displaying 1000 best results Help
Search results for: NADES
-
Runtime Visualization of Application Progress and Monitoring of a GPU-enabled Parallel Environment
PublicationThe paper presents design, implementation and real life uses of a visualization subsystem for a distributed framework for parallelization of workflow-based computations among clusters with nodes that feature both CPUs and GPUs. Firstly, the proposed system presents a graphical view of the infrastructure with clusters, nodes and compute devices along with parameters and runtime graphs of load, memory available, fan speeds etc. Secondly,...
-
KernelHive: a new workflow-based framework for multilevel high performance computing using clusters and workstations with CPUs and GPUs
PublicationThe paper presents a new open-source framework called KernelHive for multilevel parallelization of computations among various clusters, cluster nodes, and finally, among both CPUs and GPUs for a particular application. An application is modeled as an acyclic directed graph with a possibility to run nodes in parallel and automatic expansion of nodes (called node unrolling) depending on the number of computation units available....
-
Identyfikacja trajektorii obiektów dynamicznych w przestrzeni kartezjańskiej na podstawie informacji z wielu estymatorów stanu
PublicationW rozprawie przedstawiono metodologię umożliwiającą implementację rozproszonego asynchronicznego systemu wyznaczania trajektorii. System tego typu jest złożony ze zbioru tzw. węzłów (estymatorów lokalnych), które komunikują się ze sobą. Każdy węzeł wyznacza trajektorię obserwowanego obiektu/procesu na podstawie dwóch zbiorów danych. Pierwszym zbiorem są pomiary dostarczane przez skojarzone z danym...
-
Data Partitioning and Task Management in the Clustered Server Layer of the Volunteer-based Computation System
PublicationWhile the typical volunteer-based distributed computing system focus on the computing performance, the Comcute system was designed especially to keep alive in the emergency situations. This means that designers had to take into account not only performance, but the safety of calculations as well. Quadruple-layered architecture was proposed to separate the untrusted components from the core of the system. The main layer (W) consists...
-
A note on total reinforcement in graphs
PublicationIn this note we prove a conjecture and inprove some results presendet in a recent paper of N. Sridharan, M.D. Elias, V.S.A. Subramanian, Total reinforcement number of a graph, AKCE Int. J. Graphs Comb. 4 (2) (2007) 197-202.
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids
PublicationSmart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....
-
Collaborative Delivery by Energy-Sharing Low-Power Mobile Robots
PublicationWe study two variants of delivery problems for mobile robots sharing energy. Each mobile robot can store at any given moment at most two units of energy, and whenever two robots are at the same location, they can transfer energy between each other, respecting the maximum capacity. The robots operate in a simple graph and initially each robot has two units of energy. A single edge traversal by an robot reduces its energy by one...
-
Reliability model of the crankshaft-piston assembly
PublicationThe laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublicationThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
A Review of Antennas for Indoor Positioning Systems
PublicationThis paper provides a review of antennas applied for indoor positioning or localization systems. The desired requirements of thoseantennas when integrated in anchor nodes (reference nodes) are discussed, according to different localization techniques and theirperformance. The described antennas will be subdivided into the following sections according to the nature of measurements:received signal strength (RSS), time of flight (ToF),...
-
An additional ultrasonographic sign of Hashimoto’s lymphocytic thyroiditis in children
PublicationWe present an additional sonographic sign of Hashimoto’s thyroiditis (HLT), increasing the specifi city of this method in pediatric populations. Methods: A total of 98 children (mean age 12.7 years, range 7–17 years) were selected from the registry of the endocrinology outpatient department. All subjects met the diagnostic criteria for HLT. All children underwent a prospective thyroid ultrasound examination with special attention...
-
RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns
PublicationIn this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublicationMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Total restrained bondage in graphs
PublicationPodzbiór D zbioru wierzchołków grafu nazywamy zewnętrznie totalnym dominującym w grafie, jeśli każdy wierzchołek spoza D ma sąsiada zarówno w D jak i poza D. Moc najmniejszego zbioru o tej własności nazywamy liczbą dominowania zewnętrznie totalnego. W artykule badamy wpływ usuwania krawędzi na liczbę dominowania zewnętrznie totalnego, czyli liczbę zewnętrznego totalnego zniewolenie w grafach.
-
Asynchronous distributed state estimation for continuous-time stochastic processes
PublicationWe consider the problem of state estimation of a continuous-time stochastic process using an asynchronous distributed multi-sensor estimation system (ADES). In an ADES the state of a process of interest is estimated by a group of local estimators. Each local estimator based, for example, on a Kalman filter, performs single sensor filtration but also fusion of its local results and results from other (remote) processors to compute...
-
Modeling of truss with cold-formed section and positive eccentricity in the node
PublicationThis work is dedicated to establishing the load carrying capacity of tensed and compressed truss’ nodes made of cold-formed open cross sections. The occurrence of bending in the truss’ nodes is the result of a specific production technology for system lattice girders assumed by the designer and the producer. The aim of this research is to present the methodology of conduct for creation of computational models that best depict the...
-
Investigation of antifungal and antibacterial potential of green extracts of propolis
PublicationPropolis extracts have been used in traditional medicines since ages due to its advantageous complex chemical composition. However, the antibacterial and antifungal activity of poplar propolis extracts prepared in Natural Deep Eutectic Solvent (NADES) are seldom studied. This study investigates suitable alternate for ethanol as a solvent for extraction for Polish poplar propolis. It also attempts to identify suitable extraction...
-
Sarcoidosis of lymph nodes - Female, 68 - Tissue image [10040729541201131]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Sarcoidosis of lymph nodes - Female, 58 - Tissue image [9160729581051441]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Sarcoidosis of lymph nodes - Female, 68 - Tissue image [10040729541202841]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Sarcoidosis of lymph nodes - Male, 27 - Tissue image [9130729571772841]
Open Research DataThis is the histopathological image of HEMATOPOIETIC AND RETICULOENDOTHELIAL SYSTEMS tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Sarcoidosis of lymph nodes - Female, 58 - Tissue image [9160729581053831]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Te use of acoustic emission for assessment of the oil lubricity in a four-ball tester
Publicationin view of the increased dynamic and temperature load in the compression-ignition engine tribological systems, particular attention is drawn to the problem of such lubrication of the friction nodes that after breaking the boundary layer it could be restored without any wear occurring. therefore, an idea has been devised of introducing to friction nodes, with the lubrication oils, of new substances (operational preparations) modifying...
-
Standing Waves in One-Dimensional Resonator Contaning an Ideal Isothermal Gas Affected by the Constant Mass Force
PublicationThe study is devoted to standing acoustic waves in one-dimensional planar resonator which containing an ideal gas. A gas is affected by the constant mass force. Two types of physically justified boundary conditions are considered: zero velocity or zero excess pressure at both boundaries. The variety of nodal and antinodal points is determined. The conclusion is that the nodes of pressure and antinodes of velocity do not longer...
-
Drawing maps with advice
PublicationW pracy podejmujemy temat konstrukcji algorytmu dla agenta, który zostaje umieszczony w dowolnym wierzchołku grafu (wierzchołki są nierozróżnialne, krawędzie mają etykiety portów), po czym realizuje algorytm zmierzający do znalezienia drzewa spinającego grafu lub izomorficznej kopii grafu. Dla obu problemów podajemy asymptotycznie dokładne lub prawie dokładne oszacowania na ilość bitów dodatkowej informacji, którą agent musi otrzymać...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Reconstruction of 3D structure of positive corona streamer by local methods
PublicationThe computer algorithms were used for reconstruction of streamer 3D structure. We propose the 3D tree structure model of corona discharge streamer composed with nodes and edges between chosen couples of nodes, which enables easy computation of some important parameters ofstreamers. The 3D model can be derived directly from two projection images by global methods like evolutionary searching or particle simulations. In this paper...
-
A ROLE PLAYING GAME NAME GENERATOR LEARNING ITS CREATIVITY FROM ARKADIA MUD PLAYERS
PublicationThe paper proposes an approach to creative generation of new names for the purposes of Role Playing Games in fantasy realms. The generator based on an existing database of na mes is able to propose a set of new names with regard to demanded attributes, such as: length of the name, sex and race of the character, a given p hrase as the origin for the generated name as well as subjective evaluations from former users. The software...
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015165371]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015167201]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015165701]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015167871]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015169451]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015162401]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015169681]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015169751]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015168931]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015166001]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [8020729577656011]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 68 - Tissue image [6280729578147931]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015167401]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.