Search results for: ,MULTICAST
-
Analysis and simulation of the reliable multicast protocol.
PublicationArtykuł przedstawia badania dotyczące protokołu grupowego porządkowania wiadomości-RMP. Opisana została podstawowa idea algorytmów działania protokołu oraz jego najważniejsze własności. Ponadto został on zimplementowany jako część symulatora protokołów komunikacji grupowej. Wyniki badań i dogłębna analiza mechanizmów działania protokołu pozwoliła na wprowadzenie szeregu modyfikacji w stosunku do oryginalnej specyfikacji,...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Rearrangeability in multicast Clos networks is NP-complete
PublicationPrzestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...
-
Ordered multicast protocol based on credited virtual acknowledgment
PublicationPrzedstawiono protokół rozgłaszania dla sieci pakietowych oparty na statystycznym przewidywaniu ruchu aplikacji. Pokazano, że wydajność protokołu zbliżona jest do optymalnej w klasie wykorzystującej potwierdzenia wirtualne.
-
Anonymous agreed order multicast: performance and free riding
PublicationPrzedstawiono protokół rozgłaszania wiadomości dla sieci lokalnych z usługą 1C, zapewniający całkowite uporządkowanie wiadomości przy zachowaniu anonimowości stacji. Wykorzystywane są raporty zawierające grafy częściowego uporządkowania wiadomości, otrzymywane na podstawie kolejności odbioru i wnioskowania o bezpośrednim następstwie par wiadomości. Wskazano, że kolektywna odpowiedzialność za utrzymanie stałego rytmu raportów sprzyja...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
Towards the boundary between easy and hard control problems in multicast Clos networks
PublicationIn this article we study 3-stage Clos networks with multicast calls in general and 2-cast calls, in particular. We investigate various sizes of input and output switches and discuss some routing problems involved in blocking states. To express our results in a formal way we introduce a model of hypergraph edge-coloring. A new class of bipartite hypergraphs corresponding to Clos networks is studied. We identify some polynomially...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Packet routing and frame length optimization in wireless mesh networks with multicast communications
Publication -
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publication -
A system for multitask noisy speech enhancement.
PublicationW artykule przedstawiono ogolną charakterystyke opracowanego systemu rejestracji i rekonstrukcji mowy. Artykuł zawiera opis składników systemu, ktory jest oprogramowaniem zawierającym zaawansowane narzędzia służące poprawie zrozumiałości mowy. Zaimplementowane narzędzia systemu umożliwiają wyszukiwanie nagrań dźwiękowych i ich obróbkę przy pomocy zaimplementowanych pluginów. W artykule przedstawione wykorzystane w systemie algorytmy...
-
Multitask Noisy Speech Enhancement System
PublicationW referacie opisano Wielozadaniowy System Poprawy Jakości Sygnału Mowy. Jest to wyspecjalizowany pakiet oprogramowania przeznaczony do rejestrowania sygnału mowy i do poprawy jego jakości oraz zrozumiałości mowy, przy użyciu zaawansowanych procedur cyfrowego przetwarzania sygnału. Pakiet oprogramowania składa się z programów: Rejestrator, Przeglądarka oraz Rekonstruktor. Oprogramowanie to może być użyte w przypadkach, gdy zrozumiałość...
-
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Publication -
Numerical Simulation of Duplex Steel Multipass Welding
Publication -
Performance Analysis of Multicast Video Streaming in IEEE 802.11 b/g/n Testbed Environment
PublicationThe aim of the work is to analyse capabilities and limitations of different IEEE 802.11 technologies (IEEE 802.11 b/g/n), utilized for both multicast and unicast video streaming transmissions directed to mobile devices. Our preliminary research showed that results obtained with currently popular simulation tools can be drastically different than these possible in real-world environment, so, in order to correctly evaluate performance...
-
Multicast Traffic Throughput Maximization through Dynamic Modulation and Coding Scheme Assignment in Wireless Sensor Networks
Publication -
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
DYNWIR S-70 program for modal analysis of multisupported and multimass rotors
PublicationThe article provides a brief description of the program Dynwir-S-70 (currently being developed in the Rotor Dynamics and Slide Bearings Department in the Institute of Fluid-Flow Machinery Polish Academy of Sciences in Gdansk) which is a program for analysis of multi-supported and multi-mass rotors. Used algorithms and the construction of mass and stiffness matrix were presented. Damping matrix structure based on Rayleigh damping...
-
Deep Learning-Based, Multiclass Approach to Cancer Classification on Liquid Biopsy Data
PublicationThe field of cancer diagnostics has been revolutionized by liquid biopsies, which offer a bridge between laboratory research and clinical settings. These tests are less invasive than traditional biopsies and more convenient than routine imaging methods. Liquid biopsies allow studying of tumor-derived markers in bodily fluids, enabling the development of more precise cancer diagnostic tests for screening, disease monitoring, and...
-
Deep Learning-Based, Multiclass Approach to Cancer Classification on Liquid Biopsy Data
Publication -
Integracja międzywarstwowa protokołów RM-AODV Multicast DNS i IPv6 Neighbor Discovery w środowisku sieci standardu IEEE 802.11s
PublicationWraz z rozwojem bezprzewodowych technik transmisyjnych oraz wzrostem liczby i zasobów urządzeń mobilnych, wzrasta również popularność sieci bezprzewodowe o architekturze mesh, które znajdują rozliczne zastosowania w systemach dostępowych i dystrybucyjnych. W artykule przedstawiono krótką analizę efektywności działania protokołów IPv6 Neighbor Discovery oraz Multicast DNS w środowisku sieci IEEE 802.11s oraz propozycję metody jej...
-
Multicast Traffic Throughput Maximization through Joint Dynamic Modulation and Coding Schemes Assignment, and Transmission Power Control in Wireless Sensor Networks
Publication -
Effect of water salinity on properties of multipass underwater wet manual metal arc welded joints
PublicationThe weldability of steel under the water is limited due to the influence of the environment. Water causes limited visibility, presence of the residual stresses, increasing the cooling rate, and increasing the diffusible hydrogen content in deposited metal, leading to the formation of brittle microstructures in heat-affected zone (HAZ). The paper presents the results of mechanical properties testing of S420G2+M steel welded joints...
-
Improving platelet‐RNA‐based diagnostics: a comparative analysis of machine learning models for cancer detection and multiclass classification
PublicationLiquid biopsy demonstrates excellent potential in patient management by providing a minimally invasive and cost-effective approach to detecting and monitoring cancer, even at its early stages. Due to the complexity of liquid biopsy data, machine-learning techniques are increasingly gaining attention in sample analysis, especially for multidimensional data such as RNA expression profiles. Yet, there is no agreement in the community...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Rearrangeable clos networks C(n,r_1,n^2-1,n,r_2) with certain restrictions for connections
PublicationW pracy została zaproponowana nowa metoda sprawdzania przestrajalności pól Closa dla połączeń jeden do wiele. W rozważaniach zakładamy grupowanie połączeń.In the article we will propose new method of checking rearrangeability of multicast Clos networks. In the literature there is no precise method for checking rearrangeability. We focused on three-stage Clos networks without any constraints about fan-out capability. We show the...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Ochrona usług masowej dystrybucji multimediów z wykorzystaniem metod fingercastingu
PublicationW rozdziale przedstawione zostały problemy ochrony usług masowej dystrybucji treści multimedialnych w sieciach komputerowych przed kopiowaniem i nielegalnym rozpowszechnianiem multimediów, z wykorzystaniem metod fingerprintingu, a w szczególności podgrupy tych metod - metod fingercastingu. W odróżnieniu od innych metod fingerprintingu, metody fingercastingu wykorzystują połączenia grupowe (ang. multicast), co prowadzi do znacznego...
-
Recognizing emotions on the basis of keystroke dynamics
PublicationThe article describes a research on recognizing emotional states on the basis of keystroke dynamics. An overview of various studies and applications of emotion recognition based on data coming from keyboard is presented. Then, the idea of an experiment is presented, i.e. the way of collecting and labeling training data, extracting features and finally training classifiers. Different classification approaches are proposed to be...
-
Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
PublicationPopularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...
-
Improving Effectiveness of SVM Classifier for Large Scale Data
PublicationThe paper presents our approach to SVM implementation in parallel environment. We describe how classification learning and prediction phases were pararellised. We also propose a method for limiting the number of necessary computations during classifier construction. Our method, named one-vs-near, is an extension of typical one-vs-all approach that is used for binary classifiers to work with multiclass problems. We perform experiments...
-
Two Stage SVM and kNN Text Documents Classifier
PublicationThe paper presents an approach to the large scale text documents classification problem in parallel environments. A two stage classifier is proposed, based on a combination of k-nearest neighbors and support vector machines classification methods. The details of the classifier and the parallelisation of classification, learning and prediction phases are described. The classifier makes use of our method named one-vs-near. It is...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
Evolutionary Algorithms in MPLS network designing
PublicationMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Adaptive Sampling for Non-intrusive Reduced Order Models Using Multi-Task Variance
PublicationNon-intrusive reduced order modeling methods (ROMs) have become increasingly popular for science and engineering applications such as predicting the field-based solutions for aerodynamic flows. A large sample size is, however, required to train the models for global accuracy. In this paper, a novel adaptive sampling strategy is introduced for these models that uses field-based uncertainty as a sampling metric. The strategy uses...
-
Gesture Recognition With the Linear Optical Sensor and Recurrent Neural Networks
PublicationIn this paper, the optical linear sensor, a representative of low-resolution sensors, was investigated in the multiclass recognition of near-field hand gestures. The recurrent neural network (RNN) with a gated recurrent unit (GRU) memory cell was utilized as a gestures classifier. A set of 27 gestures was collected from a group of volunteers. The 27 000 sequences obtained were divided into training, validation, and test subsets....
-
Comparative Analysis of Text Representation Methods Using Classification
PublicationIn our work, we review and empirically evaluate five different raw methods of text representation that allow automatic processing of Wikipedia articles. The main contribution of the article—evaluation of approaches to text representation for machine learning tasks—indicates that the text representation is fundamental for achieving good categorization results. The analysis of the representation methods creates a baseline that cannot...
-
Józef Woźniak prof. dr hab. inż.
PeopleProfessor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...
-
NetBaltic System-Heterogenous Wireless Network for Maritime Communications
PublicationIn case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...
-
Computer controlled systems - 2022/2023
e-Learning Coursesmateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
CCS-lecture-2023-2024
e-Learning Coursesmateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...