Filtry
wszystkich: 3100
wybranych: 2225
-
Katalog
- Publikacje 2225 wyników po odfiltrowaniu
- Czasopisma 42 wyników po odfiltrowaniu
- Konferencje 23 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 79 wyników po odfiltrowaniu
- Projekty 5 wyników po odfiltrowaniu
- Kursy Online 493 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 229 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: NETWORK ODE-CLASS
-
Image Segmentation of MRI image for Brain Tumor Detection
Publikacjathis research work presents a new technique for brain tumor detection by the combination of Watershed algorithm with Fuzzy K-means and Fuzzy C-means (KIFCM) clustering. The MATLAB based proposed simulation model is used to improve the computational simplicity, noise sensitivities, and accuracy rate of segmentation, detection and extraction from MR...
-
Engineering Challenges in the Design of Cochlear Implants
PublikacjaHearing aids such as cochlear implants have been used by both adults and children for a long time. In addition, cochlear implants are used by patients who have severe hearing loss either by birth or after an accident. This paper aims to investigate the engineering challenges bounding the design of cochlear implants and present its possible solution...
-
Diagnostics of the Peripheral Artery Disease with use of Glucose Sensor - A Proof of Concept
PublikacjaIt is estimated that 13 % of population over 50 years old suffer from symptomatic or asymptomatic peripheral artery disease (PAD). Ankle-brachial index (ABI) is viewed as a useful parameter in diagnostics of peripheral arterial disease, however screening tests with usage of this method are not advised. Hypoxia causes increase in lactate values and...
-
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublikacjaDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Tacit Knowledge Sharing and Personal Branding. How to Derive Innovation From Project Teams?
PublikacjaInnovation, relationships, cooperation, and knowledge are key factors which determine a competitive advantage in the networked economy. A network serves as a contemporary form of market process coordination. Network economy, according to the idea of prosumerism, is founded on collaboration of individual creators based on a network of values instead of hierarchical dependencies. Another feature of a network is that it imposes symmetry...
-
1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type
PublikacjaA network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Photovoltaic Maximum Power Point Technique based on Incremental Conductance (INCON) control algorithm
PublikacjaMaximum output power status can significantly improve the deployment rate of solar energy system. In order to get the maximum power output, issue of tracking maximum power point (MPP), reduced harmonics around MPP and improve efficiency of the solar power energy system, this paper presents the improved maximum power point tracking (MPPT) control...
-
Maximum Power Point Technique (MPPT) for PV System Based on Improved Pert and Observe (P&O) Method with PI Controller
PublikacjaPhotovoltaic power generation system has key rule in electricity production. Although, it is clean renewable energy with unlimited resources but it has some drawbacks in efficiency. In order to maximize the efficiency, PV array must drive at maximum power point. For the reason so, several algorithms are used in PV system to track MPP and reduce the...
-
Computational aspects of greedy partitioning of graphs
PublikacjaIn this paper we consider a variant of graph partitioning consisting in partitioning the vertex set of a graph into the minimum number of sets such that each of them induces a graph in hereditary class of graphs P (the problem is also known as P-coloring). We focus on the computational complexity of several problems related to greedy partitioning. In particular, we show that given a graph G and an integer k deciding if the greedy...
-
Hybrid DUMBRA: an efficient QoS routing algorithm for networks with DiffServ architecture
PublikacjaDynamic routing is very important issue of current packet networks. It may support the QoS and help utilize available network resources. Unfortunately current routing mechanisms are not sufficient to fully support QoS. Although many research has been done in this area no generic QoS routing algorithm has been proposed that could be used across all network structures. Existing QoS routing algorithms are either dedicated to limited...
-
QoS Extensions for Flow-Awareness Networks
PublikacjaThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Jesień w Bibliotece PG
PublikacjaArtykuł jest podsumowaniem licznych aktywności podjętych przez Bibliotekę PG w okresie jesiennym 2023 r., ukierunkowanych na czytelnictwo, jak i wynikających z naukowo-edukacyjno-kulturalnego charakteru tej jednostki. Z zestawienia zaprezentowanych wydarzeń wyłania się obraz Biblioteki PG jako miejsca...
-
Mieszanie w klasie niejednorodnych łańcuchów Markowa i kwadratowych operatorów stochastycznych
PublikacjaRozprawa doktorska poświęcona jest zagadnieniu asymptotycznych własności w klasie nieskończenie wymiarowych niejednorodnych łańcuchów Markowa z czasem dyskretnym oraz w klasie kwadratowych operatorów stochastycznych. W pierwszej kolejności definiowane są różne rodzaje asymptotycznego zachowania (mieszania) niejednorodnych łańcuchów Markowa odpowiadające zbieżności w normowej i mocnej topologii operatorowej oraz omówione są relacje...
-
Distinguishing views in symmetric networks: A tight lower bound
PublikacjaThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublikacjaMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
The Impact of 8- and 4-Bit Quantization on the Accuracy and Silicon Area Footprint of Tiny Neural Networks
PublikacjaIn the field of embedded and edge devices, efforts have been made to make deep neural network models smaller due to the limited size of the available memory and the low computational efficiency. Typical model footprints are under 100 KB. However, for some applications, models of this size are too large. In low-voltage sensors, signals must be processed, classified or predicted with an order of magnitude smaller memory. Model downsizing...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
On-line P-coloring of graphs
PublikacjaFor a given induced hereditary property P, a P-coloring of a graph G is an assignment of one color to each vertex such that the subgraphs induced by each of the color classes have property P. We consider the effectiveness of on-line P-coloring algorithms and give the generalizations and extensions of selected results known for on-line proper coloring algorithms. We prove a linear lower bound for the performance guarantee function...
-
Regularized Local Basis Function Approach to Identification of Nonstationary Processes
PublikacjaThe problem of identification of nonstationary stochastic processes (systems or signals) is considered and a new class of identification algorithms, combining the basis functions approach with local estimation technique, is described. Unlike the classical basis function estimation schemes, the proposed regularized local basis function estimators are not used to obtain interval approximations of the parameter trajectory, but provide...
-
A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios
PublikacjaThis article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Active Learning Based on Crowdsourced Data
PublikacjaThe paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...
-
Hyperelastic Microcantilever AFM: Efficient Detection Mechanism Based on Principal Parametric Resonance
PublikacjaThe impetus of writing this paper is to propose an efficient detection mechanism to scan the surface profile of a micro-sample using cantilever-based atomic force microscopy (AFM), operating in non-contact mode. In order to implement this scheme, the principal parametric resonance characteristics of the resonator are employed, benefiting from the bifurcation-based sensing mechanism. It is assumed that the microcantilever is made...
-
Introduction to the ONDM 2022 special issue
PublikacjaThis JOCN special issue contains extended versions of selected papers presented at the 26th International Conference on Optical Network Design and Modeling (ONDM 2022), which took place 16–19 May 2022 at Warsaw University of Technology, Warsaw, Poland. The topics covered by the papers represent trends in optical networking research: application of machine learning to network management, cross-layer network performance optimization,...
-
Long Distance Geographically Distributed InfiniBand Based Computing
PublikacjaCollaboration between multiple computing centres, referred as federated computing is becom- ing important pillar of High Performance Computing (HPC) and will be one of its key components in the future. To test technical possibilities of future collaboration using 100 Gb optic fiber link (Connection was 900 km in length with 9 ms RTT time) we prepared two scenarios of operation. In the first one, Interdisciplinary Centre for Mathematical...
-
Certified domination
PublikacjaImagine that we are given a set D of officials and a set W of civils. For each civil x ∈ W, there must be an official v ∈ D that can serve x, and whenever any such v is serving x, there must also be another civil w ∈ W that observes v, that is, w may act as a kind of witness, to avoid any abuse from v. What is the minimum number of officials to guarantee such a service, assuming a given social network? In this paper, we introduce...
-
Optimization of Division and Reconfiguration Locations of the Medium-Voltage Power Grid Based on Forecasting the Level of Load and Generation from Renewable Energy Sources
PublikacjaThe article addresses challenges in optimizing the operation of medium voltage networks, emphasizing optimizing network division points and selecting the best network configuration for minimizing power and energy losses. It critically reviews recent research on the issue of network configuration optimization. The optimization of the medium voltage power grid reconfiguration process was carried out using known optimization tools....
-
Design and implementation of GEPON architecture in laboratory testbed
PublikacjaThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience
PublikacjaNetwork communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublikacjaThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Predicting Value of Binding Constants of Organic Ligands to Beta-Cyclodextrin: Application of MARSplines and Descriptors Encoded in SMILES String
PublikacjaThe quantitative structure–activity relationship (QSPR) model was formulated to quantify values of the binding constant (lnK) of a series of ligands to beta–cyclodextrin (β-CD). For this purpose, the multivariate adaptive regression splines (MARSplines) methodology was adopted with molecular descriptors derived from the simplified molecular input line entry specification (SMILES) strings. This approach allows discovery of regression...
-
Wpływ pandemii COVID-19 na deprecjonowanie budżetu państwa
PublikacjaCelem artykułu jest analiza problematyki deprecjonowania budżetu państwa, będącej swoistą konsekwencją omijania ustawy budżetowej w związku z koniecznością podejmowania działań w momencie, gdy pandemia COVID-19 była najsilniej akcentowana. Podejmowanie czynności przez organy władzy publicznej mających na celu pominięcie najważniejszego...
-
Konzepte zur Energieeffizienzsteigerung bei Internet-Zugangsgeräten
PublikacjaThe key issue of this paper is the power management of Internet access devices. The paper commences with an outline on the energy consumption of today's IT devices. It is followed by a description of options to increase energy efficiency of computers. The paper proves that in practice network cards and other IT network components, such as modems, network access points, switches and routers have the maximum energy consumption -...
-
Performance improvement of NN based RTLS by customization of NN structure - heuristic approach
PublikacjaThe purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...
-
Ubiquity of client access in heterogeneous access environment
PublikacjaWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublikacjaProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
A MODEL FOR FORECASTING PM10 LEVELS WITH THE USE OF ARTIFICIAL NEURAL NETWORKS
PublikacjaThis work presents a method of forecasting the level of PM10 with the use of artificial neural networks. Current level of particulate matter and meteorological data was taken into account in the construction of the model (checked the correlation of each variable and the future level of PM10), and unidirectional networks were used to implement it due to their ease of learning. Then, the configuration of the network (built on the...
-
A Novel Iterative Decoding for Iterated Codes Using Classical and Convolutional Neural Networks
PublikacjaForward error correction is crucial for communication, enabling error rate or required SNR reduction. Longer codes improve correction ratio. Iterated codes offer a solution for constructing long codeswith a simple coder and decoder. However, a basic iterative code decoder cannot fully exploit the code’s potential, as some error patterns within its correction capacity remain uncorrected.We propose two neural network-assisted decoders:...
-
Selection of energy storage units by genetic algorithm for mitigating voltage deviations
PublikacjaIn recent years, energy storage units have become very popular. They are applied both for economic and technical purposes. Unfortunately, the cost of such devices is still high and selecting their proper location and rated power have to be performed precisely. In this paper, a Genetic-Algorithm-based optimization method for selecting the best configuration of energy storage units in the power network is proposed. The presented...
-
Direct estimation of linear and nonlinear functionals of quantum state
PublikacjaWe present a simple quantum network, based on the controlled-SWAP gate, that can extract certain properties of quantum states without recourse to quantum tomography. It can be used as a basic building block for direct quantum estimations of both linear and nonlinear functionals of any density operator. The network has many potential applications ranging from purity tests and eigenvalue estimations to direct characterization of...
-
THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS
PublikacjaPurpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...
-
Existence of solutions with an exponential growth for nonlinear differential-functional parabolic equations
PublikacjaWe consider the Cauchy problem for nonlinear parabolic equations with functional dependence.We prove Schauder-type existence results for unbounded solutions. We also prove existence of maximal solutions for a wide class of differential functional equations.
-
Mercury concentrations in Antarctic zooplankton with a focus on the krill species, Euphausia superba
PublikacjaThe Antarctic is the most isolated region in the world; nevertheless, it has not avoided the negative impact of human activity, including the inflow of toxic mercury (Hg). Hg deposited in the Antarctic marine environment can be bioavailable and accumulate in the food web, reaching elevated concentrations in high-trophic-level biota, especially if methylated. Zooplankton, together with