Filtry
wszystkich: 795
wybranych: 714
Wyniki wyszukiwania dla: computer networks
-
Industrial computer networks and functional safety
PublikacjaW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublikacjaA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Knowledge management in the IPv6 migration process
PublikacjaThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most obvious. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed an application that supports the migration process. Its main purpose is to help less experienced network administrators to facilitate the migration process with a particular target...
-
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publikacja -
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublikacjaRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
The reliability of tree and star networks.
PublikacjaOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Deep learning approach on surface EEG based Brain Computer Interface
PublikacjaIn this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublikacjaIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublikacjaThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks
PublikacjaA method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublikacjaComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublikacjaRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
A review on computer‐aided chemogenomics and drug repositioning for rational COVID ‐19 drug discovery
PublikacjaApplication of materials capable of energy harvesting to increase the efficiency and environmental adaptability is sometimes reflected in the ability of discovery of some traces in an environment―either experimentally or computationally―to enlarge practical application window. The emergence of computational methods, particularly computer-aided drug discovery (CADD), provides ample opportunities for the rapid discovery and development...
-
Computer-assisted pronunciation training—Speech synthesis is almost all you need
PublikacjaThe research community has long studied computer-assisted pronunciation training (CAPT) methods in non-native speech. Researchers focused on studying various model architectures, such as Bayesian networks and deep learning methods, as well as on the analysis of different representations of the speech signal. Despite significant progress in recent years, existing CAPT methods are not able to detect pronunciation errors with high...
-
Towards neural knowledge DNA
PublikacjaIn this paper, we propose the Neural Knowledge DNA, a framework that tailors the ideas underlying the success of neural networks to the scope of knowledge representation. Knowledge representation is a fundamental field that dedicates to representing information about the world in a form that computer systems can utilize to solve complex tasks. The proposed Neural Knowledge DNA is designed to support discovering, storing, reusing,...
-
More Just Measure of Fairness for Sharing Network Resources
PublikacjaA more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...
-
Radio Simulcasting at a Glance: a New Look at Broadcasting and Streaming Services
PublikacjaRadio is by far one of the most popular and accessible medium. With its availability it attracts listeners all around the world. There are numerous ways of delivering content to consumers. The present situation is characterized by the convergence of acoustics, computer science and telecommunications. This paper reviews the current status of radio broadcasting and streaming services. It describes a subjective study concerning different...
-
Diagnosis of damages in family buildings using neural networks
PublikacjaThe article concerns a problem of damages in family buildings, which result from traffic-induced vibrations. These vibrations arise from various causes and their size is influenced by many factors. The most important is the type of a road, type and weight of vehicles that run on the road, type and condition of the road surface, the distance from the house to the source of vibrations and many others which should be taken into account....
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublikacjaThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Combining Road Network Data from OpenStreetMap with an Authoritative Database
PublikacjaComputer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...
-
Machine Learning Algorithm-Based Tool and Digital Framework for Substituting Daylight Simulations In Early- Stage Architectural Design Evaluation
PublikacjaThe aim of this paper is to examine the new method of obtaining the simulation-based results using backpropagation of errors artificial neural networks. The primary motivation to conduct the research was to determine an alternative, more efficient and less timeconsuming method which would serve to achieve the results of daylight simulations. Three daylight metrics: Daylight Factor, Daylight Autonomy and Daylight Glare Probability have...
-
New trends in development of micro heat exchangers for ORC's
PublikacjaIn the paper, new trends in development of micro heat exchangers for CHP are presented. Main attention is concentrated on the question, how channels size and thermal development lenght affect the heat transfer. New types of micro heat exchangers developed at the Institute of Fluid-Flow Machinery PAS and the methoda of their design are presented. The new experimental testing methods of the micro-channel heat exchangers, new algorithms...
-
Artificial intelligence support for disease detection in wireless capsule endoscopy images of human large bowel
PublikacjaIn the work the chosen algorithms of disease recognition in endoscopy images were described and compared for theirs efficiency. The algorithms were estimated with regard to utility for application in computer system's support for digestive system's diagnostics. Estimations were achieved in an advanced testing environment, which was built with use of the large collection of endoscopy movies received from Medical University in Gdańsk....
-
Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks
PublikacjaRendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...
-
The searchlight problem for road networks
PublikacjaWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublikacjaWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Sztuczne sieci neuronowe oraz metoda wektorów wspierających w bankowych systemach informatycznych
PublikacjaW artykule zaprezentowano wybrane metod sztucznej inteligencji do zwiększania efektywności bankowych systemów informatycznych. Wykorzystanie metody wektorów wspierających czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwia znaczący wzrost konkurencyjności banku poprzez dodanie nowych funkcjonalności. W rezultacie możliwe jest także złagodzenie skutków kryzysu finansowego.
-
Optymalizacja treningu i wnioskowania sieci neuronowych
PublikacjaSieci neuronowe są jedną z najpopularniejszych i najszybciej rozwijających się dziedzin sztucznej inteligencji. Ich praktyczne wykorzystanie umożliwiło szersze użycie komputerów w wielu obszarach komunikacji, przemysłu i transportu. Dowody tego są widoczne w elektronice użytkowej, medycynie, a nawet w zastosowaniach militarnych. Wykorzystanie sztucznej inteligencji w wielu przypadkach wymaga jednak znacznej mocy obliczeniowej,...
-
How Can We Identify Electrophysiological iEEG Activities Associated with Cognitive Functions?
PublikacjaElectrophysiological activities of the brain are engaged in its various functions and give rise to a wide spectrum of low and high frequency oscillations in the intracranial EEG (iEEG) signals, commonly known as the brain waves. The iEEG spectral activities are distributed across networks of cortical and subcortical areas arranged into hierarchical processing streams. It remains a major challenge to identify these activities in...
-
JAKOŚĆ USŁUG W ARCHITEKTURZE SIECI ASON/GMPLS A MECHANIZMY REZERWACJI ZASOBÓW
PublikacjaW artykule przedstawiono mechanizmy rezerwacji zasobów w architekturze sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie siecią z gwarancją jakości usług. W artykule porównano dwa mechanizmy rezerwacji zasobów z gwarancją jakości i podejściem typu POOL. Efektywność prezentowanych mechanizmów zweryfikowano metodą symulacji komputerowej w środowisku OMNeT++.
-
Metody sztucznej inteligencji do wspomagania bankowych systemów informatycznych
PublikacjaW pracy opisano zastosowania nowoczesnych metod sztucznej inteligencji do wspomagania bankowych systemów informatycznych. Wykorzystanie w systemach informatycznych algorytmów ewolucyjnych, harmonicznych, czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwiają zasadniczy wzrost konkurencyjności banku. Dlatego w pracy omówiono wybrane zastosowania bankowe ze szczególnym uwzględnieniem zbliżeniowych...
-
Sterowanie optyczną siecią wielodomenową z hierarchiczną strukturą płaszczyzn sterowania
PublikacjaW artykule przedstawiono problem sterowania wielodomenową siecią optyczną z hierarchiczną strukturą płaszczyzn sterowania. Autorzy proponują wykorzystanie koncepcji sieci ASON/GMPLS, która spełnia wymagania nowoczesnych sieci optycznych, a jednocześnie umożliwia sterowanie wielodomenową siecią z gwarancją jakości usług. W artykule zaproponowano algorytm sterowania z gwarancją jakości, którego efektywność zweryfikowano metodą symulacji...
-
Towards systemic functional safety and security management in hazardous plants
PublikacjaThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublikacjaThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Deep Features Class Activation Map for Thermal Face Detection and Tracking
PublikacjaRecently, capabilities of many computer vision tasks have significantly improved due to advances in Convolutional Neural Networks. In our research, we demonstrate that it can be also used for face detection from low resolution thermal images, acquired with a portable camera. The physical size of the camera used in our research allows for embedding it in a wearable device or indoor remote monitoring solution for elderly and disabled...
-
Distinguishing views in symmetric networks: A tight lower bound
PublikacjaThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Gossiping by energy-constrained mobile agents in tree networks
PublikacjaEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
DIAGNOSIS OF MALIGNANT MELANOMA BY NEURAL NETWORK ENSEMBLE-BASED SYSTEM UTILISING HAND-CRAFTED SKIN LESION FEATURES
PublikacjaMalignant melanomas are the most deadly type of skin cancer but detected early have high chances for successful treatment. In the last twenty years, the interest of automated melanoma recognition detection and classification dynamically increased partially because of public datasets appearing with dermatoscopic images of skin lesions. Automated computer-aided skin cancer detection in dermatoscopic images is a very challenging task...
-
Interval wavelength assignment in all-optical star networks
PublikacjaArtykuł omawia zwarte końcówkowe kolorowanie grafów, które jest matematycznym modelem dla problemu przydziału częstotliwości w sieciach optycznych. W artykule przedstawiono wielomianowe algorytmy wyznaczania zwartej końcówkowej liczby chromatycznej dla pełnych grafów k-dzielnych, drzew i podkubicznych grafów dwudzielnych.
-
Hydrauliczna wiarygodność wyników pomiarów terenowych stosowanych do identyfikacji oporności hydraulicznej przewymiarowanych sieci wodociągowych
PublikacjaPublikacja zawiera zalecenia metodyczne dotyczące identyfikacji oporności hydraulicznej w przewymiarowanych sieciach wodociągowych na tle spotykanych nieprawidłowości. Krytycznie oceniono wyniki pomiarów terenowych, które zastosowano do tarowania komputerowych modeli przepływów (KMP) pomimo, że nie spełniały kryterium hydraulicznej wiarygodności. Ponadto zaproponowano spadek hydrauliczny jako obiektywny wskaźnik wiarygodności pomiarów,...
-
Initial Investigation of Wave Interactions During Simultaneous Valve Closures in Hydraulic Piping Systems
PublikacjaThe effects of interference of pressure waves in simple piping systems were studied. A freeware computer code Allievi developed at the University of Valencia was used to simulate dynamic waveforms in simple and complex networks. The tests were carried out according to three scenarios. No pressure increases significantly exceeding the Joukowsky pressure in simple cases were noticed. When the effects of the simultaneous closing of...
-
Optimization issues in distributed computing systems design
PublikacjaIn recent years, we observe a growing interest focused on distributed computing systems. Both industry and academia require increasing computational power to process and analyze large amount of data, including significant areas like analysis of medical data, earthquake, or weather forecast. Since distributed computing systems – similar to computer networks – are vulnerable to failures, survivability mechanisms are indispensable...
-
Computed aided system for separation and classification of the abnormal erythrocytes in human blood
PublikacjaThe human peripheral blood consists of cells (red cells, white cells, and platelets) suspended in plasma. In the following research the team assessed an influence of nanodiamond particles on blood elements over various periods of time. The material used in the study consisted of samples taken from ten healthy humans of various age, different blood types and both sexes. The markings were leaded by adding to the blood unmodified...