Filtry
wszystkich: 2826
wybranych: 2399
-
Katalog
- Publikacje 2399 wyników po odfiltrowaniu
- Czasopisma 53 wyników po odfiltrowaniu
- Konferencje 27 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 64 wyników po odfiltrowaniu
- Projekty 6 wyników po odfiltrowaniu
- Kursy Online 12 wyników po odfiltrowaniu
- Wydarzenia 5 wyników po odfiltrowaniu
- Dane Badawcze 259 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: TRANSITION NETWORK GRAPHS
-
The Central European GNSS Research Network (CEGRN) dataset
PublikacjaThe Central European GNSS Research Network (CEGRN) collects GNSS data since 1994 from contributors which today include 42 Institutions in 33 Countries. CEGRN returns a dataset of coordinates and velocities computed according to international standards and the most recent processing procedures and recommendations. We provide a dataset of 1229 positions and velocities resulting from 3 or more repetitions of coordinate measurements...
-
A Bayesian regularization-backpropagation neural network model for peeling computations
PublikacjaA Bayesian regularization-backpropagation neural network (BRBPNN) model is employed to predict some aspects of the gecko spatula peeling, viz. the variation of the maximum normal and tangential pull-off forces and the resultant force angle at detachment with the peeling angle. K-fold cross validation is used to improve the effectiveness of the model. The input data is taken from finite element (FE) peeling results. The neural network...
-
Controlling computer by lip gestures employing neural network
PublikacjaResults of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....
-
Edge subdivision and edge multisubdivision versus some domination related parameters in generalized corona graphs
PublikacjaGiven a graph G= (V, E), the subdivision of an edge e=uv∈E(G) means the substitution of the edge e by a vertex x and the new edges ux and xv. The domination subdivision number of a graph G is the minimum number of edges of G which must be subdivided (where each edge can be subdivided at most once) in order to increase the domination number. Also, the domination multisubdivision number of G is the minimum number of subdivisions...
-
5G Technologies in Intelligent Transport Systems - Architectures, Virtualization and Network Slicing
PublikacjaIn the paper, 5G communication technologies implemented for Intelligent Transport Systems are discussed. Firstly, the essence of the 5G system concept is presented, and the problem of network functions virtualization (NFV) is analyzed. Moreover, the principle of virtualization is explained. Secondly, the analysis of network slicing is performed, from the point of view of transport systems implementation in the...
-
Digital Audio Broadcasting or Webcasting: A Network Quality Perspective
PublikacjaIn recent years, many alternative technologies of delivering audio content have emerged, with different advantages and disadvantages. In this paper pros and cons of digital audio broadcasting and webcasting transmission techniques in a network quality perspective are described. A case study of user expectations with respect to currently available services is analyzed, and the perceived quality of real digital broadcasted and webcasted...
-
Cellular network quality evaluation at a university campus on the eve of 5G
PublikacjaThanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...
-
Insulator to correlated metal transition in V1−xMoxO2
PublikacjaDyskutowane jest przejście typu izolatro - metal w domieszkowanym atomami Molibdenu związku V1-xMoxO2. Prezentowany jest diagram fazowy.
-
Magnetic and structural phase transition in Ni50Mn35.5In14.5 ribbon
Publikacja -
Quasiharmonic approach to a second-order phase transition
Publikacja -
Phonon Mechanism of the Magnetostructural Phase Transition in MnAs
Publikacja -
Dynamics of Railway Vehicles Movement on Transition Curves
Publikacja -
Insulator to correlated metal transition inV1−xMoxO2
Publikacja -
Stability and phase transition investigation of olanzapine polymorphs
PublikacjaWe use electrical embedded-fragment QM method with both DFT/ωB97XD/6-31G* and MP2/6-31G* to investigate the phase transformations of olanzapine. Gibbs free energy calculations predict that form I is always the most stable structure and form II is the least stable one, while form IV is more stable than form III below about 200 K but less stable above this temperature, implying a polymorphic phase transformation. This may account...
-
Research on protection mechanisms of Resilient Packet Ring Network.
PublikacjaPaper describes iSteering - a new method to control traffic in case of RPR network failure. There's comparison of packet wrapping, steering and our proposed method iSteering, which can be used in case of transmitter/receiver or fiber failure. Numerical analysis for even and random traffic flow has been made in order to compare packet wrapping, steering and iSteering. The results of all the tests are included.
-
Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Modelling of network schedule including priority of selected technical resources
PublikacjaThe paper presents a method of network planning CPM – Critical Path Method. The author compares models of optimal solutions to design deadlines for individual works, taking various leading technical resources such as is labor and a tower crane into account.
-
Performance Evaluation of a Multidomain IMS/NGN Network Including Service and Transport Stratum
PublikacjaThe Next Generation Network (NGN) architecture was proposed for delivering various multimedia services with guaranteed quality. For this reason, the elements of the IP Multimedia Subsystem (IMS) concept (an important part of 4G/5G/6G mobile networks) are used in its service stratum. This paper presents comprehensive research on how the parameters of an IMS/NGN network and traffic sources influence mean Call Set-up Delay (E(CSD))...
-
Traffic Type Influence on QoS Network Performance of Streaming Traffic Class
PublikacjaFeasibility study on QoS routing proved that the traffic type influence the network performance. The performance is defined here as a number of packets serviced by the network. In the paper additional element - buffers lengths used in service system was verified in terms of dependencies with routing performance. We present results obtained by simulation for many simulation scenarios. Analysis was done for two different network...
-
A method of the UMTS-FDD network design based on universal load characteristics
PublikacjaIn the paper an original method of the UMTS radio network design was presented. The method is based on simple way of capacity-coverage trade-off estimation for WCDMA/FDD radio interface. This trade-off is estimated by using universal load characteristics and normalized coverage characteristics. The characteristics are useful for any propagation environment as well as for any service performance requirements. The practical applications...
-
Digits Recognition with Quadrant Photodiode and Convolutional Neural Network
PublikacjaIn this paper we have investigated the capabilities of a quadrant photodiode based gesture sensor in the recognition of digits drawn in the air. The sensor consisting of 4 active elements, 4 LEDs and a pinhole was considered as input interface for both discrete and continuous gestures. Index finger and a round pointer were used as navigating mediums for the sensor. Experiments performed with 5 volunteers...
-
Intelligent turbogenerator controller based on artifical neural network
PublikacjaThe paper presents a desing of an intelligent controller based on neural network (ICNN). The ICNN ensures at the same time two fundamental functions : the maintaining of generator voltage at the desired value and the damping of the electromechanical oscillations. Its performance is evaluted on a single machine infinite bus power system through computer simulations. The dynamic and transient operation of the proposed controller...
-
Pathological brain network activity: memory impairment in epilepsy
PublikacjaOur thinking, memory and cognition in general, relies upon precisely timed interactions among neurons forming brain networks that support cognitive processes. The surgical evaluation of drug-resistant epilepsy using intracranial electrodes provides a unique opportunity to record directly from human brain and to investigate the coordinated activity of cognitive networks. In this issue of Neurology®, Kleen and colleagues1 implicate...
-
Global Digital Technology Convergence: Driving Diffusion via Network Effects
PublikacjaSince the 1970s, we have witnessed unprecedented diffusion of digital technologies in both speed and geographic coverage. These technologies are pervasive and disruptive, and lead to profound shifts and transformations in societies and economies. Many claim that emerging network externalities are the principal phenomenon driving the process of technology diffusion and determining its in-time dynamics. This book analyses the unique...
-
Multi Queue Approach for Network Services Implemented for Multi Core CPUs
PublikacjaMultiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also computer networking. Since the key functionality of network core components is fast package servicing, multicore technology, due to multi tasking ability, seems useful to support packet processing. Dedicated...
-
Brand loyalty creation in the social network. Does the product category matter?
PublikacjaThe final goal of all marketers’ effort is to achieve a high level of loyalty toward their brands. Social network brand sites are increasingly attracting the attention of scientists and managers intrigued by their potential application for brand loyalty creation. The aim of this research, based on European sample, is to fill the gap in understanding the product category loyalty and brand loyalty relation as an output of brand identification...
-
Non-isolated resonant quasi-Z-source network DC–DC converter
PublikacjaA novel non-isolated resonant quasi-impedance (quasi-Z)-source network DC–DC converter is proposed. The resonant impedance source network is derived from the quasi-Z-source network by including the autotransformer-based resonant cell instead of the second inductor of the quasi-Z-network. The leakage inductance of the autotransformer and two resonant capacitors connected in series with the autotransformer windings constitute a high-frequency...
-
Evaluation of a sat-type fairness mechanism implemented in a dual-ring network
PublikacjaThe fairness problem was presented. Popular fairness concepts and measures were shown. The RPR fairness mechanism and the SAT mechanism were described. A modification of the SAT algorithm, adapted to the possibilities of Ethernet cards used for implementation of a dual-ring RPR-based network, was proposed. Performance of the proposed modification was measured. Jain's and Chen's fairness indexes were calculated. Effectiveness comparison...
-
Sum Coloring of Bipartite Graphs with Bounded Degree
Publikacja -
Strong weakly connected domination subdivisible graphs
PublikacjaArtykuł dotyczy wpływu podziału krawędzi na liczbę dominowania słabo spójnego. Charakteryzujemy grafy dla których podział dowolnej krawędzi zmienia liczbę dominowania słabo spójnego oraz grafy dla których podział dowolnych dwóch krawędzi powoduje zmianę liczby dominowania słabo spójnego.
-
On extremal sizes of locally k-tree graphs
PublikacjaA graph G is a locally k-tree graph if for any vertex v the subgraph induced by the neighbours of v is a k-tree, k>=0, where 0-tree is an edgeless graph, 1-tree is a tree. We characterize the minimum-size locally k-trees with n vertices. The minimum-size connected locally k-trees are simply (k + 1)-trees. For k >= 1, we construct locally k-trees which are maximal with respect to the spanning subgraph relation. Consequently, the...
-
program verification strategy and edge ranking of graphs
PublikacjaW artykule rozważamy model, w którym zakładamy, że dany jest zbiór asercji/testów dla pewnych bloków programu. Celem jest znalezienie optymalnej, tzn. wymagającej wykonania minimalnej liczby testów strategii wyszukiwania błędu w kodzie programu. Pomimo założenia w modelu, iż program posiada dokładnie jeden błąd, rozważania można uogólnić na testowanie kodu z dowolną liczbą błędów. Analizujemy teoretyczne własności tego modelu oraz...
-
Parallel query processing and edge ranking of graphs
PublikacjaArtykuł poświęcony jest problemowi szukania drzewa spinającego o minimalnym uporządkowanym indeksie chromatycznym. Jednym z zastosowań jest poszukiwanie optymalnych harmonogramów w równoległym przetwarzaniu zapytań w relacyjnych bazach danych. Podajemy nowe oszacowanie funkcji dobroci przybliżonego algorytmu autorstwa Makino, Uno i Ibaraki wraz z rezultatami testów komputerowych przeprowadzonych dla grafów losowych.
-
Sum coloring of bipartite graphs with bounded degree.
PublikacjaArtykuł poświęcony jest złożoności obliczeniowej zagadnienia sumacyjnego kolorowania grafów dwudzielnych o ograniczonym stopniu. Zawiera dowód tego, że sumacyjne kolorowanie grafów dwudzielnych stopnia mniejszego równego 5 jest NP-zupełne oraz opis wielomianowego algorytmu, który optymalnie sumacyjnie koloruje grafy dwudzielne podkubiczne.
-
Cholesky factorization of matrices in parallel and ranking of graphs.
PublikacjaUporządkowane kolorowanie znajduje zastosowanie przy równoległej faktoryzacji macierzy metodą Cholesky'ego. Praca zawiera opis tego zastosowania. Podano także algorytmy optymalnego uporządkowanego kolorowania krawędzi pewnych klas grafów: grafów pełnych dwudzielnych oraz powstałych z pełnych dwudzielnych przez usunięcie O(log n) krawędzi.
-
Graphs with convex domination number close to their order
PublikacjaW pracy opisane są grafy z liczbą dominowania wypukłego bliską ilości ich wierzchołków.
-
Graphs with equal domination and certified domination numbers
PublikacjaA setDof vertices of a graphG= (VG,EG) is a dominating set ofGif every vertexinVG−Dis adjacent to at least one vertex inD. The domination number (upper dominationnumber, respectively) ofG, denoted byγ(G) (Γ(G), respectively), is the cardinality ofa smallest (largest minimal, respectively) dominating set ofG. A subsetD⊆VGis calleda certified dominating set ofGifDis a dominating set ofGand every vertex inDhas eitherzero...
-
Bipartite theory of graphs: outer-independent domination
PublikacjaLet $G = (V,E)$ be a bipartite graph with partite sets $X$ and $Y$. Two vertices of $X$ are $X$-adjacent if they have a common neighbor in $Y$, and they are $X$-independent otherwise. A subset $D \subseteq X$ is an $X$-outer-independent dominating set of $G$ if every vertex of $X \setminus D$ has an $X$-neighbor in $D$, and all vertices of $X \setminus D$ are pairwise $X$-independent. The $X$-outer-independent domination number...
-
Self-stabilizing algorithm for edge-coloring of graphs
PublikacjaReferat ten poświęcony jest kolorowaniu grafów w modelu rozproszonym.Podano samostabilizujący się algorytm kolorowania krawędzi grafu wraz z dowodem poprawności oraz oszacowaniem jego czasu działania.
-
Modeling of traffic safety indictors on Polish national road network
PublikacjaAlthough decreased from 2001 to 2013, Poland’s road deaths improved at a slower rate than the rest of the EU, leaving Poland as one of the worst road safety performing countries in the EU. The national road network in Poland, despite the dynamic transformation and development, still does not conform to the EU safety standards. Similar situation exists in other EU countries, particularly those in Central and Eastern Europe. Safety...
-
Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network
PublikacjaIn this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The...
-
DISTRIBUTION OF FLOWS IN A CHANNEL NETWORK UNDER STEADY FLOW CONDITIONS
PublikacjaThe article presents an algorithm for calculating the distribution of flow in a junction of open channel network under steady flow conditions. The article presents a simplified calculation algorithm used to estimate the distribution of flow in a network of channels under steady flow conditions. The presented algorithm is based on the continuity equation and a simplified energy equation. To describe the relationship between the...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublikacjaProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
The Methodology of identifying the place to install shunt compensators in the transmission network
PublikacjaThis methodology of selection and localization of static com- paper presents pensators in wide network. Proposed method is based on analysis of voltage area power profiles in the nodes of the power grid, and designating locations, In Which Voltages ex- cessively tend to change in time. Practical way of modeling the SVC device in PLANS program you Presented, as well as some example results of research.
-
Network-centric warfare: a strategy for homeland security
PublikacjaPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
PublikacjaPopularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublikacjaW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Simulation Model for Application of the SDN Concept in IMS/NGN Network Transport Stratum
PublikacjaThe paper presents a simulation model allowing examination of cooperation between two currently used telecommunication networks concepts: IP Multimedia Subsystem/Next Generation Network (IMS/NGN) and Software-Defined Networking (SDN). Application of the SDN architecture elements in IMS/NGN networks will enable unified control and management of transport resources for various transport technologies and equipment manufacturers. However,...
-
Selfie and Personal Branding Phenomena in the Context of the Network Economy. A Literature Review
PublikacjaSelf-taken pictures called “selfies” shared in social media have become a worldwide phenomenon. This is due to the increased need of human being to share to other people their daily lives and to build their own personal brand in the networked world. Despite that, the subject of personal branding has not been sufficiently discussed in academic marketing literature over the past decade. The objective of the study is to present the...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublikacjaRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...