wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ANYTIME HEURISTIC ALGORITHM
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublikacjaFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor
PublikacjaThe paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublikacjaPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Nonlinear resultant theory of shells accounting for thermodiffusion
PublikacjaThe complete nonlinear resultant 2D model of shell thermodiffusion is developed. All 2D balance laws and the entropy imbalance are formulated by direct through-the-thickness integration of respective 3D laws of continuum thermodiffusion. This leads to a more rich thermodynamic structure of our 2D model with several additional 2D fields not present in the 3D parent model. Constitutive equations of elastic thermodiffusive shells...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublikacjaIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
On the Consumption of Multimedia Content Using Mobile Devices: a Year to Year User Case Study
PublikacjaIn the early days, consumption of multimedia content related with audio signals was only possible in a stationary manner. The music player was located at home, with a necessary physical drive. An alternative way for an individual was to attend a live performance at a concert hall or host a private concert at home. To sum up, audio-visual effects were only reserved for a narrow group of recipients. Today, thanks to portable players,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527457751]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527453631]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527452191]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
PublikacjaIn its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...
-
Ryszard Katulski prof. dr hab. inż.
Osoby -
Construction of phylogenetic trees with topological constraints
PublikacjaThis paper proposes a method of reconstruction of phylogenetic trees based on heuristic search with topological constraints. Using topological constraints it is possible to reduce the set of solutions as well as to enforce that the result is consistent with a given hypothesis about the evolution process within some group of species. Along with this work a number of algorithms used for phylogenetic analysis were implemented. Those...
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527451601]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527456421]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527459551]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Output voltage, current and DC-link voltages under SVPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The comparison studies between proposed Space Vector Pulse-Width...
-
Output voltage, current and DC-link voltages under SPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The Carrier-Based Pulse-Width Modulation (CBPWM) technique was...
-
Algorytmy Optymalizacji Dyskretnej - ed. 2021/2022
Kursy OnlineIn real-world applications, many important practical problems are NP-hard, therefore it is expedient to consider not only the optimal solutions of NP-hard optimization problems, but also the solutions which are “close” to them (near-optimal solutions). So, we can try to design an approximation algorithm that efficiently produces a near-optimal solution for the NP-hard problem. In many cases we can even design approximation algorithms...
-
Reception of Terrestrial DAB+ and FM Radio with a Mobile Device: A Subjective Quality Evaluation
PublikacjaNowadays, terrestrial broadcasting enables to receive content anytime and everywhere. People can obtain information both with a portable or desktop receiver, which include pocket-sized devices as well as high-end Hi-Fi equipment, not to mention car audio systems. Numerous manufacturers include FM-compatible chipsets in a variety of user equipment (UE), including mobile phones. However, digital radio signal processing modules, such...
-
Application of genetic algorithms in graph searching problem
PublikacjaGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Performance evaluation of parallel background subtraction on GPU platforms
PublikacjaImplementation of the background subtraction algorithm on parallel GPUs is presented. The algorithm processes video streams and extracts foreground pixels. The work focuses on optimizing parallel algorithm implementation by taking into account specific features of the GPU architecture, such as memory access, data transfers and work group organization. The algorithm is implemented in both OpenCL and CUDA. Various optimizations of...
-
Dual drive control under SVPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The analysis includes the behaviour of the drive system, examining the dynamic system response to speed and angle changes, and encompassing data...
-
Efficient uncertainty quantification using sequential sampling-based neural networks
PublikacjaUncertainty quantification (UQ) of an engineered system involves the identification of uncertainties, modeling of the uncertainties, and the forward propagation of the uncertainties through a system analysis model. In this work, a novel surrogate-based forward propagation algorithm for UQ is proposed. The proposed algorithm is a new and unique extension of the recent efficient global optimization using neural network (NN)-based...
-
Robust output prediction of differential – algebraic systems – application to drinking water distribution system
PublikacjaThe paper presents the recursive robust output variable prediction algorithm, applicable for systems described in the form of nonlinear algebraic-differential equations. The algorithm bases on the uncertainty interval description, the system model, and the measurements. To improve the algorithm efficiency, nonlinear system models are linearised along the nominal trajectory. The effectiveness of the algorithm is demonstrated on...
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublikacjaThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Weighted Clustering for Bees Detection on Video Images
PublikacjaThis work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...
-
A Monte Carlo Strategy to simulate Positrons and Positronium in biological Materials
PublikacjaWe present an algorithm for Monte Carlo simulations of positron tracks in biological materials. The algorithm takes into account the cross-section data for elastic and inelastic collisions between positrons and molecules and processes like direct annihilation, ionization and positronium formation. In the case of positronium formation, the algorithm considers the interactions of positronium with molecules. The algorithm can be used...
-
Evaluation of propagation parameters of open guiding structures with the use of complex root finding algorithms
PublikacjaAn efficient complex root tracing algorithm is utilized for the investigation of electromagnetic wave propagation in open guiding structures. The dispersion characteristics of propagated and leaky waves are calculated for a couple of chosen waveguides. The efficiency of the root tracing algorithm is discuses and compared to a global root finding algorithm.
-
0-step K-means for clustering Wikipedia search results
PublikacjaThis article describes an improvement for K-means algorithm and its application in the form of a system that clusters search results retrieved from Wikipedia. The proposed algorithm eliminates K-means isadvantages and allows one to create a cluster hierarchy. The main contributions of this paper include the ollowing: (1) The concept of an improved K-means algorithm and its application for hierarchical clustering....
-
Determining the optimal filling of the surface with a linker with Universal Force Field and Reax Force Field
Dane BadawczeThe DataSet contains the atomic slabs of diamond surfaces with ATP molecules in water. The calculated data includes different sized surfaces from 90 Angstrom^2 to 691 Angstrom^2. Structures were relaxed using the Reax Force Field method with the Limited Memory Broyden–Fletcher–Goldfarb–Shanno algorithm. Structures were calculated with a convergence...
-
Silence/noise detection for speech and music signals
PublikacjaThis paper introduces a novel off-line algorithm for silence/noise detection in noisy signals. The main concept of the proposed algorithm is to provide noise patterns for further signals processing i.e. noise reduction for speech enhancement. The algorithm is based on frequency domain characteristics of signals. The examples of different types of noisy signals are presented.
-
Parallel Background Subtraction in Video Streams Using OpenCL on GPU Platforms
PublikacjaImplementation of the background subtraction algorithm using OpenCL platform is presented. The algorithm processes live stream of video frames from the surveillance camera in on-line mode. Processing is performed using a host machine and a parallel computing device. The work focuses on optimizing an OpenCL algorithm implementation for GPU devices by taking into account specific features of the GPU architecture, such as memory access,...
-
A non-uniform real-time speech time-scale stretching method
PublikacjaAn algorithm for non-uniform real-time speech stretching is presented. It provides a combination of typical SOLA algorithm (Synchronous Overlap and Add ) with the vowels, consonants and silence detectors. Based on the information about the content and the estimated value of the rate of speech (ROS), the algorithm adapts the scaling factor value. The ability of real-time speech stretching and the resultant quality of voice were...
-
Comparison of various speech time-scale modificartion methods
PublikacjaThe objective of this work is to investigate the influence of the different time-scale modification (TSM) methods on the quality of the speech stretched up using the designed non-uniform real-time speech time-scale modification algorithm (NU-RTSM). The algorithm provides a combination of the typical TSM algorithm with the vowels, consonants, stutter, transients and silence detectors. Based on the information about the content and...
-
A low complexity double-talk detector based on the signal envelope
PublikacjaA new algorithm for double-talk detection, intended for use in the acoustic echo canceller for voice communication applications, is proposed. The communication system developed by the authors required the use of a double-talk detection algorithm with low complexity and good accuracy. The authors propose an approach to doubletalk detection based on the signal envelopes. For each of three signals: the far-end speech, the microphone...
-
IPMSM rotor position estimator based on analysis of phase current derivatives
PublikacjaThis paper describes an algorithm for estimation of IPMSM angular rotor position. The algorithm uses derivatives of motor phase currents resulting from PWM modulation to obtain the rotor position. The presented method is designed for medium- and high-speed range, since it is based on determination of the EMF vector. Algorithm is characterised by a very simple formulae. The calculation of rotor position is performed in every PWM...
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Implementation of discrete convolution using polynomial residue representation
PublikacjaConvolution is one of the main algorithms performed in the digital signal processing. The algorithm is similar to polynomial multiplication and very intensive computationally. This paper presents a new convolution algorithm based on the Polynomial Residue Number System (PRNS). The use of the PRNS allows to decompose the computation problem and thereby reduce the number of multiplications. The algorithm has been implemented in Xilinx...
-
Detection of vehicles stopping in restricted zones in video from surveillance cameras
PublikacjaAn algorithm for detection of vehicles that stop in restricted areas, e.g. excluded by traffic rules, is proposed. Classic approaches based on object tracking are inefficient in high traffic scenes because of tracking errors caused by frequent object merging and splitting. The proposed algorithm uses the background subtraction results for detection of moving objects, then pixels belonging to moving objects are tested for stability....
-
Model Predictive Super-Twisting Sliding Mode Control for An Autonomous Surface Vehicle
PublikacjaThis paper presents a new robust Model Predictive Control (MPC) algorithm for trajectory tracking of an Autonomous Surface Vehicle (ASV) in presence of the time-varying external disturbances including winds, waves and ocean currents as well as dynamical uncertainties. For fulfilling the robustness property, a sliding mode control-based procedure for designing of MPC and a super-twisting term are adopted. The MPC algorithm has been...
-
Semantic modeling of contextual augmented reality environments
PublikacjaDespite significant progress in the field of augmented reality (AR), regarding both hardware and software, there is still a lack of universal models and methods that would enable building ubiquitous AR systems that could be used anywhere and anytime, covering different application areas. This dissertation describes a new approach to building AR systems, called the Contextual Augmented Reality Environment (CARE). The CARE approach...
-
Modal parameters identification with Particle Swarm Optimization
PublikacjaThe paper presents method of the modal parameters identification based on the Particle Swarm Optimization (PSO) algorithm [1]. The basic PSO algorithm is modified in order to achieve fast convergence and low estimation error of identified parameters values. The procedure of identification as well as algorithm modifications are presented and some simple examples for the SISO systems are provided. Results are compared with the results...
-
Heart rate PPG signals with acceleration captured at wrist during small and moderate body movements
Dane BadawczeHeart rate PPG signals with acceleration captured at wrist during small and moderate body movements
-
Spectrum-based modal parameters identification with Particle Swarm Optimization
PublikacjaThe paper presents the new method of the natural frequencies and damping identification based on the Artificial Intelligence (AI) Particle Swarm Optimization (PSO) algorithm. The identification is performed in the frequency domain. The algorithm performs two PSO-based steps and introduces some modifications in order to achieve quick convergence and low estimation error of the identified parameters’ values for multi-mode systems....
-
Shared processor scheduling
PublikacjaWe study the shared processor scheduling problem with a single shared processor to maximize total weighted overlap, where an overlap for a job is the amount of time it is processed on its private and shared processor in parallel. A polynomial-time optimization algorithm has been given for the problem with equal weights in the literature. This paper extends that result by showing an (log)-time optimization algorithm for a class...
-
Numerical solution of threshold problems in epidemics and population dynamics
PublikacjaA new algorithm is proposed for the numerical solution of threshold problems in epidemics and population dynamics. These problems are modeled by the delay-differential equations, where the delay function is unknown and has to be determined from the threshold conditions. The new algorithm is based on embedded pair of continuous Runge–Kutta method of order p = 4 and discrete Runge–Kutta method of order q = 3 which is used for the...