przeprowadzono analizę wpływu poszczególnych węzłów kinetycznych na przebieg momentu na wale silnika elektrycznego....
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Fast Calibration-Free Single-Anchor Indoor Localization Based on Limited Number of ESPAR Antenna Radiation Patterns
Publication— In this article, we investigate how the calibrationfree single-anchor indoor localization algorithm developed for base stations equipped with electronically steerable parasitic array radiator (ESPAR) antennas can further be improved. By reducing the total number of ESPAR antenna radiation patterns used in localization process, one can significantly reduce the time needed for an object localization. Performed localization measurements...
-
Tryton Supercomputer Capabilities for Analysis of Massive Data Streams
PublicationThe recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublicationVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublicationIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Processing of Satellite Data in the Cloud
PublicationThe dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...
-
Literature review of user needs, toward user requirements
PublicationThis report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...
-
Damage detection in plates based on Lamb wavefront shape reconstruction
PublicationMany of the current studies in the area of damage detection using elastic wave propagation are based on deploying sensor networks with a large number of piezoelectric transducers to detect small-size cracks. A major limitation of these studies is that cracks are usually larger and have different shapes in real cases. Moreover, using a large number of sensing nodes for damage detection is both costly and computationally intensive....
-
RSS-Based DoA Estimation for ESPAR Antennas Using Support Vector Machine
PublicationIn this letter, it is shown how direction-of-arrival (DoA) estimation for electronically steerable parasitic array radiator (ESPAR) antennas, which are designed to be integrated within wireless sensor network nodes, can be improved by applying support vector classification approach to received signal strength (RSS) values recorded at an antenna's output port. The proposed method relies on ESPAR antenna's radiation patterns measured...
-
Disciplines and measures of information resilience
PublicationCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
The literature review on boundary conditions of use for non-residential buildings. Educational buildings.
PublicationThis paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The studies were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, and Web of Science databases. The boundary conditions are understood as special characteristics for use and or precondition, determining specific features of...
-
Dynamic Data Management Among Multiple Databases for Optimization of Parallel Computations in Heterogeneous HPC Systems
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Toward Human Chromosome Knowledge Engine
PublicationHuman chromosomes carry genetic information about our life. Chromosome classification is crucial for karyotype analysis. Existing chromosome classification methods do not take into account reasoning, such as: analyzing the relationship between variables, modeling uncertainty, and performing causal reasoning. In this paper, we introduce a knowledge engine for reasoning-based human chromosome classification that stores knowledge...
-
Does the coordinated development of two-way FDI increase the green energy efficiency of Chinese cities? Evidence from Chinese listed companies
PublicationBased on the evidence from listed company microdata and data from 285 cities in China, this paper studies the coordinated development of two-way FDI (CDFDI) in improving green energy efficiency (GEE). In particular, this paper examines the spatial heterogeneity effects of CDFDI on GEE. The results showed that CDFDI had a positive impact on the GEE of local and surrounding cities. Mechanistic examinations show that the effects...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublicationRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublicationA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublicationWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
3D Imaging Of Underwater Objects Using Multi-Beam Data
PublicationOne of the main applications of multibeam sonars is high resolution bathymetry measurement, as well as detecting and imaging of underwater objects like shipwrecks. In order to obtain the visualisation quality good enough to allow the researcher to investigate an object in more detail, the approach relying on construction of three-dimensional model of an imaged object, e.g. consisting of nodes, edges and plane elements (facets)...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
Boundary conditions for non-residential buildings from the user’s perspective: literature review
PublicationBackground and objective: This paper aims to review the boundary conditions (B/C) in specific categories (energy, building use, and lighting) within non-residential buildings to pave the way to a better understanding of users’ requirements and needs of the built environment. For this paper, B/C are understood as unique preconditions, specific characteristics for use, determining specific features of buildings, enabling an accurate...
-
The literature review on boundary conditions of use for non-residential buildings
PublicationThis paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The reviews were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, Web of Science databases. The boundary conditions understood as special characteristics for use and or precondition, determining specific features of buildings...
-
Od Safony do Sibylli : o twórczości kobiet, które miały odwagę zmieniać świat
Publication"From Sappho to Sibylla. About the women’s research and literary output preserved in the PAS Gdańsk Library early printed books collection (15th-18th c.)" The main purpose of this study was to present women’s research and literary output preserved in the early printed books collection (15th-18th c.) of the PAS Gdańsk Library (PAN Biblioteka Gdańska). The author mentions the phenomenon of women writing and participation in the...
-
The realization of ASON/GMPLS control plane
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
Time versus space trade-offs for randezvous in trees
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...
-
Sésame, ouvre-toi: internationalisme phraséologique à contenu universel
PublicationPhraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....