Filtry
wszystkich: 228
wybranych: 156
Filtry wybranego katalogu
Wyniki wyszukiwania dla: STRUCTURAL NODE
-
Wpływ smarowności na działania układu tribologicznego (impact of lubricity on the tribological system action)
Publikacjathe paper presents analysis and evaluation, based on tests results, of the impact of lubricity of the used lubricating oils (shell argina t 40) on the action of boundary layer of sulzer 6zl40/48 engines aboard the ''włocławek'' sea-going ship. for comparison purposes, the same oils were tested with the ceramizer four-stroke engine (all types of the vidar four-stroke engines) regeneration agent added. so understood boundary layer...
-
A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPI Applications
PublikacjaThe paper presents a fail-safe NVRAM based mechanism for creation and recovery of data copies during parallel MPI application runtime. Specifically, we target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload...
-
Reliability model of slide bearings with particular attention given to lubricating oil
PublikacjaThe paper presents the slide bearing with circulating lubrication as a system of series three-element structure, where lubricating oil is the weakest link. In accordance with the Pierce statement that ''strength of chain is the strength of its weakest link'', a bearing reliability model has been developed. It allows to use the lubricating oil to evaluate the probability of correct working of the whole slide bearing, i.e. the reliability....
-
Novel Adaptive Method for Data Streams Allocation Based on the Estimate of Radio Channel Parameters in Heterogeneous WBAN Network
PublikacjaThe new adaptive method for data streams allocation in heterogeneous Wireless Body Area Networks and meas-urement equipment is presented. The results obtained using the developed method compared with the selected algorithms likely to be used in those networks. The pro-posed adaptive data streams allocation method based on radio channel parameters makes it even twice as efficient to use in terms of resources usage in a WBAN heterogeneous...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublikacjaIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
QoS Extensions for Flow-Awareness Networks
PublikacjaThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublikacjaA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios
PublikacjaDisjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...
-
Towards truly sustainable IoT systems: the SUPERIOT project
PublikacjaThis paper provides an overview of the SUPERIOT project, an EU SNS JU (Smart Networks and Services Joint Undertaking) initiative focused on developing truly sustainable IoT systems. The SUPERIOT concept is based on a unique holistic approach to sustainability, proactively developing sustainable solutions considering the design, implementation, usage and disposal/reuse stages. The concept exploits radio and optical technologies...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublikacjaIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
A 0.5 V Nanowatt Biquadratic Low-Pass Filter with Tunable Quality Factor for Electronic Cochlea Applications
PublikacjaA novel implementation of an analogue low-power, second-order, low-pass filter with tunable quality factor (Q) is presented and discussed. The filter feature is a relatively simple, buffer-based, circuit network consisting of eleven transistors operating in a subthreshold region. Q tuning is accomplished by injecting direct current into a network node, which changes the output resistance of the transistors and, as a result, modifies...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Stress-driven nonlocal elasticity for nonlinear vibration characteristics of carbon/boron-nitride hetero-nanotube subject to magneto-thermal environment
PublikacjaStress-driven nonlocal theory of elasticity, in its differential form, is applied to investigate the nonlinear vibrational characteristics of a hetero-nanotube in magneto-thermal environment with the help of finite element method. In order to more precisely deal with the dynamic behavior of size-dependent nanotubes, a two-node beam element with six degrees-of freedom including the nodal values of the deflection, slope and curvature...
-
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix
PublikacjaIn this paper we build on our previously proposed MPI I/O NVRAM distributed cache for high performance computing. In each cluster node it incorporates NVRAMs which are used as an intermediate cache layer between an application and a file for fast read/write operations supported through wrappers of MPI I/O functions. In this paper we propose optimizations of the solution including handling of write requests with a synchronous mode,...
-
Radio Channel Measurements in 868 MHz Off-Body Communications in a Ferry Environment
PublikacjaIn this paper, a characterization of the 868 MHz off-body radio channel in BANs is presented. Measurements were carried out in a ferry environment using a specific set-up. A method for path loss using radio distance measurements (RDMs) was developed. It allows to automate the measurements process and make it independent from the variable speed of a moving person. Based on the observed path loss as a function of distance, the obtained...
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublikacjaIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Performance and Energy Aware Training of a Deep Neural Network in a Multi-GPU Environment with Power Capping
PublikacjaIn this paper we demonstrate that it is possible to obtain considerable improvement of performance and energy aware metrics for training of deep neural networks using a modern parallel multi-GPU system, by enforcing selected, non-default power caps on the GPUs. We measure the power and energy consumption of the whole node using a professional, certified hardware power meter. For a high performance workstation with 8 GPUs, we were...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublikacjaThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublikacjaThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Comprehensive Review of Fluorescence Applications in Gynecology
PublikacjaSince the introduction of indocyanine green (ICG) as a fluorophore in near-infrared imaging, fluorescence visualization has become an essential tool in many fields of surgery. In the field of gynecology, recent new applications have been proposed and found their place in clinical practice. Different applications in gynecology were investigated, subcategorized, and overviewed concerning surgical applications and available dyes....
-
Multi-agent large-scale parallel crowd simulation
PublikacjaThis paper presents design, implementation and performance results of a new modular, parallel, agent-based and large scale crowd simulation environment. A parallel application, implemented with C and MPI, was implemented and run in this parallel environment for simulation and visualization of an evacuation scenario at Gdansk University of Technology, Poland and further in the area of districts of Gdansk. The application uses a...
-
Drawing maps with advice
PublikacjaW pracy podejmujemy temat konstrukcji algorytmu dla agenta, który zostaje umieszczony w dowolnym wierzchołku grafu (wierzchołki są nierozróżnialne, krawędzie mają etykiety portów), po czym realizuje algorytm zmierzający do znalezienia drzewa spinającego grafu lub izomorficznej kopii grafu. Dla obu problemów podajemy asymptotycznie dokładne lub prawie dokładne oszacowania na ilość bitów dodatkowej informacji, którą agent musi otrzymać...
-
Metal–Organic Frameworks (MOFs) for Cancer Therapy
PublikacjaMOFs exhibit inherent extraordinary features for diverse applications ranging from catalysis, storage, and optics to chemosensory and biomedical science and technology. Several procedures including solvothermal, hydrothermal, mechanochemical, electrochemical, and ultrasound techniques have been used to synthesize MOFs with tailored features. A continued attempt has also been directed towards functionalizing MOFs via “post-synthetic...
-
Diagnostic Model of Crankshaft Seals
PublikacjaT he paper presents a research stand being a diagnostic model of radial lip seals used, among others, on crankshafts of piston combustion engines in order to identify the correctness of their operation. The possibility of determining the technical condition of lip seals on the basis of the proposed coefficient of correctness of operation has been described. T he basic features of seals influencing their correctness of...
-
Nodal models of Pressurized Water Reactor core for control purposes – A comparison study
PublikacjaThe paper focuses on the presentation and comparison of basic nodal and expanded multi-nodal models of the Pressurized Water Reactor (PWR) core, which includes neutron kinetics, heat transfer between fuel and coolant, and internal and external reactivity feedback processes. In the expanded multi-nodal model, the authors introduce a novel approach to the implementation of thermal power distribution phenomena into the multi-node...
-
KernelHive: a new workflow-based framework for multilevel high performance computing using clusters and workstations with CPUs and GPUs
PublikacjaThe paper presents a new open-source framework called KernelHive for multilevel parallelization of computations among various clusters, cluster nodes, and finally, among both CPUs and GPUs for a particular application. An application is modeled as an acyclic directed graph with a possibility to run nodes in parallel and automatic expansion of nodes (called node unrolling) depending on the number of computation units available....
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublikacjaWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
A distributed system for conducting chess games in parallel
PublikacjaThis paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...
-
Prognostic and diagnostic capabilities of OOBN in assessing investment risk of complex construction projects
PublikacjaModelling decision problems using Bayesian networks is extremely valuable especially in case of issues related to uncertainty; it is also very helpful in constructing and understanding visual representation of the elements and their relations. This approach facilitates subsequent application of Bayesian networks, however there can be situations where using simple Bayesian networks is impractical or even ineffective. The aim of...
-
The mechanisms of technological innovation in SMEs: a Bayesian Network Analysis of EU regional policy impact on Polish firms.
PublikacjaWe study the underlying mechanisms of technological innovation in SMEs in the context of ex-post evaluation of European Union’s regional policy. Our aim is to explain the observed change in firms’ innovativeness after receiving EU support for technological investment. To do so, we take an approach that is novel in innovation studies: a Bayesian Network Analysis to assess the effectiveness of EU policy instrument for technological...
-
Collaborative Delivery by Energy-Sharing Low-Power Mobile Robots
PublikacjaWe study two variants of delivery problems for mobile robots sharing energy. Each mobile robot can store at any given moment at most two units of energy, and whenever two robots are at the same location, they can transfer energy between each other, respecting the maximum capacity. The robots operate in a simple graph and initially each robot has two units of energy. A single edge traversal by an robot reduces its energy by one...
-
THREE-LEVEL F-TYPE INVERTER
PublikacjaGiven the recent available IGBT switch modules up to 6.5 kV, 1200 A rating, the prospect of the diode-free variant topology of the three-level neutral-point-clamped (3-level, T-type) inverter in certain medium voltage applications is bright; due to its small part count and low conduction losses compared to the diode-clamped NPC inverter. However, within this voltage range, the input dc voltage rating of 50% of the switches per...
-
Condition-Based Monitoring of DC Motors Performed with Autoencoders
PublikacjaThis paper describes a condition-based monitoring system estimating DC motor degradation with the use of an autoencoder. Two methods of training the autoencoder are evaluated, namely backpropagation and extreme learning machines. The root mean square (RMS) error in the reconstruction of successive fragments of the measured DC motor angular-frequency signal, which is fed to the input of autoencoder, is used to determine the health...
-
Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
PublikacjaThis document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled...
-
Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring
PublikacjaOne of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...
-
Theoretical modelling of efficient fire safety water networks by certified domination
PublikacjaThis paper explores a new way of designing water supply networks for fire safety using ideas from graph theory, focusing on a method called certified domination. Ensuring a good water supply is crucial for fire safety in communities, this study looks at the rules and problems in Poland for how much water is needed to fight fires in different areas and how this can be achieved at a lowest possible cost. We present a way to plan...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublikacjaIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Higher platelet counts correlate to tumour progression and can be induced by intratumoural stroma in non-metastatic breast carcinomas
PublikacjaBackground Platelets support tumour progression. However, their prognostic significance and relation to circulating tumour cells (CTCs) in operable breast cancer (BrCa) are still scarcely known and, thus, merit further investigation. Methods Preoperative platelet counts (PCs) were compared with clinical data, CTCs, 65 serum cytokines and 770 immune-related transcripts obtained using the NanoString technology. Results High normal...
-
Distributed Evacuation in Graphs with Multiple Exits
PublikacjaWe consider the problem of efficient evacuation using multiple exits. We formulate this problem as a discrete problem on graphs where mobile agents located in distinct nodes of a given graph must quickly reach one of multiple possible exit nodes, while avoiding congestion and bottlenecks. Each node of the graph has the capacity of holding at most one agent at each time step. Thus, the agents must choose their movements strategy...
-
Stationary underwater channel experiment: Acoustic measurements and characteristics in the Bornholm area for model validations
PublikacjaThe underwater acoustical channel is time-variant, and even on small time scales there is often existing no ‘acoustical frozen ocean’. Popular is the use of WSSUS-channel transmission modeling (Wide-Sense Stationary Uncorrelated Scattering) for the stochastic description of bandpass signals in GSM mobile phones with moving participants; since this results in a halved number of model parameters. For underwater sound applications...
-
Rendezvous of Distance-Aware Mobile Agents in Unknown Graphs
PublikacjaWe study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
FAILURE OF MAGNETIC FLUID SEALS OPERATING IN WATER: PRELIMINARY CONCLUSIONS
PublikacjaThe article analyses properties of magnetic fluid seals installed in rotary sealing no des which operate in the utility water environment. Seals of this type have been examined as a possible solution to the problem with ship manoeuvring propulsion sealing. The present analysis bases on laboratory durability tests of magnetic fluid seals expo sed to long - term utility water loads, at different water pressures and shaft revolutions....
-
Game Theory Analysis of Bidding for a Construction Contract
PublikacjaThe authors are concerned with a bidding problem. There are two companies (P1 and P2) bidding for a highway construction project. In order to be more competitive, P1 considers buying a new gravel pit near the construction site. The basic cost of the pit is known to both companies. However, there is also an additional, hidden, cost (C) known only to P1. P2 is uncertain whether the hidden cost is C = 0 or C = x. P1 plans to bid for...
-
Compact Quasi-Elliptic-Type Inline Waveguide Bandpass Filters With Nonlinear Frequency-Variant Couplings
PublikacjaThis work presents the design techniques to synthesize a class of compact inline quasi-elliptic-type waveguide cavity bandpass filters based on novel nonlinear frequency-variant couplings (NFVCs). These highly dispersive frequency-variant couplings (FVCs) are realized by means of a pair of partial-height posts that are placed at the junctions between every two cavity resonators. Each NFVC produces a transmission pole in between...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublikacjaLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...