Filtry
wszystkich: 2708
wybranych: 2038
-
Katalog
- Publikacje 2038 wyników po odfiltrowaniu
- Czasopisma 194 wyników po odfiltrowaniu
- Konferencje 63 wyników po odfiltrowaniu
- Osoby 81 wyników po odfiltrowaniu
- Projekty 4 wyników po odfiltrowaniu
- Kursy Online 43 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 282 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Computations of critical load value of composite shell with random geometric imperfections
PublikacjaThe work presents the numerical analysis of composite shell with geometric imperfections subjected to compression along its generatrix. The imperfections are described as single indentations and random fields with random parameters of shape and correlation. The fields are generated with the use of the authors made program. Using the authors’ FEM software as well as commercial package Femap with NX Nastran, the critical load values...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...
-
Critical perspectives on media architecture
Publikacja -
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Critical Success Factors for Knowledge Management in SMEs in the KIBS Sector
PublikacjaThe purpose of this paper is to examine knowledge management practices and critical success factors (CSFs) for their introduction in small and medium-sized enterprises (SMEs) in the knowledge-intensive business services (KIBS) sector. Methodology: The paper is based on the results of an exploratory qualitative survey involving owners and managers of small and medium-sized companies operating in the KIBS sector. In the survey, eight...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublikacjaIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublikacjaMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Polysaccharide-based Nanocomposites for Biomedical Applications: A Critical Review
PublikacjaPolysaccharides (PSA) are taking specific position among biomaterials for advanced applications in medicine. Nevertheless, poor mechanical properties is known as the main drawback of PSA, which highlights need for PSA modification. Nanocomposites PSA (NPSA) are a class of biomaterials widely used as biomedical platforms, but despite their importance and worldwide use have not been reviewed. Herein we critically reviewed application...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublikacjaUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Artificial intelligence for biomedical engineering of polysaccharides: A short overview.
PublikacjaThe advent of computer-aided concepts and cognitive algorithms, along with fuzzy sets and fuzzy logic thoughts, supported the idea of ‘making computers think like people’ (Lotfi A. Zadeh, IEEE Spectrum, 21 (26–32), 1984). Such a school of thought enabled the sophistication of mission-oriented...
-
Shore Construction Detection by Automotive Radar for the Needs of Autonomous Surface Vehicle Navigation
PublikacjaAutonomous surface vehicles (ASVs) are becoming more and more popular for performing hydrographic and navigational tasks. One of the key aspects of autonomous navigation is the need to avoid collisions with other objects, including shore structures. During a mission, an ASV should be able to automatically detect obstacles and perform suitable maneuvers. This situation also arises in near-coastal areas, where shore structures like...
-
Integration Data Model of the Bathymetric Monitoring System for Shallow Waterbodies Using UAV and USV Platforms
PublikacjaChanges in the seafloor relief are particularly noticeable in shallow waterbodies (at depths up to several metres), where they are of significance for human safety and environmental protection, as well as for which the highest measurement accuracy is required. The aim of this publication is to present the integration data model of the bathymetric monitoring system for shallow waterbodies using Unmanned Aerial Vehicles (UAV) and...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublikacjaCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Space Mission Risk, Sustainability and Supply Chain: Review, Multi-Objective Optimization Model and Practical Approach
Publikacja -
The KLC Cultures Synergy for Organizational Agility. Trust, Risk-Taking Attitude, and Critical Thinking as Moderators
PublikacjaOrganizational agility is visible in organizational change adaptability, and it is based on the development of dynamic capabilities, strategic sensitivity of leaders, accuracy and timing of decision-making, learning aptitude, flexibility in thinking and acting, and smooth resource flow across organizations, including the knowledge resource. In such a context, this study aimed to expose how the knowledge, learning, and collaboration...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Grade of service determination methodology in IP networks with SIP protocol
PublikacjaAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublikacjaDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Comparison of centralized and decentralized preemption in MPLS networks
PublikacjaPreemption is one of the crucial parts of the traffic engineering in MPLS networks. It enables allocation of high-priority paths even if the bandwidth on the preferred route is exhausted. This is achieved by removing previously allocated low-priority traffic, so as enough free bandwidth becomes available. The preemption can be performed either as a centralized or a decentralized process. In this article we discuss the differences...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Routing decisions independent of queuing delays in broadband leo networks
PublikacjaThis paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...
-
Network lifetime maximization in wireless mesh networks for machine-to-machine communication
Publikacja -
Theoretical modelling of efficient fire safety water networks by certified domination
PublikacjaThis paper explores a new way of designing water supply networks for fire safety using ideas from graph theory, focusing on a method called certified domination. Ensuring a good water supply is crucial for fire safety in communities, this study looks at the rules and problems in Poland for how much water is needed to fight fires in different areas and how this can be achieved at a lowest possible cost. We present a way to plan...
-
Molecular Strategy for Survival at a Critical High Temperature in Eschierichia coli
PublikacjaThe molecular mechanism supporting survival at a critical high temperature (CHT) in Escherichia coli was investigated. Genome-wide screening with a single-gene knockout library provided a list of genes indispensable for growth at 47°C, called thermotolerant genes. Genes for which expression was affected by exposure to CHT were identified by DNA chip analysis. Unexpectedly, the former contents did not overlap with the latter except...
-
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublikacjaOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublikacjaIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublikacjaPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Critical review of electronic nose and tongue instruments prospects in pharmaceutical analysis
PublikacjaElectronic nose (enose, EN) and electronic tongue (etongue, ET) have been designed to simulate human senses of smell and taste in the best possible way. The signals acquired from a sensor array, combined with suitable data analysis system, are the basis for holistic analysis of samples. The efficiency of these instruments, regarding classification, discrimination, detection, monitoring and analytics of samples in different types...
-
The searchlight problem for road networks
PublikacjaWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
A robust optimization model for affine/quadratic flow thinning: A traffic protection mechanism for networks with variable link capacity
Publikacja -
Buck-Boost Inverters with Symmetrical Passive Four-terminal Networks
PublikacjaAlternating Voltage Inverters (Converters) supplied by low-voltage sources DC (ex. fuel cell, photovoltaic cell) are most frequently realized on the basis of the three fundamental topologies: a) PWM voltage inverter with boost-converter" system, b) PWM voltage inverter with transformed converter DC/DC in the ,,boost-converter" system, c) PWM current converter. However none of these solutions is claimed to be the best and dominant...
-
Resonant DC link inverters for AC motor drive systems – critical evaluation
PublikacjaIn this survey paper, resonant and quasiresonant DC link inverters are reexamined for AC motor drive applications. Critical evaluation of representative topologies is based on simulation and waveform analysis to characterize current/voltage stress of components, control timing constraints and feasibility. A special concern over inverter common-mode voltage and voltage gradient du/dt limitation capacity is discussed for motor bearing...
-
Enhancing Performance of Switched Parasitic Antenna for Localization in Wireless Sensor Networks
PublikacjaThis paper presents an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna with enhanced performance of estimating the incoming signal direction. Designed antenna is dedicated for 2.4 GHz ISM applications with emphasis on Wireless Sensor Networks (WSN). The limitations of the existing design approach are illustrated, as well as perspectives and challenges of the proposed solution in relation to the localization in...
-
Jak opomiarować kolektor grawitacyjny?
PublikacjaNie wszystkie gminy wykonujące zadania w zakresie zbiorowego zaopatrzenia w wodę i zbiorowego odprowadzania ścieków posiadają własne oczyszczalnie. Rozwiązaniem jest tranzyt ścieków do innej oczyszczalni, ale w takim przypadku pojawia się problem pomiaru ich ilości. W artykule przedstawiono wykorzystanie przepływomierzy elektromagnetycznych do pomiaru przepływu ścieków na przykładzie systemu wdrożonego przez MPWiK w Milanówku
-
AUGMENTATION OF THE CRITICAL HEAT FLUX IN WATER-Al2O3, WATER-TiO2 AND WATER-Cu NANOFLUIDS
PublikacjaThe main aim of the proposed study is therefore recognition of the phenomena accompanying nucleate boiling crisis of selected nanofluids during boiling on horizontal tubes of various outside diameters. Of particular interest is impact of contact angle and tube diameter on the value of critical heat flux. The results obtained should give more light on the nature of nucleate boiling crisis and will serve as a basis for future theoretical...
-
Weakly connected domination critical graphs
PublikacjaPraca dotyczy niektórych klas grafów krytycznych ze względu na liczbę dominowania słabo spójnego.
-
The upper critical field in doped MgCNi3
PublikacjaDyskutowany jest wpływ domieszkowania MgCNi3 na górne pole krytyczne (H_c2). H_c2 monotonicznie maleje wraz ze wzrostem koncentracji domieszki. Silniejszy wpływ widoczny w przypadku domieszkowania Fe może być tłumaczony poprzez efekt rozrywania nadprzewodzących par Coopera poprzez centra magnetyczne tworzone przez domieszki Fe.
-
Determination of the minimal critical rotational speeds of the circular saw blades with the quasi-twin resonant frequencies
PublikacjaTo determine the minimal critical rotational speeds of the circular saw blades is the fundamental aspect of obtaining the range of the rotational operating speeds, by which the circular saw blade can work with required stability. While for the circular saw blades with full-homogeneous bodies the determination of such rotational speeds is the relatively low level of difficulty function, whereas for circular saw blades with more...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublikacjaSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Deep neural networks approach to skin lesions classification — A comparative analysis
PublikacjaThe paper presents the results of research on the use of Deep Neural Networks (DNN) for automatic classification of the skin lesions. The authors have focused on the most effective kind of DNNs for image processing, namely Convolutional Neural Networks (CNN). In particular, three kinds of CNN were analyzed: VGG19, Residual Networks (ResNet) and the hybrid of VGG19 CNN with the Support Vector Machine (SVM). The research was carried...
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublikacjaIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Towards the boundary between easy and hard control problems in multicast Clos networks
PublikacjaIn this article we study 3-stage Clos networks with multicast calls in general and 2-cast calls, in particular. We investigate various sizes of input and output switches and discuss some routing problems involved in blocking states. To express our results in a formal way we introduce a model of hypergraph edge-coloring. A new class of bipartite hypergraphs corresponding to Clos networks is studied. We identify some polynomially...