Search results for: COIN NETWORK - Bridge of Knowledge

Search

Search results for: COIN NETWORK

Search results for: COIN NETWORK

  • A Simple Neural Network for Collision Detection of Collaborative Robots

    Publication

    Due to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...

    Full text available to download

  • A Survey of Vehicular Network Systems for Road Traffic Management

    Publication

    In this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...

    Full text available to download

  • How to Sort Them? A Network for LEGO Bricks Classification

    Publication

    LEGO bricks are highly popular due to the ability to build almost any type of creation. This is possible thanks to availability of multiple shapes and colors of the bricks. For the smooth build process the bricks need to properly sorted and arranged. In our work we aim at creating an automated LEGO bricks sorter. With over 3700 different LEGO parts bricks classification has to be done with deep neural networks. The question arises...

    Full text available to download

  • Neural network training with limited precision and asymmetric exponent

    Publication

    Along with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...

    Full text available to download

  • Neural Network Subgraphs Correlation with Trained Model Accuracy

    Publication

    - Year 2020

    Neural Architecture Search (NAS) is a computationally demanding process of finding optimal neural network architecture for a given task. Conceptually, NAS comprises applying a search strategy on a predefined search space accompanied by a performance evaluation method. The design of search space alone is expected to substantially impact NAS efficiency. We consider neural networks as graphs and find a correlation between the presence...

    Full text to download in external service

  • HISTORY OF INITIAL ENERGY AND WATER NETWORK DEVELOPMENT IN QATAR

    Qatar: A country which had to be associated with neighboring countries like UAE or Saudi Arabia for people to know about it, stands proud today due to the ample production and exporting of Black Gold. A country with almost no vegetation or suitable weather to harvest crops, turned from being heavily dependent on trading Pearls to exporting natural oil and gas to all over the globe. The paper outlines in details the history of the...

    Full text available to download

  • Injury Prediction Models for Onshore Road Network Development

    Integrating different modes of transport (road, rail, air and water) is important for port cities. To accommodate this need, new transport hubs must be built such as airports or sea ports. If ports are to grow, they must be accessible, a feature which is best achieved by building new roads, including fast roads. Poland must develop a network of fast roads that will provide good access to ports. What is equally important is to upgrade...

    Full text available to download

  • The Central European GNSS Research Network (CEGRN) dataset

    Publication
    • J. Zurutuza
    • A. Caporali
    • M. Bertocco
    • M. Ishchenko
    • O. Khoda
    • H. Steffen
    • M. Figurski
    • E. Parseliunas
    • S. Berk
    • G. Nykiel

    - Data in Brief - Year 2019

    The Central European GNSS Research Network (CEGRN) collects GNSS data since 1994 from contributors which today include 42 Institutions in 33 Countries. CEGRN returns a dataset of coordinates and velocities computed according to international standards and the most recent processing procedures and recommendations. We provide a dataset of 1229 positions and velocities resulting from 3 or more repetitions of coordinate measurements...

    Full text available to download

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Digital Audio Broadcasting or Webcasting: A Network Quality Perspective

    In recent years, many alternative technologies of delivering audio content have emerged, with different advantages and disadvantages. In this paper pros and cons of digital audio broadcasting and webcasting transmission techniques in a network quality perspective are described. A case study of user expectations with respect to currently available services is analyzed, and the perceived quality of real digital broadcasted and webcasted...

    Full text available to download

  • Neural network agents trained by declarative programming tutors

    Publication

    This paper presents an experimental study on the development of a neural network-based agent, trained using data generated using declarative programming. The focus of the study is the application of various agents to solve the classic logic task – The Wumpus World. The paper evaluates the effectiveness of neural-based agents across different map configurations, offering a comparative analysis to underline the strengths and limitations...

    Full text to download in external service

  • Cryptographic Protocols' Performance and Network Layer Security of RSMAD

    Publication

    W artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...

    Full text to download in external service

  • Network effects—do they matter for digital technologies diffusion?

    Purpose The main research target of this paper is to capture the network effects using the case of mobile cellular telephony, identified in European telecommunication markets, and its determinants enhancing the process of digital technologies diffusion. Design/methodology/approach This research relies on panel and dynamic panel regression analysis. The empirical sample covers 30 European countries, and the period for the analysis...

    Full text to download in external service

  • Pathological brain network activity: memory impairment in epilepsy

    Publication

    - NEUROLOGY - Year 2013

    Our thinking, memory and cognition in general, relies upon precisely timed interactions among neurons forming brain networks that support cognitive processes. The surgical evaluation of drug-resistant epilepsy using intracranial electrodes provides a unique opportunity to record directly from human brain and to investigate the coordinated activity of cognitive networks. In this issue of Neurology®, Kleen and colleagues1 implicate...

    Full text to download in external service

  • Investigation of continuous wave jamming in an IEEE 802.15.4 network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text to download in external service

  • Analysis of the reliability 0f any-hop star network.

    Publication

    - Year 2004

    Założono, że sieć ma wielostopniową strukturę gwiaździstą. Jako oceny niezawodności tych sieci przyjęto: 1) średnią liczbę sprawnych par węzłów, które mogą komunikować się wzajemnie; 2)średnią liczbę sprawnych par węzłów, które mogą komunikować się poprzez węzeł centralny; 3) średnią liczbę sprawnych par węzłów, które mogą komunikować się z węzłem centralnym; 4) prawdopodobieństwo zdarzenia, że sprawne węzły mogą komunikować się...

  • Comparative study of methods for artificial neural network training.

    Publication

    Przedstawiono wyniki badań porównawczych następujących metod uczenia sieci neuronowych: propagacji wstecznej błędów, rekursywnej metody najmniejszych kwadratów, metody Zangwill'a i algorytmów ewolucyjnych. Badania dotyczyły projektowania adaptacyjnego regulatora neuronowego napięcia generatora synchronicznego.

  • Research on protection mechanisms of Resilient Packet Ring Network.

    Publication

    Paper describes iSteering - a new method to control traffic in case of RPR network failure. There's comparison of packet wrapping, steering and our proposed method iSteering, which can be used in case of transmitter/receiver or fiber failure. Numerical analysis for even and random traffic flow has been made in order to compare packet wrapping, steering and iSteering. The results of all the tests are included.

  • Research on protection mechanisms of Resilient Packet Ring Network.

    Publication

    .

  • Technological logistics HL as a factor in distribution network effectivness

    Publication

    - Year 2005

    Przedstawiono podział kompetencyjny logistyki i wskazano na znaczenie logistyki technicznej HL (HardLogistics). Jako przykład wpływu logistyki HL na efektywność ekonomiczną systemu dystrybucji zamieszczono wyniki symulacji wyniku eksploatacji pojazdów samochodowych o różnym wyposażeniu w urządzenia przeładunkowe.

  • Neural network breast cancer relapse time prognosis

    Publication

    - Year 2006

    Przedstawiono architekturę i wyniki testowania sztucznej sieci neuronowej w prognozowaniu czasu nawrotu choroby u kobiet chorych na raka piersi. Sieć neuronowa uczona była na danych zgromadzonych przez 20 lat. Dane opisują grupę 439 pacjentów za pomocą 40 parametrów. Spośród tych parametrów wybrano 6 najistotniejszych: liczbę przerzutowych węzłów chłonnych, wielkość guza, wiek, skalę według Blooma oraz stan receptorów estrogenowych...

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Protection in elastic optical networks

    Publication
    • R. Goścień
    • K. Walkowiak
    • M. Klinkowski
    • J. Rak

    - IEEE NETWORK - Year 2015

    In this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....

    Full text to download in external service

  • Resilient Routing in Communication Networks

    Publication

    - Year 2015

    This important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...

    Full text to download in external service

  • Design and modeling of reliable networks

    Publication
    • J. Rak
    • B. Jaumard
    • R. Wessaely

    - TELECOMMUNICATION SYSTEMS - Year 2014

    -

    Full text available to download

  • Comments on "Decomposition of Permutation Networks"

    Publication

    - IEEE TRANSACTIONS ON COMPUTERS - Year 1982

    Full text to download in external service

  • Scanning networks with cactus topology

    Publication
    • Ł. Wrona

    - Year 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • VNFs reconfiguration in 5G networks

    Publication

    - Year 2022

    Full text to download in external service

  • Fair Optimization and Networks: A Survey

    Publication

    - Journal of Applied Mathematics - Year 2014

    Full text to download in external service

  • Graph models of clos networks

    Publication

    - Year 2007

    ...

  • The reliability of tree and star networks

    This paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.

    Full text to download in external service

  • Connectivity in Multi-Interface Networks

    Publication

    - Year 2009

    Rozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla problemu najtańszej spójnej podsieci spinającej.

    Full text to download in external service

  • Monitoring objects over networks

    Publication

    W pracy rozważa się uniwersalny pomysł na monitorowanie obiektów przemysłowych, firmowych i prywatnych, z inteligentnymi budynkami włšcznie. Rozmaite zadania diagnostyczne, sterownicze i zarzšdcze łatwo mogš być zintegrowane w taki projekt. Współczesne narzędzia technologii informacyjnych (IT) mogš być spożytkowane w celu stworzenia kompletnych i efektywnych systemów realizujšcych takie zadania. Oparłszy się na wysokich technologiach...

  • Neuromorphic Binarized Polariton Networks

    Publication
    • R. Mirek
    • A. Opala
    • P. Comaron
    • M. Furman
    • M. Król
    • K. Tyszka
    • B. Seredyński
    • D. Ballarini
    • D. Sanvitto
    • T. Liew... and 5 others

    - NANO LETTERS - Year 2021

    Full text to download in external service

  • Reliable Networks Design and Modeling

    Publication

    Słowo wstępne numeru specjalnego czasopisma Telecommunication Systems Journal

    Full text available to download

  • Neural networks and deep learning

    Publication

    - Year 2022

    In this chapter we will provide the general and fundamental background related to Neural Networks and Deep Learning techniques. Specifically, we divide the fundamentals of deep learning in three parts, the first one introduces Deep Feed Forward Networks and the main training algorithms in the context of optimization. The second part covers Convolutional Neural Networks (CNN) and discusses their main advantages and shortcomings...

    Full text to download in external service

  • Multistage optical switching networks

    Ewolucja sieci szkieletowej w kierunku sieci DWDM o dużych szybkościach generuje nowe problemy dla kontynuacji. Ten element funkcjonalny musi także być oparty na technologii optycznej. Dla dużych pojemności nie może on być zrealizowany jako pojedynczy komutator, lecz jako wielosekcyjne pole komutacyjne. W artykule opisano trzy typy komutatorów: komutator światłowodów(FX), komutator długości fal (WSX) i komutator z konwersją długości...

    Full text available to download

  • Survivability issues in multilayer networks

    Publication

    - Year 2005

    W artykule rozważa się zagadnienia zabezpieczenia i odtwarzania w wielowarstwowych architekturach sieciowych w celu osiągnięcia określonego poziomu przeżywalności po awarii węzła lub łącza. Problem optymalizacji polega na znalezieniu dla każdej optycznej ścieżki aktywnej, przenoszącej dany strumień IP, węzłowo-rozłącznej optycznej ścieżki zabezpieczającej w taki sposób, by awaria pojedyńczego węzła lub łącza spowodowana atakiem...

  • EUROPEAN CYTOKINE NETWORK

    Journals

    ISSN: 1148-5493 , eISSN: 1952-4005

  • JOURNAL OF HIGH SPEED NETWORKS

    Journals

    ISSN: 0926-6801 , eISSN: 1875-8940

  • International Journal of Sensor Networks

    Journals

    ISSN: 1748-1279 , eISSN: 1748-1287

  • Journal of Computer Networks and Communications

    Journals

    ISSN: 2090-7141 , eISSN: 2090-715X

  • International Journal of Neural Networks

    Journals

    ISSN: 2249-2763

  • International Journal of Security and Networks

    Journals

    ISSN: 1747-8405

  • IEEE TRANSACTIONS ON NEURAL NETWORKS

    Journals

    ISSN: 1045-9227

  • Sustainable Energy Grids & Networks

    Journals

    ISSN: 2352-4677

  • ACM Transactions on Sensor Networks

    Journals

    ISSN: 1550-4859 , eISSN: 1550-4867

  • Journal of Communications and Information Networks

    Journals

    ISSN: 2096-1081 , eISSN: 2509-3312