displaying 1000 best results Help
Search results for: FRAGRANCE NOTES
-
Project Team Management Supported by an Agent-Based Model
PublicationThis work is a continuation of a series of works about research into the use of multi-agent systems to support IT project management. Previous studies have shown the possibility of using a multi-agent in order to optimize management decisions concerning the selection of methods for project implementation. It was noted that the project manager's decisions are influenced by three fundamental parameters: the entropy of the project,...
-
Perspektywy wykorzystania olfaktometrii i elektronicznego nosa w badaniach stanu środowiska
PublicationIn environmental state investigations the two approaches are dominate: field olfactometry and instrumental methods. In contradiction to classical chromatographic methods, both field olfactometry and electronic nose (e-nose) in based on the analysis of the aroma as a whole, without separating gaseous mixture (air) to individual aromatic compounds. With respect to simplicity of use and relatively short time of analysis, both systems...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
The validation process of truss model with joint eccentricities
PublicationNowadays, due to the technological reasons in modern lightweight steel trusses, fabricated from cold-formed sections, positive eccentricities appear in the truss nodes, to induce additional forces truss chords. In order to account for the real load-carrying capacity of truss node area the steel structure research was conducted in scale 1:1. As a result of experimental research, the forms of deformation and strains of the walls...
-
Reconstruction of 3D image of corona discharge streamer
PublicationIn this paper, the method of reconstruction of the 3D structure of streamers in DC positive corona discharge in nozzle-to-plate electrode configuration is presented. For reconstructing of 3D image of corona discharge streamer we propose a stereographical method, where streamers are observed from several directions simultaneously. The multi-directional observation enabled to obtain fine positional coordinates of streamers for a...
-
Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring
PublicationOne of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...
-
Collision-Free Network Exploration
PublicationA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Rendezvous of Distance-Aware Mobile Agents in Unknown Graphs
PublicationWe study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size...
-
Assessment of Thermal Stresses in Asphalt Mixtures at Low Temperatures Using the Tensile Creep Test and the Bending Beam Creep Test
PublicationThermal stresses are leading factors that influence low-temperature cracking behavior of asphalt pavements. During winter, when the temperature drops to significantly low values, tensile thermal stresses develop as a result of pavement contraction. Creep test methods can be suitable for the assessment of low-temperature properties of asphalt mixtures. To evaluate the influence of creep test methods on the obtained low-temperature...
-
Distributed Evacuation in Graphs with Multiple Exits
PublicationWe consider the problem of efficient evacuation using multiple exits. We formulate this problem as a discrete problem on graphs where mobile agents located in distinct nodes of a given graph must quickly reach one of multiple possible exit nodes, while avoiding congestion and bottlenecks. Each node of the graph has the capacity of holding at most one agent at each time step. Thus, the agents must choose their movements strategy...
-
Stationary underwater channel experiment: Acoustic measurements and characteristics in the Bornholm area for model validations
PublicationThe underwater acoustical channel is time-variant, and even on small time scales there is often existing no ‘acoustical frozen ocean’. Popular is the use of WSSUS-channel transmission modeling (Wide-Sense Stationary Uncorrelated Scattering) for the stochastic description of bandpass signals in GSM mobile phones with moving participants; since this results in a halved number of model parameters. For underwater sound applications...
-
Long Distance Geographically Distributed InfiniBand Based Computing
PublicationCollaboration between multiple computing centres, referred as federated computing is becom- ing important pillar of High Performance Computing (HPC) and will be one of its key components in the future. To test technical possibilities of future collaboration using 100 Gb optic fiber link (Connection was 900 km in length with 9 ms RTT time) we prepared two scenarios of operation. In the first one, Interdisciplinary Centre for Mathematical...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Possibilities of Leachate Co-Treatment Originating from Biogas Production in the Deammonification Process
PublicationIn the methane fermentation process, sewage sludge is the single substrate or serves as a co-substrate with the addition of various waste products. After the treatment stable digestate is obtained, which consists of two phases solid and liquid. Liquid phase, called as a leachate, due to the high content of nutrients must be treated before they are discharged into the final receiver. Physical and chemical methods of leachate treatment...
-
Trendy w e-usługach
PublicationW artykule przedstawiono trendy w sektorze e-biznesu pokazujące perspektywy zmian w usługach. Zwrócono uwagę jak zmienia się podejście do samego procesu usługi, jak zmienia się sposób świadczenia samej usługi. Autor przedstawia trendy nie tylko związane z zastosowaniem nowoczesnych technologii, ale również związane z otwieraniem nowych segmentów rynku jakimi są np. społeczności. W wyniku analizy przytoczonych przykładów wykorzystania...
-
New Approach to Noncasual Identification of Nonstationary Stochastic FIR Systems Subject to Both Smooth and Abrupt Parameter Changes
PublicationIn this technical note, we consider the problem of finite-interval parameter smoothing for a class of nonstationary linear stochastic systems subject to both smooth and abrupt parameter changes. The proposed parallel estimation scheme combines the estimates yielded by several exponentially weighted basis function algorithms. The resulting smoother automatically adjusts its smoothing bandwidth to the type and rate of nonstationarity...
-
Deterministic Rendezvous in Restricted Graphs
PublicationIn this paper we consider the problem of synchronous rendezvous in which two anonymous mobile entities (robots) A and B are expected to meet at the same time and point in a graph G = (V;E). Most of the work devoted to rendezvous in graphs assumes that robots have access to the same sets of nodes and edges, where the topology of connections may be initially known or unknown. In our work we assume the movement of robots is restricted...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublicationThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Tool Wear Prediction in Single-Sided Lapping Process
PublicationSingle-sided lapping is one of the most effective planarization technologies. The process has relatively complex kinematics and it is determined by a number of inputs parameters. It has been noted that prediction of the tool wear during the process is critical for product quality control. To determine the profile wear of the lapping plate, a computer model which simulates abrasive grains trajectories was developed in MATLAB. Moreover,...
-
Developing a Low SNR Resistant, Text Independent Speaker Recognition System for Intercom Solutions - A Case Study
PublicationThis article presents a case study on the development of a biometric voice verification system for an intercom solution, utilizing the DeepSpeaker neural network architecture. Despite the variety of solutions available in the literature, there is a noted lack of evaluations for "text-independent" systems under real conditions and with varying distances between the speaker and the microphone. This article aims to bridge this gap....
-
Residual current devices in electric vehicles charging installations
PublicationThe main requirements of national regulations and international standards regarding protection against electric shock in electric vehicle charging installations are presented. The principles of using residual current devices (RCDs) in such installations are discussed. It is pointed out that RCDs are mandatory equipment for safe charging of electric vehicles. It is noted that the standards require the use of RCDs having an appropriate...
-
Calculation of an ultimate load value of a silo with geometric imperfections in the shape of eigenforms
PublicationThe ultimate load value of a silo with initial geometric imperfections was measured. The structure was loaded with wind. Imperfections were assumed as translations of the shell nodes from perfect geometry taken from eigenforms and their combinations. Two variants of the maximum deflection placement with respect to the direction of wind pressure were proposed. The first consists in applying the maximum wind pressure to the element...
-
Modelowanie kratownicy z kształtowników giętych na zimno z mimośrodami dodatnimi w węźle = Modelling of truss with cold-formed section and positive eccentricyty in the node.
PublicationThe topic of this research is establishing load-carrying capacity of compressed and tensed chords of trusses made of cold-formed open cross-sections. Occurrence of bending in the truss’ chord is the result of specific production technology assumed by the designer and producer of lattice girder’s systems. The aim of this research is to present methodology of conduct while creating numerical models that best depict the behaviour...
-
Reliability Modeling for SPMD and DAC Applications in MERPSYS
PublicationIn this chapter we shall see a method for modeling of reliability of application execution in the MERPSYS system, and the results of reliability simulation of the same SPMD and DAC application which we have previously presented in this book. Unlike energy usage modeling and modeling of execution efficiency we could not compare the reliability model and simulation results to real experiment just because the experiment would last too...
-
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublicationIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
On the convergence of a finite-difference discretization à la Mickens of the generalized Burgers–Huxley equation
PublicationIn this note, we establish the property of convergence for a finite-difference discretization of a diffusive partial differential equation with generalized Burgers convective law and generalized Hodgkin–Huxley reaction. The numerical method was previously investigated in the literature and, amongst other features of interest, it is a fast and nonlinear technique that is capable of preserving positivity, boundedness and monotonicity....
-
Microbiota-derived metabolites in colorectal cancer patients in preoperative period
PublicationShort-chain fat-ty acids (SCFAs) are microbial derived metabo-lites, which have multiple beneficial properties. The amount of SCFAs depends on several fac-tors, such as age, diet (mainly intake of dietary fiber), and overall health condition. The normal proportion between SCFAs is 3:1:1 for acetate, proprionate and butyrate, respectively. In col-orectal cancer (CRC) patients, microbiota alter-ations have been shown. Consequently,...
-
Dziwaczne i osobliwe. Zjawiska wokół książki Marka Fishera
PublicationIn my review, I discuss the Polish translation of Mark Fisher’s The weird and the eerie, published by Słowo/obraz terytoria. Originally released in December 2016, Fisher’s collection of thirteen essays explores cul-tural texts by figures like Howard P. Lovecraft, David Lynch and Joy Division. Fisher employs a theoretical framework heavily influenced by post-Lacanian, post-Derridean and Deleuzean concepts. The translation, of...
-
Effect of cooking on the contents of glucosinolates and their degradation products in selected Brassica vegetables
PublicationChanges in the levels of glucosinolates and their degradation products in selected Brassica vegetables due to the cooking process were investigated. The purple cauliflower was found to be the best source of aliphatic and indole glucosinolates, and it was also abundant in compounds such as sinigrin, glucoraphanin and glucobrassicin. As a result of cooking rutabaga, green cauliflower and purple cauliflower, a significant decrease...
-
Complex Root Finding Algorithm Based on Delaunay Triangulation
PublicationA simple and flexible algorithm for finding zeros of a complex function is presented. An arbitrary-shaped search region can be considered and a very wide class of functions can be analyzed, including those containing singular points or even branch cuts. The proposed technique is based on sampling the function at nodes of a regular or a self-adaptive mesh and on the analysis of the function sign changes. As a result, a set of candidate points...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
WSN for intelligent street lighting system
PublicationIn this article authors propose to apply WSN to intelligent street lighting system. As a result of such a combination one obtains a system designed to increase functionality of light installations for a wide range of applications and introduce a platform for new additional services, which meets current and future user needs. The system is composed of WSN nodes integrated with light sources based on high power LED diodes, which...
-
Effect of conventional cooking on changes in the contents of basic composition and glucosinolates in kale
PublicationBrassica vegetables have been strongly recommended as part of human diet because of its high content of bioactive sulphur compounds, eg glucosinolates. The nutrient and health promoting compounds in kale are significantly affected by traditional cooking. The study investigated changes in the levels of dry mass, ash, fat, total protein, dietary fibre as well as total and individual glucosinolates in the kale due to the traditional...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublicationMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
System Loss in UWB Off-Body Communications in a Ferry Environment
PublicationIn this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...
-
Global Complex Roots and Poles Finding Algorithm Based on Phase Analysis for Propagation and Radiation Problems
PublicationA flexible and effective algorithm for complex roots and poles finding is presented. A wide class of analytic functions can be analyzed, and any arbitrarily shaped search region can be considered. The method is very simple and intuitive. It is based on sampling a function at the nodes of a regular mesh, and on the analysis of the function phase. As a result, a set of candidate regions is created and then the roots/poles are verified...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Automatic detection and correction of detuned singing system for use with query-by-humming applications
PublicationThe aim of the paper is to present an idea of using the automatic detection and correction of detuned singing as a subsystem in query-by-humming (QBH) applications. The common approach to searching for a requested song basing on the melody retrieved from hummed pattern usually employs the so-called Parsons code or melody contour. In such a case information about sound pitch is discarded. It was thought out that an additional module...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Tribological model of porous bearings with particular attention given to the lubricant lubricity
PublicationThe friction and wear problems, accompanying all the tribological systems, lead to reduced service life. In order to prevent such situation, it is necessary to maintain fluid friction, which improves durability of all friction nodes in a tribological system. In the paper, the tribological system consists of porous bearings and the model deals with their weakest spots - the oil outflow points in the porous wall. A kinetic model...
-
Optimization of Execution Time under Power Consumption Constraints in a Heterogeneous Parallel System with GPUs and CPUs
PublicationThe paper proposes an approach for parallelization of computations across a collection of clusters with heterogeneous nodes with both GPUs and CPUs. The proposed system partitions input data into chunks and assigns to par- ticular devices for processing using OpenCL kernels defined by the user. The sys- tem is able to minimize the execution time of the application while maintaining the power consumption of the utilized GPUs and...
-
Euro 2012 in Gdańsk, Poland. Is it worth using public funds?
PublicationThe aim of this study is to estimate the willingness - to - pay (WTP) among the community of the Pomeranian region, Poland in connection with intangible benefits and costs st emming from hosting the Euro 2012 in Gdansk. A survey conducted among 407 respondents was the source of information. The results of the study show that the average value of WTP benefit for the whole sample was 45,72 PLN2012 and WTP cost...
-
A new division of bacterial UvrA homologues
PublicationThe UvrA protein is a DNA-binding and damage-recognition enzyme which participates in the prokaryotic type nucleotide excision repair (NER) pathway. It has recently been noted that some bacterial genomes comprise additional uvrA genes which encode five distinct types of UvrA homologue. We investigated the sequences of over 2400 bacterial genomes and found 130 examples of bacteria containing uvrA 2 genes. The sequence analyses conducted...
-
Influence of Wood Moisture on Strength and Elastic Modulus for Pine and Fir Wood Subjected to 4-point Bending Tests
PublicationThe main purpose of this research paper was to determine the influence of the wood moisture on the strength and elastic modulus of pine and fir wood specimens subjected to the 4-point bending tests. Six bending tests for each wood species and for two different moisture level have been performed. Then, the advanced statistical analysis of the results has been carried out. On the basis of the obtained results, it has been noted that...
-
Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm
PublicationIn this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...
-
Analytical chemistry with biosolvents
PublicationOne of the current trends in green analytical chemistry is the introduction of green solvents, some of which are biobased. At the same time, the development of the biorefinery concept has allowed more biochemicals to be obtained with increased efficiency and from a wider range of feedstocks. The first examples of the use of biosolvents in analytical applications included extractions performed with alcohols, esters, and terpenes....