Filtry
wszystkich: 2875
wybranych: 2097
-
Katalog
- Publikacje 2097 wyników po odfiltrowaniu
- Czasopisma 42 wyników po odfiltrowaniu
- Konferencje 23 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 71 wyników po odfiltrowaniu
- Projekty 4 wyników po odfiltrowaniu
- Kursy Online 421 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 213 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: NETWORK ODE-CLASS
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Glucose metabolism disorders in patients with non-functioning adrenal adenomas — single-centre experience
PublikacjaIntroduction: The presence of glucose metabolism disorders and their possible correlation with degree of cortisol secretion were evaluated in patients with non-functioning adrenal incidentalomas (NFAIs). Material and methods: The study group consisted of 131 patients with hormonally inactive adrenal incidentalomas....
-
Development and evaluation of thermosensitive hydrogels with binary mixture of Scutellariae baicalensis radix extract and chitosan for periodontal diseases treatment.
PublikacjaScutellaria baicalensis root displays anti-inflammatory and antibacterial properties due to the presence of flavonoids, particularly baicalin, baicalein, and wogonin. Our work aimed at developing thermosensitive hydrogels containing a binary mixture of S. baicalensis radix lyophilized extract and chitosan as a novel approach for periodontal diseases treatment....
-
Towards Resource Theory of Coherence in Distributed Scenarios
PublikacjaThe search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....
-
Linear Time-Varying Dynamic-Algebraic Equations of Index One on Time Scales
PublikacjaIn this paper, we introduce a class of linear time-varying dynamic-algebraic equations (LTVDAE) of tractability index one on ar- bitrary time scales. We propose a procedure for the decoupling of the considered class LTVDAE. Explicit formulae are written down both for transfer operator and the obtained decoupled system. A projector ap- proach is used to prove the main statement of the paper and sufficient conditions of decoupling...
-
THE IPV4 TO IPV6 MIGRATION OF APPLICATIONS AND SERVICE
PublikacjaThis article presents the problems related to IPv4 to IPv6 migration of applications supporting network services. It summarizes the needs of executing such migration. It shows the basic problems of automating the migration process, having defined the basic terms, i.e.: a network service, a network application. It shows a sample implementation of the automation of the migration process between IP technologies for selected network...
-
Comparative study of neural networks used in modeling and control of dynamic systems
PublikacjaIn this paper, a diagonal recurrent neural network that contains two recurrent weights in the hidden layer is proposed for the designing of a synchronous generator control system. To demonstrate the superiority of the proposed neural network, a comparative study of performances, with two other neural network (1_DRNN) and the proposed second-order diagonal recurrent neural network (2_DRNN). Moreover, to confirm the superiority...
-
Political Sources of Government Redistribution in High-Income Countries
PublikacjaIn cross-national empirical work on income inequality and government redistribution, the greatest emphasis has been on the extremes of the income scale. Less work has been done on groups that are neither rich nor poor—the middle class. The lack of attention to this group is unfortunate for several reasons. Most obviously, the middle class, if defined as the three middle income quintile groups, is by far the largest income group,...
-
LOCAL E-MARKETING AND PHARAMACY SELECTION PROCESS AMONG CURRENT AND PROSPECTIVE CONSUMERS
PublikacjaWORK OBJECTIVES: To examine whether and to what extent a company's presence in Google Search mobile results, and Google Maps service search results, affects pharmacies' acquisition of new consumers RESEARCH QUESTIONS: Does the presence of pharmacies in Google MyBusiness increase the number of their customers ? Is the increase in the...
-
Artificial intelligence models in prediction of response to cardiac resynchronization therapy: a systematic review
PublikacjaThe aim of the presented review is to summarize the literature data on the accuracy and clinical applicability of artificial intelligence (AI) models as a valuable alternative to the current guidelines in predicting cardiac resynchronization therapy (CRT) response and phenotyping of patients eligible for CRT implantation. This systematic review was performed...
-
Thresholding Strategies for Large Scale Multi-Label Text Classifier
PublikacjaThis article presents an overview of thresholding methods for labeling objects given a list of candidate classes’ scores. These methods are essential to multi-label classification tasks, especially when there are a lot of classes which are organized in a hierarchy. Presented techniques are evaluated using the state-of-the-art dedicated classifier on medium scale text corpora extracted from Wikipedia. Obtained results show that the...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublikacjaWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
Generalized Dold sequences on partially-ordered sets
PublikacjaDold sequences constitute an important class of integer sequences that play an important role in combinatorics, number theory, topology and dynamical systems. We generalize the notion of Dold sequence for the case of partially ordered sets and describe their properties. In particular we give two alternative descriptions of generalized Dold sequences: by some class of elementary sequences as well as by different...
-
The use of fast molecular descriptors and artificial neural networks approach in organochlorine compounds electron ionization mass spectra classification
PublikacjaDeveloping of theoretical tools can be very helpful for supporting new pollutant detection. Nowadays, a combination of mass spectrometry and chromatographic techniques are the most basic environmental monitoring methods. In this paper, two organochlorine compound mass spectra classification systems were proposed. The classification models were developed within the framework of artificial neural networks (ANNs) and fast 1D and...
-
Classification of submandibular salivary stones based on ultrastructural studies
PublikacjaIntroduction: Sialolithiasis remains a clinical problem with unclear etiopathogenesis, lack of prevention methods, and only surgical treatment. Materials and methods: An ultrastructure examination of submandibular sialoliths obtained from patients with chronic sialolithiasis was conducted using a scanning electron microscope and X-ray photoelectron...
-
Ocena pracy dźwigara zadaszenia Hali Blanika w Gdańsku
PublikacjaWartykule przedstawiono kompleksowe sprawdzenie nośności stalowej konstrukcji zadaszenia Hali Leszka Blanika w Gdańsku. Dokonano oceny wpływu otworów dużej średnicy w środnikach dźwigara na jego nośność. Oszacowano nośność nietypowego, zginanego styku doczołowego łączącego elementy dwuteowe klasy 4. Obliczenia wykonano na podstawie norm i analiz modeli MES.
-
Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models
PublikacjaDeep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...
-
Application of Support Vector Machine for Determination of Impact of Traffic-Induced Vibrations on Buildings
PublikacjaThe aim of the article is to present an algorithm of Support Vector Machine created to forecast the impact of traffic-induced vibrations on residential buildings. The method is designed to classify the object into one of two classes. The classification into the first class means that there is no impact of vibrations on the building, while classification to the second class indicates the possible influence and suggests the execution...
-
Recognizing emotions on the basis of keystroke dynamics
PublikacjaThe article describes a research on recognizing emotional states on the basis of keystroke dynamics. An overview of various studies and applications of emotion recognition based on data coming from keyboard is presented. Then, the idea of an experiment is presented, i.e. the way of collecting and labeling training data, extracting features and finally training classifiers. Different classification approaches are proposed to be...
-
A Selection of Starting Points for Iterative Position Estimation Algorithms Using Feedforward Neural Networks
PublikacjaThis article proposes the use of a feedforward neural network (FNN) to select the starting point for the first iteration in well-known iterative location estimation algorithms, with the research objective of finding the minimum size of a neural network that allows iterative position estimation algorithms to converge in an example positioning network. The selected algorithms for iterative position estimation, the structure of the...
-
Image Segmentation of MRI image for Brain Tumor Detection
Publikacjathis research work presents a new technique for brain tumor detection by the combination of Watershed algorithm with Fuzzy K-means and Fuzzy C-means (KIFCM) clustering. The MATLAB based proposed simulation model is used to improve the computational simplicity, noise sensitivities, and accuracy rate of segmentation, detection and extraction from MR...
-
Engineering Challenges in the Design of Cochlear Implants
PublikacjaHearing aids such as cochlear implants have been used by both adults and children for a long time. In addition, cochlear implants are used by patients who have severe hearing loss either by birth or after an accident. This paper aims to investigate the engineering challenges bounding the design of cochlear implants and present its possible solution...
-
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublikacjaDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Tacit Knowledge Sharing and Personal Branding. How to Derive Innovation From Project Teams?
PublikacjaInnovation, relationships, cooperation, and knowledge are key factors which determine a competitive advantage in the networked economy. A network serves as a contemporary form of market process coordination. Network economy, according to the idea of prosumerism, is founded on collaboration of individual creators based on a network of values instead of hierarchical dependencies. Another feature of a network is that it imposes symmetry...
-
1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type
PublikacjaA network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Photovoltaic Maximum Power Point Technique based on Incremental Conductance (INCON) control algorithm
PublikacjaMaximum output power status can significantly improve the deployment rate of solar energy system. In order to get the maximum power output, issue of tracking maximum power point (MPP), reduced harmonics around MPP and improve efficiency of the solar power energy system, this paper presents the improved maximum power point tracking (MPPT) control...
-
Maximum Power Point Technique (MPPT) for PV System Based on Improved Pert and Observe (P&O) Method with PI Controller
PublikacjaPhotovoltaic power generation system has key rule in electricity production. Although, it is clean renewable energy with unlimited resources but it has some drawbacks in efficiency. In order to maximize the efficiency, PV array must drive at maximum power point. For the reason so, several algorithms are used in PV system to track MPP and reduce the...
-
Computational aspects of greedy partitioning of graphs
PublikacjaIn this paper we consider a variant of graph partitioning consisting in partitioning the vertex set of a graph into the minimum number of sets such that each of them induces a graph in hereditary class of graphs P (the problem is also known as P-coloring). We focus on the computational complexity of several problems related to greedy partitioning. In particular, we show that given a graph G and an integer k deciding if the greedy...
-
Hybrid DUMBRA: an efficient QoS routing algorithm for networks with DiffServ architecture
PublikacjaDynamic routing is very important issue of current packet networks. It may support the QoS and help utilize available network resources. Unfortunately current routing mechanisms are not sufficient to fully support QoS. Although many research has been done in this area no generic QoS routing algorithm has been proposed that could be used across all network structures. Existing QoS routing algorithms are either dedicated to limited...
-
QoS Extensions for Flow-Awareness Networks
PublikacjaThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Jesień w Bibliotece PG
PublikacjaArtykuł jest podsumowaniem licznych aktywności podjętych przez Bibliotekę PG w okresie jesiennym 2023 r., ukierunkowanych na czytelnictwo, jak i wynikających z naukowo-edukacyjno-kulturalnego charakteru tej jednostki. Z zestawienia zaprezentowanych wydarzeń wyłania się obraz Biblioteki PG jako miejsca...
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Distinguishing views in symmetric networks: A tight lower bound
PublikacjaThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublikacjaMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Mieszanie w klasie niejednorodnych łańcuchów Markowa i kwadratowych operatorów stochastycznych
PublikacjaRozprawa doktorska poświęcona jest zagadnieniu asymptotycznych własności w klasie nieskończenie wymiarowych niejednorodnych łańcuchów Markowa z czasem dyskretnym oraz w klasie kwadratowych operatorów stochastycznych. W pierwszej kolejności definiowane są różne rodzaje asymptotycznego zachowania (mieszania) niejednorodnych łańcuchów Markowa odpowiadające zbieżności w normowej i mocnej topologii operatorowej oraz omówione są relacje...
-
A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios
PublikacjaThis article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...
-
On-line P-coloring of graphs
PublikacjaFor a given induced hereditary property P, a P-coloring of a graph G is an assignment of one color to each vertex such that the subgraphs induced by each of the color classes have property P. We consider the effectiveness of on-line P-coloring algorithms and give the generalizations and extensions of selected results known for on-line proper coloring algorithms. We prove a linear lower bound for the performance guarantee function...
-
Regularized Local Basis Function Approach to Identification of Nonstationary Processes
PublikacjaThe problem of identification of nonstationary stochastic processes (systems or signals) is considered and a new class of identification algorithms, combining the basis functions approach with local estimation technique, is described. Unlike the classical basis function estimation schemes, the proposed regularized local basis function estimators are not used to obtain interval approximations of the parameter trajectory, but provide...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Active Learning Based on Crowdsourced Data
PublikacjaThe paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...
-
Introduction to the ONDM 2022 special issue
PublikacjaThis JOCN special issue contains extended versions of selected papers presented at the 26th International Conference on Optical Network Design and Modeling (ONDM 2022), which took place 16–19 May 2022 at Warsaw University of Technology, Warsaw, Poland. The topics covered by the papers represent trends in optical networking research: application of machine learning to network management, cross-layer network performance optimization,...
-
Design and implementation of GEPON architecture in laboratory testbed
PublikacjaThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience
PublikacjaNetwork communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublikacjaThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...