Wyniki wyszukiwania dla: z-scheme
-
A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data
PublikacjaWhether the computer is driving your car or you are, advanced driver assistance systems (ADAS) come into play on all levels, from weather monitoring to safety. These modern-day ADASs use various assisting tools for drivers to keep the journey safe; these sophisticated tools provide early signals of numerous events, such as road conditions, emerging traffic scenarios, and weather warnings. Many urban applications, such as car-sharing...
-
Combinatorial scheme of finding minimal number of periodic points for smooth self-maps of simply connected manifolds
PublikacjaLet M be a closed smooth connected and simply connected manifold of dimension m at least 3, and let r be a fixed natural number. The topological invariant D^m_r [f], defined by the authors in [Forum Math. 21 (2009), 491-509], is equal to the minimal number of r-periodic points in the smooth homotopy class of f, a given self-map of M. In this paper, we present a general combinatorial scheme of computing D^m_r [f] for arbitrary dimension...
-
Efficient handover scheme for Mobile IPv4 over IEEE 802.11 networks with IEEE 802.21 triggers.
PublikacjaEfektywność przełączania jest bardzo istotnym parametrem, decydującym o pracy sieci bezprzewodowych, realizujacych usługi multimedialne na wysokim poziomie jakości. Użytkownicy takich sieci oczekują ciągłej obsługi podczas procesu przemieszczania się. Okazuje się, że istotnym źródlem opóźnień są nieefektywne procedury przełączania w warstwach drugiej i trzeciej, wynikający częściowo z postulatu o separacji funkcji realizowanych...
-
A General Scheme of a Branch-and-Bound Approach for the Sensor Selection Problem in Near-Field Broadband Beamforming
Publikacja -
Characterization of slow and fast fading in off-body communication at 2.45 GHz with space diversity scheme in indoor environment
PublikacjaThe characterization of slow and fast fading in Wireless Body Area Networks with space diversity scheme has been presented. The analysis, based on the measurements at 2.45 GHz in indoor environment, has shown that for all investigated configurations of receiving wearable antennas the correlation coefficient values of received signals’ parameters are below the assumed value of 0.5, being close to zero for the vast majority of cases. It...
-
Characterization of Slow and Fast Fading in Off-Body Communication at 2.45 GHz with Space Diversity Scheme in an Indoor Environment
PublikacjaThe characterization of slow and fast fading in wireless body area networks with space diversity scheme has been presented. The analysis, based on the measurements at 2.45 GHz in an indoor environment, has shown that for all investigated configurations of receiving wearable antennas, the correlation coefficient values of the received signals’ parameters are below the assumed value of 0.5, being close to zero for the vast majority...
-
Analytical Estimation of Power Losses in a Dual Active Bridge Converter Controlled with a Single-Phase Shift Switching Scheme
PublikacjaMicro-grid solutions around the world rely on the operation of DC/DC power conver- sion systems. The most commonly used solution for these topologies is the use of a dual active bridge (DAB) converter. Increasing the efficiency and reliability of this system contributes to the improvement in the stability of the entire microgrid. This paper discussed an analytical method of energy efficiency and power loss estimation in a single...
-
Multicast Traffic Throughput Maximization through Dynamic Modulation and Coding Scheme Assignment in Wireless Sensor Networks
Publikacja -
Burst loss probability for the combination of extended offset time based service differentiation scheme and PPS in optical burst switching network
PublikacjaIn the paper analytical model for calculating burst loss probabilities for the combination of two service differentiation schemes for OBS network namely: extended offset time based scheme and PPS (Preemption Priority Schemes) is revised. Moreover authors introduce analytical model for calculating burst loss probabilities for an optical path when OBS network employs both service differentiation schemes and JET signaling. The comparison...
-
Novel synthesis scheme and in vitro antimicrobial evaluation of a panel of (E)-2-aryl-1-cyano-1-nitroethenes
Publikacja -
Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme
PublikacjaThe importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Dni informacyjne w NCBR – Small Grant Scheme 2020 Call
WydarzeniaKontakt w sprawie szkolenia na Politechnice Gdańskiej: Magdalena Urbanowicz, Aleksandra Dubiella-Jackowska, Dział Projektów
-
How to determine whether an electron transfer channel is type-II or S-scheme in g–C3N4–based photocatalysts? A critical review
Publikacja -
Correction to: Azo group(s) in selected macrocyclic compounds
PublikacjaIn the original publication of the article, a part of Scheme 12 was missed. The correct version of Scheme 12 was provided in this correction article. The original article has also been corrected.
-
Computationally Effcient Solution of a 2D Diffusive Wave Equation Used for Flood Inundation Problems
PublikacjaThis paper presents a study dealing with increasing the computational efficiency in modeling floodplain inundation using a two-dimensional diffusive wave equation. To this end, the domain decomposition technique was used. The resulting one-dimensional diffusion equations were approximated in space with the modified finite element scheme, whereas time integration was carried out using the implicit two-level scheme. The proposed...
-
Microwave-assisted synthesis of a TiO2-CuO heterojunction with enhanced photocatalytic activity against tetracycline
PublikacjaA microwave method was used for the synthesis of TiO2-CuO oxide systems. A detailed investigation was made of the effect of the molar ratio of components (TiO2:CuO=9:1, 7:3, 5:5, 3:7, 1:9) on the crystalline structure and morphology. Transmission electron microscopy (TEM) confirmed the presence of octahedral and rod-shaped titania particles and sheet copper(II) oxide particles; moreover, HRTEM analysis indicated the presence of...
-
Adaptive CAD-Model Construction Schemes
PublikacjaTwo advanced surrogate model construction techniques are discussed in this paper. The models employ radial basis function (RBF)interpolation scheme or artificial neural networks (ANN) with a new training algorithm. Adaptive sampling technique is applied withrespect to all variables. Histograms showing the quality of the models are presented. While the quality of RBF models is satisfactory, theperformance of the ANN models obtained...
-
Acceleration of the Discrete Green’s Function Formulation of the FDTD Method Based on Recurrence Schemes
PublikacjaIn this paper, we investigate an acceleration of the discrete Green's function (DGF) formulation of the FDTD method (DGF-FDTD) with the use of recurrence schemes. The DGF-FDTD method allows one to compute FDTD solutions as a convolution of the excitation with the DGF kernel. Hence, it does not require to execute a leapfrog time-stepping scheme in a whole computational domain for this purpose. Until recently, the DGF generation...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublikacjaA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Modified SPWM Technique with Zero-Sequence Voltage Injection for a Five-Phase, Three-Level NPC Inverter
PublikacjaThis article presents a modified sinusoidal pulse-width modulation (SPWM) scheme for a five-phase, three-level neutral-point-clamped inverter. The modulation scheme deploys a modified min–max function to inject the zero-sequence components into the reference modulating signals; hence enabling the effective utilization of the DC-link voltage. Balanced split-input DC-link voltages were achieved through further incorporation of adjustable...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublikacjaProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
Comparative analysis of numerical with optical soliton solutions of stochastic Gross–Pitaevskii equation in dispersive media
PublikacjaThis article deals with the stochastic Gross–Pitaevskii equation (SGPE) perturbed with multiplicative time noise. The numerical solutions of the governing model are carried out with the proposed stochastic non-standard finite difference (SNSFD) scheme. The stability of the scheme is proved by using the Von-Neumann criteria and the consistency is shown in the mean square sense. To seek exact solutions, we applied the Sardar subequation...
-
MODELLING OF TRANSIENT FLOW IN STORM SEWERS
PublikacjaThe paper focuses on the assessment of second-order explicit numerical scheme for unsteady flows in sewers. In order to simulate the pressurized flow the 'Preissmann slot' concept is implemented. For simulation of the transcritical flow the original and improved McCormack scheme is used. The calculated results are compared with numerical solutions and laboratory measurements published in the technical literature. Moreover, the...
-
Straightened characteristics of McKendrick-von Foerster equation
PublikacjaWe study the McKendrick-von Foerster equation with renewal (that is the age-structured model, with total population dependent coefficient and nonlinearity). By using a change of variables, the model is then transformed to a standard age-structured model in which the total population dependent coefficient of the transport term reduces to a constant 1. We use this transformation to get existence, uniqueness of solutions of the problem...
-
Underfrequency Load Shedding: An Innovative Algorithm Based on Fuzzy Logic
PublikacjaIn contemporary power systems, the load shedding schemes are typically based on disconnecting a pre-specified amount of load after the frequency drops below a predetermined value. The actual conditions at the time of disturbance may largely dier from the assumptions, which can lead to non-optimal or ineective operation of the load shedding scheme. For many years, increasing the eectiveness of the underfrequency load shedding (UFLS)...
-
Smart Embedded Systems with Decisional DNA Knowledge Representation
PublikacjaEmbedded systems have been in use since the 1970s. For most of their history embedded systems were seen simply as small computers designed to accomplish one or a few dedicated functions; and they were usually working under limited resources i.e. limited computing power, limited memories, and limited energy sources. As such, embedded systems have not drawn much attention from researchers, especially from those in the artificial...
-
Image Processing Techniques for Distributed Grid Applications
PublikacjaParallel approaches to 2D and 3D convolution processing of series of images have been presented. A distributed, practically oriented, 2D spatial convolution scheme has been elaborated and extended into the temporal domain. Complexity of the scheme has been determined and analysed with respect to coefficients in convolution kernels. Possibilities of parallelisation of the convolution operations have been analysed and the results...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublikacjaIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublikacjaAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Marek Czachor prof. dr hab.
Osoby -
SONIC - Self-optimizing narrowband interference canceler: comparison of two frequency tracking strategies
PublikacjaThis paper presents a new approach to rejection of complex-valued sinusoidal disturbances acting at the output of a discrete-time linear stable plant with unknown and possibly time-varying dynamics. It is assumed that both the instantaneous frequency of the sinusoidal disturbance and its amplitude may be slowly varying with time and that the output signal is contaminated with wideband measurement noise. The proposed disturbance...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Bayesian Optimization for solving high-frequency passive component design problems
PublikacjaIn this paper, the performance of the Bayesian Optimization (BO) technique applied to various problems of microwave engineering is studied. Bayesian optimization is a novel, non-deterministic, global optimization scheme that uses machine learning to solve complex optimization problems. However, each new optimization scheme needs to be evaluated to find its best application niche, as there is no universal technique that suits all...
-
MEMORY EFFECT ANALYSIS USING PIECEWISE CUBIC B-SPLINE OF TIME FRACTIONAL DIFFUSION EQUATION
PublikacjaThe purpose of this work is to study the memory effect analysis of Caputo–Fabrizio time fractional diffusion equation by means of cubic B-spline functions. The Caputo–Fabrizio interpretation of fractional derivative involves a non-singular kernel that permits to describe some class of material heterogeneities and the effect of memory more effectively. The proposed numerical technique relies on finite difference approach and cubic...
-
Greedy Multipoint Model-Order Reduction Technique for Fast Computation of Scattering Parameters of Electromagnetic Systems
PublikacjaThis paper attempts to develop a new automated multipoint model-order reduction (MOR) technique, based on matching moments of the system input–output function, which would be suited for fast and accurate computation of scattering parameters for electromagnetic (EM) systems over a wide frequency band. To this end, two questions are addressed. Firstly, the cost of the wideband reduced model generation is optimized by automating a...
-
Thermal ablation modeling via bioheat equation
PublikacjaWe consider Pennes’ bioheat equation and discuss an implicit numerical scheme which has better stability properties than other approaches. Our discussion concerns Carthesian geometry problems, however it carries over to spherical geometry models and more complicated shapes.
-
Deformation of the Structural Details of the Components Created by the Rapid Prototyping Method
PublikacjaThe paper present the results of preliminary research and describes the deformation of construction details within the process of producing small element employing a stereography system. The article discuses a scheme for changes in data conversion. Variation in construction details have been described on the basis of analysing photographs.
-
Piotr Krajewski dr
OsobyPiotr Krajewski pracuje jako starszy bibliotekarz w Bibliotece Politechniki Gdańskiej. Jako pracownik Sekcji Informacji Naukowo-Technicznej skupia się przede wszystkim na zagadnieniach związanych z ruchem Open Access oraz rolą repozytoriów instytucjonalnych w jego rozwoju. Jest także autorem artykułów poruszających kwestie standaryzacji statystyk wykorzystania zasobów elektronicznych jak również problematykę „drapieżnych wydawców”....
-
High Efficiency Dual-Active-Bridge Converter with Triple-Phase-Shift Control for Battery Charger of Electric Vehicles
PublikacjaAn optimal modulation scheme with triple-phase-shift (TPS) control could increase the efficiency in the entire load range for a dual-active-bridge (DAB) converter under wide output voltage range conditions. Therefore, this study proposes a convergent approach to TPS mode selection, coupled with an optimal modulation scheme, ensuring the circuit’s efficiency over the entire range in the realm of a high-power and high-efficiency...
-
Application analysis of a hybrid solid oxide fuel cell-gas turbine system for marine power plants
PublikacjaThe results of theoretical studies of the possibilities of using hybrid solid oxide fuel cell–gas turbine (SOFC-GT) systems for marine power plants are presented. A 500 kW auxiliary marine power plant scheme using stacks of SOFCs in combination with a regenerative gas turbine operating with over-expansion based on our recent patent application is proposed. The results of mathematical modelling showed the opportunity to obtain a...
-
Testing for conformance of parallel programming pattern languages
PublikacjaThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Thermal ablation modeling via the bioheat equation and its numerical treatment
PublikacjaThe phenomenon of thermal ablation is described by Pennes’ bioheat equation. This model is based on Newton’s law of cooling. Many approximate methods have been considered because of the importance of this issue. We propose an implicit numerical scheme which has better stability properties than other approaches.
-
Numerical solutions for blood flow in elastic vessels
PublikacjaWe consider the differential–algebraic system for the blood flow and pressure in the systemic arteries. By the operator splitting method, we transform the system into the hyperbolic one, introduce the bicharacteristics, and perform the time–space nonuniform discretization, obtaining the innovative difference scheme. Our results are illustrated with numerical experiments.
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
An extended basis inexact shift–invert Lanczos for the efficient solution of large-scale generalized eigenproblems
PublikacjaThis paper proposes a technique, based on the Inexact Shift–Invert Lanczos (ISIL) method with Inexact Jacobi Orthogonal Component Correction (IJOCC) refinement, and a preconditioned conjugate-gradient (PCG) linear solver with multilevel preconditioner, for finding several eigenvalues for generalized symmetric eigenproblems. Several eigenvalues are found by constructing (with the ISIL process) an extended projection basis. Presented...