Filtry
wszystkich: 1340
-
Katalog
- Publikacje 695 wyników po odfiltrowaniu
- Czasopisma 347 wyników po odfiltrowaniu
- Konferencje 12 wyników po odfiltrowaniu
- Osoby 166 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 3 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 104 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: information science
-
Call and Connections Times in ASON/GMPLS Architecture
PublikacjaIt is assumed that demands of information soci- ety could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded by performance evaluation to guarantee society expectations. Call and connections times are in ASON/GMPLS architecture important for real-time applications. Practical...
-
Decoherence-free communication over multiaccess quantum channels
PublikacjaIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Ubiquity of client access in heterogeneous access environment
PublikacjaWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Two examples of Quantum Dynamical Semigroups
PublikacjaThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
Path-based methods on categorical structures for conceptual representation of wikipedia articles
PublikacjaMachine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....
-
Validating data acquired with experimental multimodal biometric system installed in bank branches
PublikacjaAn experimental system was engineered and implemented in 100 copies inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank client voice recognition and hand vein distribution verification. The main purpose of the presented research was to analyze questionnaire responses reflecting user opinions on: comfort, ergonomics, intuitiveness and other aspects of the biometric enrollment...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Quality Aspects in Digital Broadcasting and Webcasting Systems: Bitrate versus Loudness
PublikacjaIn this paper the quality aspects of bitrate and loudness in digital broadcasting and webcasting systems are examined. The authors discuss a survey concerning user preferences related with processing and managing audio content. The coding efficiency of a popular audio format is analyzed in the context of storing media. An objective study on a representative group of signal samples, as well as a subjective study of the perceived...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublikacjaThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Propagation Path Loss Modeling in Container Terminal Environment
PublikacjaThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublikacjaThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublikacjaNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Two-state dynamics for replicating two-strand systems
PublikacjaDynamika dwustanowa została zastosowana do opisów układów dwuniciowych, analogicznych do DNA.
-
End-to-end service survivability under attacks on networks
PublikacjaW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublikacjaZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
Isomerization and Decomposition of 2-Methylfuran with External Forces
Publikacja -
Application of Graph Theory Algorithms in Non-disjoint Functional Decomposition of Specific Boolean Functions
Publikacja -
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publikacja -
Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field
Publikacja -
Use of Restraints from Consensus Fragments of Multiple Server Models To Enhance Protein-Structure Prediction Capability of the UNRES Force Field
Publikacja -
A Maximum-Likelihood Approach to Force-Field Calibration
Publikacja -
Improved Consensus-Fragment Selection in Template-Assisted Prediction of Protein Structures with the UNRES Force Field in CASP13
Publikacja -
Free Energies of the Disassembly of Viral Capsids from a Multiscale Molecular Simulation Approach
Publikacja -
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
A few steps more towards NPT bound entanglement
PublikacjaIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
On thermal stability of topological qubit in Kitaev's 4D model
PublikacjaWe analyse stability of the four-dimensional Kitaev model-a candidate for scalable quantum memory - in finite temperature within the weak coupling Markovian limit. It is shown that, below a critical temperature, certain topological qubit observables X and Z possess relaxation times exponentially long in the size of the system. Their construction involves polynomial in system size algorithm which uses as an input the results of...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublikacjaAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
The Realization of NGN Architecture for ASON/GMPLS Network
PublikacjaFor the last decades huge efforts of telecommunication,Internet and media organizations have been focusingon creating standards and implementing one common networkdelivering multimedia services - Next Generation Network.One of the technologies which are very likely to beused in NGN transport layer is ASON/GMPLS optical network.The implementation of ASON/GMPLS technology usingopen source software and its results are the subject...
-
Multi Queue Approach for Network Services Implemented for Multi Core CPUs
PublikacjaMultiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also computer networking. Since the key functionality of network core components is fast package servicing, multicore technology, due to multi tasking ability, seems useful to support packet processing. Dedicated...
-
Communication Platform for Evaluation of Transmitted Speech Quality
PublikacjaA voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...
-
Intelligent video and audio applications for learning enhancement
PublikacjaThe role of computers in school education is briefly discussed. Multimodal interfaces development history is shortly reviewed. Examples of applications of multimodal interfaces for learners with special educational needs are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with facial expression and speech stretching audio interface representing audio modality....
-
Vacuum Rabi oscillation in nonzero-temperature open cavity
PublikacjaPorównania teorii oscylacji Rabiego z eksperymentem [M. Wilczewski, M. Czachor, Phys. Rev. A 79, 0333836 (2009)] sugerują, że parametry wnęki doświadczeniu z dużą ilością fotonów mogą być znacznie mniejsze niż te otrzymane dla stanów prawie próżniowych. W tym kontekście pokazujemy, że wniosek pozostaje bez zmian, nawet jeśli do opisu stanu początkowego wnęki zastosuje się bardziej realistyczny opis.
-
Role of Glycosaminoglycans in Procathepsin B Maturation: Molecular Mechanism Elucidated by a Computational Study
Publikacja -
Role of Oligosaccharide Chain Polarity in Protein–Glycosaminoglycan Interactions
Publikacja -
Multi-Objective Genetic Algorithm (MOGA) As a Feature Selecting Strategy in the Development of Ionic Liquids’ Quantitative Toxicity–Toxicity Relationship Models
Publikacja -
Metadata harvesting in regional digital libraries in the PIONIER network
Publikacja -
Average Redundancy of the Shannon Code for Markov Sources
PublikacjaIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
Radionuclides activity and effective doses referred to geological formations
PublikacjaNaturally occurring radioactive materials (NORM) are present in Earth’s crust and they caused natural background radiation, variable in different regions. Liquid, gas and solid radionuclides emit three types of radiation – alpha, beta and gamma. Fluctuations of natural radioactivity in different geological formations in the world and in Poland were compared in relation to radiological hazard. Also drilling cuttings from boreholes...
-
Music Recommendation System
PublikacjaThe paper focuses on optimization vector content feature for the music recommendation system. For the purpose of experiments a database is created consisting of excerpts of music les. They are assigned to 22 classes corresponding to dierent music genres. Various feature vectors based on low-level signal descriptors are tested and then optimized using correlation analysis and Principal Component Analysis (PCA). Results of the experiments...
-
A detector of sleep disorders for using at home
PublikacjaObstructive sleep apnea usually requires all-ni ght examination in a specialized clinic, under the supervision of a medical staff. Because of those requirements it is an expensive and a non-widely utilized test. Moving the examination procedure to patients’ home with automatic analysis algorithms involved will decrease the costs and make it available for larger group of patients. The developed device allows all-night recordings...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources
PublikacjaWe study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...
-
New Tool for Examining QoS in the VToIP Service
PublikacjaThis paper is dedicated to the subject of measuring QoS in the Video Telephony over IP (VToIP) service. QoS measurement models in general and then models designed specifically for measuring QoS in the VToIP service are presented. A new numerical tool for examining the quality of VToIP video streams VToIP is described. The tool’s functionality is then put to the test in a number of analysis scenarios. The results and insights gained...