Filtry
wszystkich: 1398
-
Katalog
- Publikacje 721 wyników po odfiltrowaniu
- Czasopisma 347 wyników po odfiltrowaniu
- Konferencje 12 wyników po odfiltrowaniu
- Osoby 170 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 3 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 132 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION SCIENCE
-
Rhythm and Colours of the Angles
PublikacjaABSTRACT The game of space was and still is a crucial aspect of visual arts. The aim of this study is to examine how the arrangement of hues, rhythms and angles of various polygons can create an impression of depth and movement on a flat surface. The so-called Penrose tiling and Ulam's spiral are mathematical models that have been applied for the painting experiment. There is a vast amount of evidence gathered over the ages that...
-
Is data management a new “digitisation”? A change of the role of librarians in the context of changing academic libraries’ tasks
PublikacjaAcademic libraries’ tasks have been evolving over the years. The changes have been stimulated by appearing of electronic resources, automated library systems, digital libraries and Open Access (OA) repositories. Librarians’ tasks and responsibilities in the academic environment have been evolving in accordance with new tasks they were expected to assume. A few years ago there was a discussion during which an attempt was made to...
-
Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field
Publikacja -
Use of Restraints from Consensus Fragments of Multiple Server Models To Enhance Protein-Structure Prediction Capability of the UNRES Force Field
Publikacja -
A Maximum-Likelihood Approach to Force-Field Calibration
Publikacja -
Improved Consensus-Fragment Selection in Template-Assisted Prediction of Protein Structures with the UNRES Force Field in CASP13
Publikacja -
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublikacjaThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Propagation Path Loss Modeling in Container Terminal Environment
PublikacjaThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublikacjaThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublikacjaNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Business process nature assessment matrix – a novel approach to the assessment of business process nature
Publikacja -
End-to-end service survivability under attacks on networks
PublikacjaW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Two-state dynamics for replicating two-strand systems
PublikacjaDynamika dwustanowa została zastosowana do opisów układów dwuniciowych, analogicznych do DNA.
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublikacjaZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
Isomerization and Decomposition of 2-Methylfuran with External Forces
Publikacja -
Application of Graph Theory Algorithms in Non-disjoint Functional Decomposition of Specific Boolean Functions
Publikacja -
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publikacja -
Role of Glycosaminoglycans in Procathepsin B Maturation: Molecular Mechanism Elucidated by a Computational Study
Publikacja -
Role of Oligosaccharide Chain Polarity in Protein–Glycosaminoglycan Interactions
Publikacja -
Multi-Objective Genetic Algorithm (MOGA) As a Feature Selecting Strategy in the Development of Ionic Liquids’ Quantitative Toxicity–Toxicity Relationship Models
Publikacja -
Metadata harvesting in regional digital libraries in the PIONIER network
Publikacja -
Chirality Measures of α-Amino Acids
Publikacja -
The Microwave Sources for EPR Spectroscopy
Publikacja -
Automatic Image and Speech Recognition Based on Neural Network
Publikacja -
Free Energies of the Disassembly of Viral Capsids from a Multiscale Molecular Simulation Approach
Publikacja -
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
A few steps more towards NPT bound entanglement
PublikacjaIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
On thermal stability of topological qubit in Kitaev's 4D model
PublikacjaWe analyse stability of the four-dimensional Kitaev model-a candidate for scalable quantum memory - in finite temperature within the weak coupling Markovian limit. It is shown that, below a critical temperature, certain topological qubit observables X and Z possess relaxation times exponentially long in the size of the system. Their construction involves polynomial in system size algorithm which uses as an input the results of...
-
New approach to computer aided design of coupled resonator filters
PublikacjaW niniejszej pracy zastosowane zostały gradientowa metoda optymalizacji oraz nowa definicja funkcji celu do projektowania filtrów mikrofalowych. Definicja funkcji celu została oparta na badaniu położenia zer i biegunów funkcji przenoszenia optymazlizownanych układów.
-
Theory of scattering by an array of lossy dielectric, ferrite and conducting cylinders.
PublikacjaOpisano metodę analizy umożliwiającą określenie zastępczego pola rozproszonego od dowolnej konfiguracji prętów dielektrycznych, ferrytowych lub metalowych na zewnętrznym obszarze cylindrycznym w celu połączenia go z wybranym pobudzeniem i znalezienia macierzy rozproszenia układu. Prezentowane podejście znajduje zastosowanie w analizie struktur zamkniętych i określanie macierzy rozpraszania złączy falowodowych jak i otwartych...
-
Introduction to the special issue on intelligent systems to aid the handicapped.
PublikacjaWśród wielu zastosowań sztucznej inteligencji i technologii bazodanowych pojawiają się zastosowania wspierające osoby niepełnosprawne. Z chwilą pojawienia są każdej nowej technologii komputerowej świat naukowy proponuje zastosowania tej technologii do celu poprawy komunikacji z osobami niepełnosprawnymi bądź technologie wspierające te osoby bezpośrednio. Niniejsze wydanie specjalne czasopisma Journal of Intelligent Information...
-
Intelligent processing of stuttered speech.
PublikacjaW artykule zaprezentowano kilka metod analizy i automatycznego zliczania potknięć artykulacyjnych, związanych z jąkaniem się, opartych na wykorzystaniu algorytmów uczących się sztucznych sieci neuronowych i zbiorów przybliżonych.
-
Estimation of musical sound separation algorithm effectiveness employing neural networks.
PublikacjaŚlepa separacja dźwięków sygnałów muzycznych zawartych w zmiksowanym materiale jest trudnym zadaniem. Jest to spowodowane tym, że dźwięki znajdujące się w relacjach harmonicznych mogą zawierać kolidujące składowe sinusoidalne (składowe harmoniczne). Ewaluacja wyników separacji jest również problematyczna, gdyż analiza błędu energetycznego często nie odzwierciedla subiektywnej jakości odseparowanych sygnałów. W tej publikacji zostały...
-
Propagation in rectangular waveguides with a pseudochiral Ω slab
PublikacjaThe transfer matrix approach is applied for analysis of waveguides loaded with a uniaxial pseudochiral Ω slab. In particular a pseudochiral parallel plate and rectangular guides are investigated. Based on the numerical analysis the influence of the pseudochirality on propagation characteristics and field distribution are examined. Other feature such as a field displacement phenomenon appearing in the both considered structures...
-
Multistage optical switching networks
PublikacjaEwolucja sieci szkieletowej w kierunku sieci DWDM o dużych szybkościach generuje nowe problemy dla kontynuacji. Ten element funkcjonalny musi także być oparty na technologii optycznej. Dla dużych pojemności nie może on być zrealizowany jako pojedynczy komutator, lecz jako wielosekcyjne pole komutacyjne. W artykule opisano trzy typy komutatorów: komutator światłowodów(FX), komutator długości fal (WSX) i komutator z konwersją długości...
-
Low order autoregressive (AR) models for FDTD analysis of microwave filters.
PublikacjaArtykuł opisuje zastosowanie modeli AR w celu poprawy efektywności analizy struktur filtrujących metodą różnic skończonych w dziedzinie czasu (FD-TD). Opisanych jest szereg kryteriów pozwalających na automatyczne tworzenie modeli AR sygnałów czasowych, w tym wybór fragmentu odpowiedzi układu stanowiący podstawę ekstrakcji współczynników modelu, współczynnika decymacji oraz rzędu modelu. Skuteczność wprowadzonych kryteriów...
-
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublikacjaRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
The Realization of NGN Architecture for ASON/GMPLS Network
PublikacjaFor the last decades huge efforts of telecommunication,Internet and media organizations have been focusingon creating standards and implementing one common networkdelivering multimedia services - Next Generation Network.One of the technologies which are very likely to beused in NGN transport layer is ASON/GMPLS optical network.The implementation of ASON/GMPLS technology usingopen source software and its results are the subject...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublikacjaAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Multi Queue Approach for Network Services Implemented for Multi Core CPUs
PublikacjaMultiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also computer networking. Since the key functionality of network core components is fast package servicing, multicore technology, due to multi tasking ability, seems useful to support packet processing. Dedicated...
-
Communication Platform for Evaluation of Transmitted Speech Quality
PublikacjaA voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Average Redundancy of the Shannon Code for Markov Sources
PublikacjaIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
Radionuclides activity and effective doses referred to geological formations
PublikacjaNaturally occurring radioactive materials (NORM) are present in Earth’s crust and they caused natural background radiation, variable in different regions. Liquid, gas and solid radionuclides emit three types of radiation – alpha, beta and gamma. Fluctuations of natural radioactivity in different geological formations in the world and in Poland were compared in relation to radiological hazard. Also drilling cuttings from boreholes...
-
A detector of sleep disorders for using at home
PublikacjaObstructive sleep apnea usually requires all-ni ght examination in a specialized clinic, under the supervision of a medical staff. Because of those requirements it is an expensive and a non-widely utilized test. Moving the examination procedure to patients’ home with automatic analysis algorithms involved will decrease the costs and make it available for larger group of patients. The developed device allows all-night recordings...