Filtry
wszystkich: 2708
wybranych: 2038
-
Katalog
- Publikacje 2038 wyników po odfiltrowaniu
- Czasopisma 194 wyników po odfiltrowaniu
- Konferencje 63 wyników po odfiltrowaniu
- Osoby 81 wyników po odfiltrowaniu
- Projekty 4 wyników po odfiltrowaniu
- Kursy Online 43 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 282 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS
-
Advanced Bayesian study on inland navigational risk of remotely controlled autonomous ship
PublikacjaThe arise of autonomous ships has necessitated the development of new risk assessment techniques and methods. This study proposes a new framework for navigational risk assessment of remotely controlled Maritime Autonomous Surface Ships (MASS). This framework establishes a set of risk influencing factors affecting safety of navigation of a remotely-controlled MASS. Next, model parameters are defined based on the risk factors, and...
-
The Optical Transport Network Control Based on SDN Architecture
PublikacjaThe aim of this publication is to present research results on the usability of the Software-Defined Networking concept to control transport networks. For this purpose, an easy-to-use connection scheduler was developed capable of controlling connections in optical transport networks. The authors would like to present this solution and details of constructed SDN architecture implemented for modern optical transport solutions based...
-
Taxonomy of Schemes for Resilient Routing
PublikacjaThis chapter provides a taxonomy of schemes for resilient routing followed by a discussion of their application to contemporary architectures of communication networks. In particular, a general classification of schemes for resilient routing is first presented followed by a description of the reference schemes for IP networks. The chapter in its later part focuses on the representative techniques of resilient routing for a multi-domain...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Mechanical and Microstructural Characterization of TIG Welded Dissimilar Joints between 304L Austenitic Stainless Steel and Incoloy 800HT Nickel Alloy
PublikacjaIn this article, the mechanical properties and microstructure of 304L austenitic stainless steel/Incoloy 800HT nickel alloy dissimilar welded joints are investigated. The joints were made of 21.3 mm × 7.47 mm tubes using the TIG process with the use of S Ni 6082 nickel filler metal. No welding imperfections were found and high strength properties of joints were obtained, meeting the assumed acceptance criteria of the product’s...
-
Path Loss Modelling for Location Service Applications
PublikacjaThe aim of this paper is the path loss modeling for the radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the UMTS are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation of the distance between the mobile station (MS) and the base station (BS) is outlined. This...
-
New type T-Source inverter
PublikacjaThis paper presents different topologies of voltage inverters with alternative input LC networks. The basic topology is known in the literature as a Z-source inverter (ZSI). Alternative passive networks were named by the authors as T-sources. T-source inverter has fewer reactive components in comparison to conventional Z-source inverter. The most significant advantage of the T-source inverter (TSI) is its use of a common voltage...
-
The cohomological span of LS-Conley index
PublikacjaIn this paper we introduce a new homotopy invariant – the cohomological span of LS-Conley index. We prove the theorems on the existence of critical points for a class of strongly indefinite functionals with the gradient of the form Lx+K(x), where L is bounded linear and K is completely continuous. We give examples of Hamiltonian systems for which our methods give better results than the Morse inequalities. We also give a formula...
-
Design criterion for hydrodynamic vortex separators
PublikacjaTechnical objects designing involves determination of geometrical parameters that characterize a given object. When the device is described by the differential equations, an inverse problem brings difficulties, as geometrical values sought condition the solution to the problem. Vortex separators can be designed by the "criterion method'. Firstly, a critical particle is distinguished such that bigger particles are removed from...
-
A note on the Morse homology for a class of functionals in Banach spaces involving the 2p-area functional
PublikacjaIn this paper we show how to construct Morse homology for an explicit class of functionals involving the 2p-area functional. The natural domain of definition of such functionals is the Banach space W_0^{1,2p}(\Omega), where p > n/2 and \Omega \subet R^n is a bounded domain with sufficiently smooth boundary. As W_0^{1,2p}(\Omega) is not isomorphic to its dual space,critical points of such functionals cannot be non-degenerate...
-
Evolutionary Algorithms in MPLS network designing
PublikacjaMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Radio Link Measurement Methodology for Location Service Applications
PublikacjaThe aim of this paper is the methodology of measurements executed in a radio link for the realization of radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the universal mobile telecommunications system (UMTS) are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation...
-
Pathological brain network activity: memory impairment in epilepsy
PublikacjaOur thinking, memory and cognition in general, relies upon precisely timed interactions among neurons forming brain networks that support cognitive processes. The surgical evaluation of drug-resistant epilepsy using intracranial electrodes provides a unique opportunity to record directly from human brain and to investigate the coordinated activity of cognitive networks. In this issue of Neurology®, Kleen and colleagues1 implicate...
-
Training of Deep Learning Models Using Synthetic Datasets
PublikacjaIn order to solve increasingly complex problems, the complexity of Deep Neural Networks also needs to be constantly increased, and therefore training such networks requires more and more data. Unfortunately, obtaining such massive real world training data to optimize neural networks parameters is a challenging and time-consuming task. To solve this problem, we propose an easy-touse and general approach to training deep learning...
-
Licht, Luft, Sonne und Farbe. Ucząc się dziś od Gustava Oelsnera
PublikacjaArtykuł przedstawia główne przesłanki podjęcia tematu całego tomu. Jest kluczem do powiązania wszystkich zamieszczonych w tomie prac, poruszających temat współczesnych interpretacji miasta, czerpiących z dorobku modernistycznych planistów i architektów - reformatorów miasta, oraz modernistycznej myśli architektonicznej i urbanistycznej. Główną postacią nie tylko tego artykułu, ale i całego tomu, jest Gustav Oelsner, architekt miejski...
-
Utilization of a Non-Linear Error Function in a Positioning Algorithm for Distance Measurement Systems Designed for Indoor Environments
PublikacjaA new positioning algorithm for distance measurement systems is outlined herein. This algorithm utilizes a non-linear error function which allows us to improve the positioning accuracy in highly difficult indoor environments. The non-linear error function also allows us to adjust the performance of the algorithm to the particular environmental conditions. The well-known positioning algorithms have limitations, mentioned by their...
-
Application of theory of semi-Markov processes to determining distribution of probabilistic process of marine accidents resulting from colission of ships
PublikacjaIn this paper is presented possible application of the theory of semi-Markov processes to elaborating an eight-state model of the process of occurrence of serviceability state and unserviceability states of sea-going ships making critical manoeuvres during their entering and leaving the ports. In the analysis it was taken into account that sea-going ships are in service for a very long time t (t → ∞). The model was elaborated to...
-
Implementation of Non-Probabilistic Methods for Stability Analysis of Nonlocal Beam with Structural Uncertainties
PublikacjaIn this study, a non-probabilistic approach based Navier’s Method (NM) and Galerkin Weighted Residual Method (GWRM) in term of double parametric form has been proposed to investigate the buckling behavior of Euler-Bernoulli nonlocal beam under the framework of the Eringen's nonlocal elasticity theory, considering the structural parameters as imprecise or uncertain. The uncertainties in Young’s modulus and diameter of the beam are...
-
On the Modern and Postmodern Paradigms of Ideology and Social Criticism
PublikacjaThe article takes on the problem of ideology, critical consciousness and social criticism and distinguishes two ways of thematizing it. The first approach is developed within the post-Hegelian framework. According to this paradigm, critique of ideology is a means of transgressing the antagonistic forms of socialization and emancipating humanity from the false forms of consciousness and corresponding irrational and oppressive social...
-
Do mistakes acceptance foster innovation? Polish and US cross-country study of tacit knowledge sharing in IT
PublikacjaAbstract Purpose – This study aims to understand and compare how the mechanism of innovative processes in the information technology (IT) industry – the most innovative industry worldwide – is shaped in Poland and the USA in terms of tacit knowledge awareness and sharing driven by a culture of knowledge and learning, composed of a learning climate and mistake acceptance. Design/methodology/approach – Study samples were drawn from...
-
Multi-stage magnetic-fluid seals for operating in water - life test procedure, test stand and research results
PublikacjaThe edge criteria for magnetic-fluid seals durability research are critical for the seal'stechnological usefulness. The magnetic fluid seal technology in water is much moredifficult technological problem in comparison to gas or vacuum environment. There isalways problem with immediate contact between magnetic fluid and the environmentaluninspected liquids. In the paper are presented ways of experiments definitions carried outwith...
-
Open-Set Speaker Identification Using Closed-Set Pretrained Embeddings
PublikacjaThe paper proposes an approach for extending deep neural networks-based solutions to closed-set speaker identification toward the open-set problem. The idea is built on the characteristics of deep neural networks trained for the classification tasks, where there is a layer consisting of a set of deep features extracted from the analyzed inputs. By extracting this vector and performing anomaly detection against the set of known...
-
Application possibilities of LBN for civil engineering issues
PublikacjaBayesian Networks (BN) are efficient to represent knowledge and for the reasoning in uncertainty. However the classic BN requires manual definition of the network structure by an expert, who also defines the values entered into the conditional probability tables. In practice, it can be time-consuming, hence the article proposes the use of Learning Bayesian Networks (LBN). The aim of the study is not only to present LBN, which can...
-
Electro-thermal buckling of elastically supported double-layered piezoelectric nanoplates affected by an external electric voltage
PublikacjaPurpose Thermal buckling of double-layered piezoelectric nanoplates has been analyzed by applying an external electric voltage on the nanoplates. The paper aims to discuss this issue. Design/methodology/approach Double-layered nanoplates are connected to each other by considering linear van der Waals forces. Nanoplates are placed on a polymer matrix. A comprehensive thermal stress function is used for investigating thermal buckling....
-
Multipath routing for quality of service differentiation and network capacity optimization in broadband low-earth orbit systems
PublikacjaThis paper shows the importance of employing multiple different paths for routing in Inter-Satellite Link (ISL) networks in broadband Low-Earth Orbit (LEO) satellite systems. A theoretical analysis is presented and a routing concept is proposed to demonstrate three facts that make multipath routing especially important in broadband LEO networks: (1) differences in the propagation delays have a much greater impact on end-to-end...
-
President and Manager of the court versus networking in justice system - "Extending of Delimitation"
PublikacjaCurrent knowledge and empirical studies concering the networks collaboration in public sector, the role of decision-making centre in the building of network structure, strategy formulation and evaluation is fragmentary.
-
Performance evaluation of IEEE 802.11 fast BSS transition algorithms
PublikacjaSimultation experiments are conducted to answer the questions if multimedia services can be properly supported in IEEE 802.11r networks. The authors prove that handover delay can be reduced to 22 ms in the average case.
-
Modelling of network schedule including priority of selected technical resources
PublikacjaThe paper presents a method of network planning CPM – Critical Path Method. The author compares models of optimal solutions to design deadlines for individual works, taking various leading technical resources such as is labor and a tower crane into account.
-
Production, Transformation and Determination of Volatile Fatty Acids in Farm Animals and the Environment
PublikacjaThe paper is a critical discussion of the production, transportation and determination of volatile fatty acids in rumens of ruminants. The odor nuisance of the emission of VFAs, often accompanied by volatile nitrogen- and sulfur-organic compounds from animal farming is also discussed.
-
Security Assessment of a Turbo-Gas Power Plant
PublikacjaCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
Deep learning based thermal image segmentation for laboratory animals tracking
PublikacjaAutomated systems for behaviour classification of laboratory animals are an attractive alternative to manual scoring. However, the proper animals separation and tracking, especially when they are in close contact, is the bottleneck of the behaviour analysis systems. In this paper, we propose a method for the segmentation of thermal images of laboratory rats that are in close contact during social behaviour tests. For this, we are...
-
Numerical analysis of open channel steady gradually varied flow using the simplified saint-venant equations
PublikacjaFor one-dimensional open-channel flow modeling, the energy equation is usually used. There exist numerous approaches using the energy equation for open-channel flow computations, which resulted in the development of several very efficient methods for solving this problem applied to channel networks. However, the dynamic equation can be used for this purpose as well. This paper introduces a method for solving a system of non-linear...
-
Neural Network Subgraphs Correlation with Trained Model Accuracy
PublikacjaNeural Architecture Search (NAS) is a computationally demanding process of finding optimal neural network architecture for a given task. Conceptually, NAS comprises applying a search strategy on a predefined search space accompanied by a performance evaluation method. The design of search space alone is expected to substantially impact NAS efficiency. We consider neural networks as graphs and find a correlation between the presence...
-
On the Importance of Resilience Engineering for Networked Systems in a Changing World
PublikacjaResilience is featured increasingly often in the media, usually applied to society when faced, for example, with disasters such as flooding and the enormous challenges that the Covid-19 pandemic posed. There are now many resilience-related discussion groups worldwide, and some standards initiatives devoted in particular to city resilience. However, there is relatively little explicit interest in resilience engineering for communication...
-
Data augmentation for improving deep learning in image classification problem
PublikacjaThese days deep learning is the fastest-growing field in the field of Machine Learning (ML) and Deep Neural Networks (DNN). Among many of DNN structures, the Convolutional Neural Networks (CNN) are currently the main tool used for the image analysis and classification purposes. Although great achievements and perspectives, deep neural networks and accompanying learning algorithms have some relevant challenges to tackle. In this...
-
Selected design and construction aspects of supercritical steam generators for high temperature reactors = Wybrane aspekty konstrukcyjne i projektowe generatorów pary nadkrytycznej ogrzewanych z reaktorów wysokotemperaturowych
PublikacjaW artykule zaprezentowano uwarunkowania projektowe i konstrukcyjne nadkrytycznego generatora pary (jednoprzepływowego) wykorzystującego do ogrzewania hel z reaktorów HTR i VHTR. Wymiennik helikoidalny jest preferowany dla zwiększenia wymiany ciepła i zwartości. Badano własności czynników wymieniających ciepło z parą w obszarach przy- i nadkrytycznych. Analizowano korelacje, aby wybrać najbardziej wiarygodne. Przedyskutowano najbardziej...
-
The KLC Cultures' Synergy Power, Trust, and Tacit Knowledge for Organizational Intelligence
PublikacjaThis paper examines the impact of knowledge, learning, and collaboration culturessynergy (the KLC approach) on organizational adaptability. The SEM analysis method was applied to verify the critical assumption of this paper: that the KLC approach and trust support knowledge-sharing processes (tacit and explicit) and are critical for organizational intelligence activation.Specifically, the empirical evidence, based on a 640-case...
-
Ce site dilution effects in the antiferromagnetic heavy fermion CeIn3
PublikacjaLa-doped intermetallic single crystals of Ce1−xLaxIn3 were synthesized via an In self-flux method throughout the entire range (x = 0–1). The prototypical heavy-fermion compound CeIn3 shows an antiferromagnetic phase transition at 10.1 K and becomes superconducting near a critical pressure where TN is completely suppressed. As the La concentration increases, Ce moments are diluted, and the lattice constant increases linearly, satisfying Vegard’s...
-
Bounds on isolated scattering number
PublikacjaThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Bounds on isolated scattering number
PublikacjaThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Determining QoS in the Video Telephony Service in an IP Environment
PublikacjaIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Machine Learning Applied to Aspirated and Non-Aspirated Allophone Classification—An Approach Based on Audio "Fingerprinting"
PublikacjaThe purpose of this study is to involve both Convolutional Neural Networks and a typical learning algorithm in the allophone classification process. A list of words including aspirated and non-aspirated allophones pronounced by native and non-native English speakers is recorded and then edited and analyzed. Allophones extracted from English speakers’ recordings are presented in the form of two-dimensional spectrogram images and...
-
The Magnetic Fluid Seals Research Results vs. Kelvin-Helmholtz (K-H) instability and Preliminary Conclusions
PublikacjaIn the article a magnetic-fluid seals durability research and the tests results are presented. The tests were made with three magnetic fluids using various magnets quantity in magnetic assemblies. If values obtained in the repeated test deviated by more than 10 % from results of the first test an additional control test was made for final characteristics. The characteristics are: critical pressure, critical motion velocity and...
-
Flexomagnetic response of buckled piezomagnetic composite nanoplates
PublikacjaIn this paper, the equation governing the buckling of a magnetic composite plate under the influence of an in-plane one-dimensional magnetic field, assuming the concept of flexomagnetic and considering the resulting flexural force and moment, is investigated for the first time by different analytical boundary conditions. To determine the equation governing the stability of the plate, the nonlocal strain gradient theory has been...
-
A Data Driven Model for Predicting RNA-Protein Interactions based on Gradient Boosting Machine
PublikacjaRNA protein interactions (RPI) play a pivotal role in the regulation of various biological processes. Experimental validation of RPI has been time-consuming, paving the way for computational prediction methods. The major limiting factor of these methods has been the accuracy and confidence of the predictions, and our in-house experiments show that they fail to accurately predict RPI involving short RNA sequences such as TERRA RNA....
-
Experience-Based Cognition for Driving Behavioral Fingerprint Extraction
PublikacjaABSTRACT With the rapid progress of information technologies, cars have been made increasingly intelligent. This allows cars to act as cognitive agents, i.e., to acquire knowledge and understanding of the driving habits and behavioral characteristics of drivers (i.e., driving behavioral fingerprint) through experience. Such knowledge can be then reused to facilitate the interaction between a car and its driver, and to develop better and...
-
Factors that strengthen and weaken the identity of the cluster structures
PublikacjaThe main aim of this paper is the application of "identity" to the issues related to "clustering process" and particularly - to the cooperation in the clusters and the cluster initiatives. The authors distinguish these factors that have the greatest influence on the formation and maintenance of identity in mentioned networks of cooperation.
-
Identyfikacja instrumentu muzycznego z nagrania fonicznego za pomocą sztucznych sieci neuronowych
PublikacjaCelem rozprawy jest zbadanie algorytmów do identyfikacji instrumentów występujących w sygnale polifonicznym z wykorzystaniem sztucznych sieci neuronowych. W części teoretycznej przywołano podstawy przetwarzania sygnałów fonicznych w kontekście ekstrakcji parametrów sygnałów wykorzystywanych w treningu sieci neuronowych. Dodatkowo dokonano analizy rozwoju metod uczenia maszynowego z uwzględnieniem podziału na sieci neuronowe pierwszej,...