Wyniki wyszukiwania dla: randomness generation protocols - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: randomness generation protocols

Filtry

wszystkich: 1236
wybranych: 1108

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: randomness generation protocols

  • Robustness of quantum-randomness expansion protocols in the presence of noise

    Publikacja

    - PHYSICAL REVIEW A - Rok 2013

    In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state....

    Pełny tekst do pobrania w portalu

  • Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing

    Publikacja
    • P. A. Mironowicz
    • A. Tavakoli
    • A. Hameedi
    • B. Marques
    • M. Pawłowski
    • M. Bourennane

    - NEW JOURNAL OF PHYSICS - Rok 2016

    Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...

    Pełny tekst do pobrania w portalu

  • Free randomness amplification using bipartite chain correlations

    Publikacja
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • M. Pawłowski
    • R. Ramanathan

    - PHYSICAL REVIEW A - Rok 2014

    A direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...

    Pełny tekst do pobrania w portalu

  • Applications of semi-definite optimization in quantum information protocols

    Publikacja

    - Rok 2016

    This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Properties of dimension witnesses and their semidefinite programming relaxations

    Publikacja

    - PHYSICAL REVIEW A - Rok 2014

    In this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in Li et al. [H.-W. Li, P. Mironowicz, M. Pawłowski, Z.-Q. Yin, Y.-C. Wu, S. Wang, W. Chen, H.-G. Hu, G.-C. Guo, and Z.-F. Han, Phys. Rev. A 87, 020302(R) (2013)]. This method allows us to lower bound, with semi-definite programming, the randomness obtained from random number generators based on dimension...

    Pełny tekst do pobrania w portalu

  • Elemental and tight monogamy relations in nonsignaling theories

    Publikacja

    - PHYSICAL REVIEW A - Rok 2014

    Physical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...

    Pełny tekst do pobrania w portalu

  • Quantum randomness protected against detection loophole attacks

    Publikacja
    • P. A. Mironowicz
    • G. Cañas
    • J. Cariñe
    • E. S. Gómez
    • J. F. Barra
    • A. Cabello
    • G. B. Xavier
    • G. Lima
    • M. Pawłowski

    - Quantum Information Processing - Rok 2021

    Device and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publikacja
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Rok 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Pełny tekst do pobrania w portalu

  • Relationship between semi- and fully-device-independent protocols

    Publikacja
    • H. Li
    • P. A. Mironowicz
    • M. Pawłowski
    • Z. Yin
    • Y. Wu
    • S. Wang
    • W. Chen
    • H. Hu
    • G. Guo
    • Z. Han

    - PHYSICAL REVIEW A - Rok 2013

    We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent...

    Pełny tekst do pobrania w portalu

  • Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario

    Publikacja

    - NEW JOURNAL OF PHYSICS - Rok 2023

    One of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...

    Pełny tekst do pobrania w portalu

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publikacja
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Rok 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Pełny tekst do pobrania w portalu

  • The need for new transport protocols on the INTERNET

    The TCP/IP protocol suite is widely used in IP networks, regardless of diverse environments and usage scenarios. Due to the fact of being the basic concept of organizing the work of the Internet, it is the subject of interest and constant analysis of operators, users, network researchers, and designers. The Internet is a "living" organism in which new needs appear all the time. This is particularly important due to the emerging...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • IoT protocols, architectures, and applications

    Publikacja
    • C. Buratti
    • E. G. Ström
    • L. Feltrin
    • L. Clavier
    • G. Gardašević
    • T. Blazek
    • L. Berbakov
    • T. C. Balan
    • L. Orozco-Barbosa
    • C. Anton-Haro... i 2 innych

    - Rok 2021

    The proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Structure and Randomness in Planning and Reinforcement Learning

    Publikacja

    - Rok 2021

    Planning in large state spaces inevitably needs to balance the depth and breadth of the search. It has a crucial impact on the performance of a planner and most manage this interplay implicitly. We present a novel method \textit{Shoot Tree Search (STS)}, which makes it possible to control this trade-off more explicitly. Our algorithm can be understood as an interpolation between two celebrated search mechanisms: MCTS and random...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A random signal generation method for microcontrollers with DACs

    A new method of noise generation based on software implementation of a 7-bit LFSR based on a common polynomial PRBS7 using microcontrollers equipped with internal ADCs and DACs and a microcontroller noise generator structure are proposed in the paper. Two software applications implementing the method: written in ANSI C and based on the LUT technique and written in AVR Assembler are also proposed. In the method the ADC results are...

    Pełny tekst do pobrania w portalu

  • Better understanding EMI generation of power converters

    Publikacja

    - Rok 2005

    Przedstawiono metodę przewidywania poziomu zaburzeń w układzie podwyższającym napięcie w oparciu o metodę filtracji Wienera. Pozwoliło to na określenie odpowiedzi impulsowej pomiędzy przyczyną zaburzenia (zmianą napięcia na elementach półprzewdonikowych) a zaburzeniem. Metodę zwerifikowano przy użyciu danych z symulacji oraz pomiarów w rzeczywistym obiekcie

  • An integrated method for security protocols analysis

    Publikacja
    • M. (. Olszewski

    - Rok 2008

  • Life Cycle Assessment of Analytical Protocols

    Publikacja

    Life cycle assessment is a relatively new tool for environmental management, which is becoming more and more important owing to the globalization of the world economy, where there is a need to develop standards in protecting the environment

  • Life Cycle Assessment of Analytical Protocols

    Publikacja
    • H. Janik
    • J. Kucinska-Lipka

    - Rok 2009

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops

    Publikacja

    - Rok 2019

    The web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols

    Publikacja
    • F. Canestrari
    • T. Attia
    • H. Di Benedetto
    • A. Graziani
    • P. Jaskuła
    • Y. R. Kim
    • M. Maliszewski
    • J. C. Pais
    • C. Petit
    • C. Raab... i 5 innych

    - Rok 2020

    The performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...

    Pełny tekst do pobrania w portalu

  • Comparative Review of Selected Internet Communication Protocols

    Publikacja
    • L. Kamiński
    • M. Kozłowski
    • D. Sporysz
    • K. Wolska
    • P. Zaniewski
    • R. Roszczyk

    - Foundations of Computing and Decision Sciences - Rok 2023

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A model-based approach to analysis of authentication protocols.

    Publikacja

    - Rok 2004

    W referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...

  • Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols

    Publikacja
    • P. Jaskuła
    • D. Ryś
    • F. Canestrari
    • T. Attia
    • H. Di Benedetto
    • A. Graziani
    • Y. R. Kim
    • M. Maliszewski
    • J. C. Pais
    • C. Petit... i 5 innych

    - Rok 2022

    The performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Finite element matrix generation on a GPU

    This paper presents an efficient technique for fast generation of sparse systems of linear equations arising in computational electromagnetics in a finite element method using higher order elements. The proposed approach employs a graphics processing unit (GPU) for both numerical integration and matrix assembly. The performance results obtained on a test platform consisting of a Fermi GPU (1x Tesla C2075) and a CPU (2x twelve-core...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.

    Publikacja

    - Rok 2020

    This article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...

    Pełny tekst do pobrania w portalu

  • Systematic Test Data Generation for Embedded Software

    Publikacja

    - Rok 2008

    Systematic Test Data Generation for Embedded Software

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Application of Majority Voting Protocols to Supporting Trading Decisions

    Publikacja

    A broad spectrum of analysis and prediction indicators and methods exists to support trading decisions, but no hard knowledge exist to tell in advance which of them will fit best in a given timeframe. To support trading decisions, a multi-agent self-organizing system has been proposed. The system is based on history based dynamic weight voting and selects the right indicators based on their past performance. The formal analysis...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • APPLICATION OF MAJORITY VOTING PROTOCOLS TO SUPPORTING TRADING DECISIONS

    Publikacja

    - Rok 2014

    A broad spectrum of analysis and prediction indicators and methods exists to support trading decisions, but no hard knowledge exist to tell in advance which of them will fit best in a given timeframe. To support trading decisions, a multi-agent self-organizing system has been proposed. The system is based on history based dynamic weight voting and selects the right indicators based on their past performance. The formal analysis...

  • Cryptographic Protocols' Performance and Network Layer Security of RSMAD

    Publikacja

    W artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Application capabilities of the maximum distributed generation estimate methodology

    The paper presents application capabilities of the maximum distributed generation estimate methodology. This subject is an example of solutions to the problem that today face the transmission system operator and distribution system operators, which is related to the high saturation with wind power generation predicted for the near future.

    Pełny tekst do pobrania w portalu

  • CRVG - a new model for wireless networks topology generation

    Publikacja

    This paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.

  • Generation and Propagation of Nonlinear Waves in a Towing Tank

    The paper presents the results of the research focused on linear and nonlinear wave generation and propagation in a deepwater towing tank equipped with a single flap-type wavemaker of variable draft. The problem of wave generation and propagation has been theoretically formulated and solved by applying an analytical method; linear and nonlinear solutions were obtained. The linear solution has been verified experimentally. The...

    Pełny tekst do pobrania w portalu

  • Extended Reflexive Ontologies for the Generation of Clinical Recommendations

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2015

    Decision recommendations are a set of alternative options for clinical decisions (e.g., diagnosis, prognosis, treatment selection, follow-up, and prevention) that are provided to decision makers by knowledge-based Clinical Decision Support Systems (k-CDSS) as aids. We propose to follow a ‘‘reasoning over domain’’ approach for the generation of decision recommendations by gathering and inferring conclusions from production rules....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Ad hoc routing protocols - security objectives, threats and solution

    Publikacja

    Zaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.

  • Appraisement of modifications in dynamic routing protocols to support the IPng Protocol

    Publikacja

    W pracy, biorąc pod uwagę dynamiczny proces migracji sieci IPv4 do nowej wersji protokołu IP, przedstawiono konieczność realizacji w Internecie nowych protokołów routingu dynamicznego lub adaptacji już istniejących do nowego protokołu IPng. W artykule przedstawiono sposoby dostosowania protokołów routingu dynamicznego RIP, OSPF, BGP do nowego protokołu IP. Oceniono wpływ w/w dostosowywania na zbieżność i skalowalność protokołów...

  • A model-based approach to analysis of security protocols - a case study

    Publikacja
    • M. (. Olszewski

    - Rok 2005

    Artykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...

  • Arabinoxylans: A review on protocols for their recovery, functionalities and roles in food formulations

    Publikacja
    • F. J. Hernández-Pinto
    • J. D. Miranda-Medina
    • A. Natera-Maldonado
    • Ó. Vara-Aldama
    • M. P. Ortueta-Cabranes
    • J. A. Vázquez del Mercado-Pardiño
    • S. A. El-Aidie
    • S. A. Siddiqui
    • R. Castro Munoz

    - INTERNATIONAL JOURNAL OF BIOLOGICAL MACROMOLECULES - Rok 2024

    Arabinoxylans (AXs) are compounds with high nutritional value and applicability, including prebiotics or supplementary ingredients, in food manufacturing industries. Unfortunately, the recovery of AXs may require advanced separation and integrated strategies. Here, an analysis of the emerging techniques to extract AXs from cereals and their by-products is discussed. This review covers distinct methods implemented over the last...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • NEW TRENDS IN DEVELOPMENT OF ORC'S FOR MICROPOWER GENERATION

    Publikacja

    - Rok 2014

    In the paper, new trends in development of micropower generation of heat and electricity are presented. New type of CHP for domestic usage is developed in the Institute of Fluid-Flow Machinery PAS and methods of its design are presented. The most promising trends in equipment of ORC cycle for this purpose were discussed. Main attention was focused on micro-heat exchangers design based on micro-channels and micro-jets. In our opinion...

  • Generation of random fields to reflect material and geometric imperfections of plates and shells

    Publikacja

    The paper covers two patterns of random field generation: conditional acceptance – rejection method and Karhunen – Loève expansion. The generation of two-dimensional random fields is essential in plates and shells analysis, allowing for a relevant limit and critical state assessment of geometrically and ma-terially imperfect structures. The features of both generation methods dedicate them to selected problems.

    Pełny tekst do pobrania w portalu

  • OpenGL accelerated method of the material matrix generation for FDTD simulations

    Publikacja

    This paper presents the accelerated technique of the material matrix generation from CAD models utilized by the finite-difference time-domain (FDTD) simulators. To achieve high performance of these computations, the parallel-processing power of a graphics processing unit was employed with the use of the OpenGL library. The method was integrated with the developed FDTD solver, providing approximately five-fold speedup of the material...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A New Method for Automatic Generation of Animated Motion

    Publikacja

    - Rok 2012

    A new method for generation of animation with a quality comparable to a natural motion is presented. Proposed algorithm is based on fuzzy description of motion parameters and subjective features. It is assumed that such processing increases naturalness and quality of motion, which is verified by subjective evaluation tests. First, reference motion data are gathered utilizing a motion capture system, then these data are reduced...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Issues of Estimating the Maximum Distributed Generation at High Wind Power Participation

    Publikacja

    This paper presents the methods of estimating the maximum power that can be connected to the power system in distributed generation sources. Wind turbine generator systems (WTGS) were selected as the subject for analysis. Nonetheless, the considerations presented in this paper are only general and also apply to other types of power sources, including the sources that are not considered part of distributed generation.

    Pełny tekst do pobrania w portalu

  • Synchronized six-step voltage generation in high-speed PMSM drive

    Publikacja

    Synchronized voltage generation has already been considered in the context of pulse width modulation (PWM). References prove that synchronized PWM substantially decreases subharmonics in inverter output voltage when operating with low switching-to-fundamental frequency ratio. This paper identifies problems of unsynchronized voltage generation in electric drives under six-step inverter operation. Guidelines for the synchronization...

    Pełny tekst do pobrania w portalu

  • Performance analysis of untraceability protocols for mobile agents using an adaptable framework

    Publikacja

    Artykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance analysis of mobility protocols and handover algorithms for IP-based networks

    Publikacja

    A rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...

  • Generation of large finite-element matrices on multiple graphics processors

    This paper presents techniques for generating very large finite-element matrices on a multicore workstation equipped with several graphics processing units (GPUs). To overcome the low memory size limitation of the GPUs, and at the same time to accelerate the generation process, we propose to generate the large sparse linear systems arising in finite-element analysis in an iterative manner on several GPUs and to use the graphics...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluation of technical efficiency of heat and electric power generation

    Publikacja

    - Polish Maritime Research - Rok 2009

    This paper presents an evaluation of technical efficiency and time-dependent changes in productivity of Polish professional electric power and heat&electric power stations by using Data Envelopment Analysis non-parametric method. The research covered the enterprises whose total available electric power amounted to about 98% of that of all professional thermal electric power stations in this country. The analysis has concerned...

    Pełny tekst do pobrania w portalu