Filtry
wszystkich: 1526
wybranych: 1254
-
Katalog
- Publikacje 1254 wyników po odfiltrowaniu
- Czasopisma 81 wyników po odfiltrowaniu
- Konferencje 67 wyników po odfiltrowaniu
- Osoby 72 wyników po odfiltrowaniu
- Projekty 3 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 27 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 20 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: LINGUISTIC SEMANTIC NETWORKS
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublikacjaUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublikacjaCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Grade of service determination methodology in IP networks with SIP protocol
PublikacjaAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
A Ubiquitous System Using Semantic Knowledge in Dynamic Service Integration
Publikacja -
A Hyperdense Semantic Domain for Discontinuous Behavior in Physical System Models
PublikacjaMultiple time models have been proposed for the formalization of hybrid dynamic system behavior. The superdense notion of time is a well-known time model for describing event-based systems where several events can occur simultaneously. Hyperreals provide a domain for defining the semantics of hybrid models that is elegantly aligned with first principles in physics. This paper discusses the value of both time models and shows how...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublikacjaDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Comparison of centralized and decentralized preemption in MPLS networks
PublikacjaPreemption is one of the crucial parts of the traffic engineering in MPLS networks. It enables allocation of high-priority paths even if the bandwidth on the preferred route is exhausted. This is achieved by removing previously allocated low-priority traffic, so as enough free bandwidth becomes available. The preemption can be performed either as a centralized or a decentralized process. In this article we discuss the differences...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Routing decisions independent of queuing delays in broadband leo networks
PublikacjaThis paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...
-
Network lifetime maximization in wireless mesh networks for machine-to-machine communication
Publikacja -
Theoretical modelling of efficient fire safety water networks by certified domination
PublikacjaThis paper explores a new way of designing water supply networks for fire safety using ideas from graph theory, focusing on a method called certified domination. Ensuring a good water supply is crucial for fire safety in communities, this study looks at the rules and problems in Poland for how much water is needed to fight fires in different areas and how this can be achieved at a lowest possible cost. We present a way to plan...
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublikacjaFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublikacjaOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublikacjaIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublikacjaPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
The searchlight problem for road networks
PublikacjaWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
A robust optimization model for affine/quadratic flow thinning: A traffic protection mechanism for networks with variable link capacity
Publikacja -
Buck-Boost Inverters with Symmetrical Passive Four-terminal Networks
PublikacjaAlternating Voltage Inverters (Converters) supplied by low-voltage sources DC (ex. fuel cell, photovoltaic cell) are most frequently realized on the basis of the three fundamental topologies: a) PWM voltage inverter with boost-converter" system, b) PWM voltage inverter with transformed converter DC/DC in the ,,boost-converter" system, c) PWM current converter. However none of these solutions is claimed to be the best and dominant...
-
Enhancing Performance of Switched Parasitic Antenna for Localization in Wireless Sensor Networks
PublikacjaThis paper presents an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna with enhanced performance of estimating the incoming signal direction. Designed antenna is dedicated for 2.4 GHz ISM applications with emphasis on Wireless Sensor Networks (WSN). The limitations of the existing design approach are illustrated, as well as perspectives and challenges of the proposed solution in relation to the localization in...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublikacjaSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Deep neural networks approach to skin lesions classification — A comparative analysis
PublikacjaThe paper presents the results of research on the use of Deep Neural Networks (DNN) for automatic classification of the skin lesions. The authors have focused on the most effective kind of DNNs for image processing, namely Convolutional Neural Networks (CNN). In particular, three kinds of CNN were analyzed: VGG19, Residual Networks (ResNet) and the hybrid of VGG19 CNN with the Support Vector Machine (SVM). The research was carried...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublikacjaIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Towards the boundary between easy and hard control problems in multicast Clos networks
PublikacjaIn this article we study 3-stage Clos networks with multicast calls in general and 2-cast calls, in particular. We investigate various sizes of input and output switches and discuss some routing problems involved in blocking states. To express our results in a formal way we introduce a model of hypergraph edge-coloring. A new class of bipartite hypergraphs corresponding to Clos networks is studied. We identify some polynomially...
-
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publikacja -
A MODEL FOR FORECASTING PM10 LEVELS WITH THE USE OF ARTIFICIAL NEURAL NETWORKS
PublikacjaThis work presents a method of forecasting the level of PM10 with the use of artificial neural networks. Current level of particulate matter and meteorological data was taken into account in the construction of the model (checked the correlation of each variable and the future level of PM10), and unidirectional networks were used to implement it due to their ease of learning. Then, the configuration of the network (built on the...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublikacjaThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublikacjaRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks
PublikacjaThe construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....
-
Service-based Resilience for Embedded IoT Networks
PublikacjaEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublikacjaDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublikacjaThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Inter-governmental Collaborative Networks for Digital Government Innovation Transfer -Structure, Membership, Operation
PublikacjaDigital government refers to the transformation of government organizations and their relationships with citizens, business and each other through digital technology. It entails digital innovation in processes, services, organizations, policies, etc. which are increasingly developed and tested in one country and transferred, after adaptation, to other countries. The process of innovation transfer and the underlying information...
-
Localization in wireless sensor networks using switched parasitic antennas
PublikacjaA switched parasitic monopole antenna for 2.4 GHz ISM applications is design and investigated in this paper. One of the most promising applications for such switched-beam antennas is localization in wireless sensor networks (WSN). It is demonstrated that the use of this antenna improves accuracy of localization algorithms and allows for reduction of the number of reference nodes in localization system.
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Efficiency of service recovery in scale-free optical networks under multiple node failures
PublikacjaIn this paper we examine the properties of scale-free networks in case of simultaneous failures of two networknodes. Survivability assumptions are as follows: end-to-end path protection with two node-disjoint backup pathsfor each working path. We investigate three models of scale-free networks generation: IG, PFP and BA.Simulations were to measure the lengths of active and backup paths and the values of service recovery time.We...
-
Adjusted SpikeProp algorithm for recurrent spiking neural networks with LIF neurons
PublikacjaA problem related to the development of a supervised learning method for recurrent spiking neural networks is addressed in the paper. The widely used Leaky-Integrate-and-Fire model has been adopted as a spike neuron model. The proposed method is based on a known SpikeProp algorithm. In detail, the developed method enables gradient descent learning of recurrent or multi-layer feedforward spiking neural networks. The research included...
-
Performance of LSP preemption methods in different MPLS networks
PublikacjaPreemption in Multiprotocol Label Switching (MPLS) is an optional traffic engineering technique used to create a new path of high priority when there is not enough bandwidth available. In such case the path is admitted by removing one or more previously allocated paths of lower priority. As there are usually many possible sets of low priority paths which can be selected, a preemption algorithm is being started to select the best...
-
Mobility management solutions for current IP and future networks
PublikacjaEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...
-
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Publikacja -
Internationa;isation of Firms through Networks- Empirical Evidence from Poland
PublikacjaThe aim of the article is to illustrate the role of netwiorks in the internatiuonalisation process of firms. It discuusses the evolution of academic reseach on firm internationalisation through networks and explains the relationship between network and the international behaviour of firmsas well as presnting the research results.
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublikacjaA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
Robustness in Compressed Neural Networks for Object Detection
PublikacjaModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
A new approach to design of weather disruption-tolerant wireless mesh networks
PublikacjaWireless Mesh Networks, offering transmission rates of 1–10 Gb/s per a millimeter-wave link (utilizing the 71–86 GHz band) seem to be a promising alternative to fiber optic backbone metropolitan area networks because of significantly lower costs of deployment and maintenance. However, despite providing high transmission rates in good weather conditions, high-frequency wireless links are very susceptible to weather disruptions....
-
Selected Technical Issues of Deep Neural Networks for Image Classification Purposes
PublikacjaIn recent years, deep learning and especially Deep Neural Networks (DNN) have obtained amazing performance on a variety of problems, in particular in classification or pattern recognition. Among many kinds of DNNs, the Convolutional Neural Networks (CNN) are most commonly used. However, due to their complexity, there are many problems related but not limited to optimizing network parameters, avoiding overfitting and ensuring good...
-
Diffusion equations with spatially dependent coefficients and fractal Cauer-type networks
PublikacjaIn this article, we formulate and solve the representation problem for diffusion equations: giving a discretization of the Laplace transform of a diffusion equation under a space discretization over a space scale determined by an increment h > 0, can we construct a continuous in h family of Cauer ladder networks whose constitutive equations match for all h > 0 the discretization. It is proved that for a finite differences discretization...
-
Outlier detection method by using deep neural networks
PublikacjaDetecting outliers in the data set is quite important for building effective predictive models. Consistent prediction can not be made through models created with data sets containing outliers, or robust models can not be created. In such cases, it may be possible to exclude observations that are determined to be outlier from the data set, or to assign less weight to these points of observation than to other points of observation....
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublikacjaThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...