Filtry
wszystkich: 228
wybranych: 156
Filtry wybranego katalogu
Wyniki wyszukiwania dla: STRUCTURAL NODE
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublikacjaWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Preserving Trees in Automata
PublikacjaWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublikacjaThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublikacjaMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
THE INFLUENCE OF PHASE SHIFTERS ON THE VOLTAGE STABILITY OF CONNECTED POWER SYSTEMS
PublikacjaThe paper presents the results of simulation tests of connected power systems in which phase shifters were installed on cross-border links. The analysis was carried out in terms of assessing the impact of shifters on node voltage stability. Individual systems were characterized by different balance of active power: deficit or excess. The evaluation of voltage stability was based on the dU/dQ and dU/dP criteria.
-
Low-power device simulator for micro-energy measurement methods testing
PublikacjaThe paper presents low-power device simulator designed for testing of micro-energy measurement methods. Such kind methods can be used for evaluation of power systems based on Energy Harvesting. The device allows to set the current consumption characteristic over the time, thus making possible playing the role of different types of low-power devices e.g. simulating sensor network node.
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Constructing a map of an anonymous graph: applications of universal sequences
PublikacjaWe study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publikacja. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Prediction of Processor Utilization for Real-Time Multimedia Stream Processing Tasks
PublikacjaUtilization of MPUs in a computing cluster node for multimedia stream processing is considered. Non-linear increase of processor utilization is described and a related class of algorithms for multimedia real-time processing tasks is defined. For such conditions, experiments measuring the processor utilization and output data loss were proposed and their results presented. A new formula for prediction of utilization was proposed...
-
The Large Customer Reactive Power Control Possibilities
Publikacjan this paper the authors wish to draw attention to the rationale for, and the possibility of, the use of local reactive power sources by the Transmission Node Master Controller (TNMC). Large Customers (LC) are one of the possible reactive power sources. The paper presents the issues related to the need for coordination between the control systems installed in the LC network, and coordination between control systems of the LC as...
-
Robust four-node elements based on Hu–Washizu principle for nonlinear analysis of Cosserat shells
PublikacjaMixed 4-node shell elements with the drilling rotation and Cosserat-type strain measures based onthe three-field Hu–Washizu principle are proposed. In the formulation, apart from displacement and rotationfields, both strain and stress resultant fields are treated as independent. The elements are derived in the frame-work of a general nonlinear 6-parameter shell theory dedicated to the analysis of multifold irregular shells.The...
-
Result of the 6-min walk test is an independent prognostic factor of surgically treated non-small-cell lung cancer
PublikacjaPathological tumour, node and metastasis (TNM) stage remains the most significant prognostic factor of non-small-cell lung cancer (NSCLC). Meanwhile, age, gender, pulmonary function tests, the extent of surgical resection and the presence of concomitant diseases are commonly used to complete the prognostic profile of the patient with early stage of NSCLC. The aim of this study is to assess how the result of a 6-min walk test (6MWT)...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
On FEM analysis of Cosserat-type stiffened shells. Static and stability linear analysis
PublikacjaThe present research investigates the theory and numerical analysis of shells stiffened with beams in the framework based on the geometrically exact theories of shells and beams. Shell’s and beam’s kinematics are described by the Cosserat surface and the Cosserat rod respectively, which are consistent including deformation and strain measures. A FEM approximation of the virtual work principle leads to the conforming shell and beam...
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublikacjaWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
Modal analysis of a fish-belly flap type of steel water gate
PublikacjaABSTRACT: The results of a modal analysis of the fish-belly flap type of steel water gate are presented in the paper. The analysis was conducted for a detailed numerical model of the structure using four-node quadrilateral shell elements. The study was focused on the examination of the influence of positioning of the flap gate and hydrostatic pressure of water on the eigenvalues and eigenmodes of the structure. The results of the study...
-
The validation process of truss model with joint eccentricities
PublikacjaNowadays, due to the technological reasons in modern lightweight steel trusses, fabricated from cold-formed sections, positive eccentricities appear in the truss nodes, to induce additional forces truss chords. In order to account for the real load-carrying capacity of truss node area the steel structure research was conducted in scale 1:1. As a result of experimental research, the forms of deformation and strains of the walls...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublikacjaIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublikacjaDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...
-
Performance of FAN conception of traffic control in IP QoS networks
PublikacjaIn this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...
-
Energy Consumption Modeling in SPMD and DAC Applications
PublikacjaIn this chapter, we show a study of energy consumption during execution of SPMD and DAC application – the same applications which time of execution we modeled in the previous two chapters. We measured an average power usage at a single node of the GALERA+ cluster during application execution and then we modeled the total energy consumption by the application. Next we simulated the applications using MERPSYS and we compared the...
-
More Just Measure of Fairness for Sharing Network Resources
PublikacjaA more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...
-
The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface
PublikacjaIn the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...
-
Finding small-width connected path decompositions in polynomial time
PublikacjaA connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublikacjaIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Modeling of truss with cold-formed section and positive eccentricity in the node
PublikacjaThis work is dedicated to establishing the load carrying capacity of tensed and compressed truss’ nodes made of cold-formed open cross sections. The occurrence of bending in the truss’ nodes is the result of a specific production technology for system lattice girders assumed by the designer and the producer. The aim of this research is to present the methodology of conduct for creation of computational models that best depict the...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublikacjaDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublikacjaIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Distributed state estimation using a network of asynchronous processing nodes
PublikacjaWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublikacjaIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Analysis of measurement uncertainty for contact-less method used to measure the position of catenary contact wire, performed with the use of Monte Carlo method
PublikacjaCurrently the majority of main railway lines in Europe are electrified, and electric trains have the biggest share in the entire amount of rail transport. Reliability of electrified railways is closely related to the issue of supplying traction vehicles with energy. The problems connected with diagnostics of energy consumption node, namely the contact line and the current collector, are therefore of fundamental importance for maintaining...
-
Distributed state estimation using a network of asynchronous processing nodes
PublikacjaWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Analiza i ocena smarności olejów w ujęciu energetycznym i działania układu tribologicznego = Analysis and evaluation of oil lubricity from the viewpoint of energy apects and of the tribological system action
PublikacjaBased on measurement results, an interpretation is presented of the tribological system boundary layer action in the form of a four-ball tester friction node. The evaluation was performed of the boundary layer action understood as transfer of energy Ep resulting from loading the tribological system in a determined time t with work Lp, which may lead to breaking the boundary layer. That energy and time are the values unequivocally...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Efficiency of service recovery in scale-free optical networks under multiple node failures
PublikacjaIn this paper we examine the properties of scale-free networks in case of simultaneous failures of two networknodes. Survivability assumptions are as follows: end-to-end path protection with two node-disjoint backup pathsfor each working path. We investigate three models of scale-free networks generation: IG, PFP and BA.Simulations were to measure the lengths of active and backup paths and the values of service recovery time.We...
-
Influence of lubricating oil improvers on performance of crankshaft seals
PublikacjaThis paper presents an original method for checking influence of lubricating oil improvers on performance of crankshaft seals of combustion piston engine. Crankshaft seals were tested with the use of a modified friction node of T-02 four- ball apparatus in laboratory conditions. The tests were conducted according to a worked-out algorithm. Their results confirmed usefulness of the method for determining „harmful” performance...
-
Use of ICT infrastructure for teaching HPC
PublikacjaIn this paper we look at modern ICT infrastructure as well as curriculum used for conducting a contemporary course on high performance computing taught over several years at the Faculty of Electronics Telecommunications and Informatics, Gdansk University of Technology, Poland. We describe the infrastructure in the context of teaching parallel programming at the cluster level using MPI, node level using OpenMP and CUDA. We present...
-
EMI mitigation of GaN power inverter leg by local shielding techniques
PublikacjaThis paper presents local shielding techniques applied to a half-bridge inverter leg with the aim to reduce the common mode (CM) current noise at converter’s DC input. The research study is conducted for 650V Enhancement mode Gallium Nitride (GaN) power transistor switches. Main contributors of parasitic capacitances referred to the inverter-leg middle point node are identified. Then, shielding solutions are proposed to reduce...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublikacjaArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublikacjaTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
The complexity of node blocking for dags
PublikacjaRozważamy następującą grę (pomiędzy dwoma graczami) kombinatoryczną o nazwie ''node blocking''. Dany jest graf skierowany. Każdy wierzchołek może być zajęty przez co najwyżej jeden token. Wyróżniamy dwa kolory tokenów, biały i czarny, każdy gracz może przemieszczać tylko własne tokeny. Gracze wykonują ruchy naprzemiennie. Ruch polega na wyborze dowolnego tokena własnego koloru i przesunięciu go na dowolnego niezajętego przez inny...