wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ANYTIME HEURISTIC ALGORITHM
-
Generalized regression neural network and fitness dependent optimization: Application to energy harvesting of centralized TEG systems
PublikacjaThe thermoelectric generator (TEG) system has attracted extensive attention because of its applications in centralized solar heat utilization and recoverable heat energy. The operating efficiency of the TEG system is highly affected by operating conditions. In a series-parallel structure, due to diverse temperature differences, the TEG modules show non-linear performance. Due to the non-uniform temperature distribution (NUTD) condition,...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublikacjaSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Wykorzystanie klasyfikacji funkcjonalnej usług do efektywnego zarządzania zasobami chmurowymi
PublikacjaWykazano jak istotnym problemem jest zarzadzanie chmurą obliczeniową, w tym alokacja zasobów do wykonania usług (workloadów) zgłoszonych przez użytkownika. Przeanalizowano problem podziału usług wdrażanych w środowiskach chmurowych na klasy określające ich funkcjonalność. Zaproponowano oryginalną metodę alokacji workloadów wykorzystującą wprowadzoną klasyfikację funkcjonalną oraz identyfikację tych klas na podstawie wielkości generowanego...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublikacjaThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Quality of Satellite Communication in Selected Mobile Android Smartphones
PublikacjaToday, thanks to mobile devices, satellite communication is available to anyone and everywhere. Gaining information on one’s position using GNSS (Global Navigation Satellite Systems), particularly in unknown urban environments, had become an everyday activity. With the widespread of mobile devices, particularly smartphones, each person can obtain information considering his or her location anytime and everywhere. This paper is...
-
Metaheuristic algorithms for optimization of resilient overlay computing systems
PublikacjaThe idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublikacjaFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor
PublikacjaThe paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527457751]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527453631]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 72 - Tissue image [9300729527452191]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Nonlinear resultant theory of shells accounting for thermodiffusion
PublikacjaThe complete nonlinear resultant 2D model of shell thermodiffusion is developed. All 2D balance laws and the entropy imbalance are formulated by direct through-the-thickness integration of respective 3D laws of continuum thermodiffusion. This leads to a more rich thermodynamic structure of our 2D model with several additional 2D fields not present in the 3D parent model. Constitutive equations of elastic thermodiffusive shells...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublikacjaPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublikacjaIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
Output voltage, current and DC-link voltages under SVPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The comparison studies between proposed Space Vector Pulse-Width...
-
Output voltage, current and DC-link voltages under SPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The output line-to-line voltage, output current and DC-link voltages were included. The Carrier-Based Pulse-Width Modulation (CBPWM) technique was...
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527456421]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527459551]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Malignant lymphoma, large B-cell, diffuse, centroblastic, NOS - Female, 84 - Tissue image [9300729527451601]
Dane BadawczeThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
On the Consumption of Multimedia Content Using Mobile Devices: a Year to Year User Case Study
PublikacjaIn the early days, consumption of multimedia content related with audio signals was only possible in a stationary manner. The music player was located at home, with a necessary physical drive. An alternative way for an individual was to attend a live performance at a concert hall or host a private concert at home. To sum up, audio-visual effects were only reserved for a narrow group of recipients. Today, thanks to portable players,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
PublikacjaIn its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...
-
Ryszard Katulski prof. dr hab. inż.
Osoby -
Dual drive control under SVPWM, experimental results
Dane BadawczeThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The analysis includes the behaviour of the drive system, examining the dynamic system response to speed and angle changes, and encompassing data...
-
Construction of phylogenetic trees with topological constraints
PublikacjaThis paper proposes a method of reconstruction of phylogenetic trees based on heuristic search with topological constraints. Using topological constraints it is possible to reduce the set of solutions as well as to enforce that the result is consistent with a given hypothesis about the evolution process within some group of species. Along with this work a number of algorithms used for phylogenetic analysis were implemented. Those...
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Algorytmy Optymalizacji Dyskretnej - ed. 2021/2022
Kursy OnlineIn real-world applications, many important practical problems are NP-hard, therefore it is expedient to consider not only the optimal solutions of NP-hard optimization problems, but also the solutions which are “close” to them (near-optimal solutions). So, we can try to design an approximation algorithm that efficiently produces a near-optimal solution for the NP-hard problem. In many cases we can even design approximation algorithms...
-
Reception of Terrestrial DAB+ and FM Radio with a Mobile Device: A Subjective Quality Evaluation
PublikacjaNowadays, terrestrial broadcasting enables to receive content anytime and everywhere. People can obtain information both with a portable or desktop receiver, which include pocket-sized devices as well as high-end Hi-Fi equipment, not to mention car audio systems. Numerous manufacturers include FM-compatible chipsets in a variety of user equipment (UE), including mobile phones. However, digital radio signal processing modules, such...
-
Application of genetic algorithms in graph searching problem
PublikacjaGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Performance evaluation of parallel background subtraction on GPU platforms
PublikacjaImplementation of the background subtraction algorithm on parallel GPUs is presented. The algorithm processes video streams and extracts foreground pixels. The work focuses on optimizing parallel algorithm implementation by taking into account specific features of the GPU architecture, such as memory access, data transfers and work group organization. The algorithm is implemented in both OpenCL and CUDA. Various optimizations of...
-
Heart rate PPG signals with acceleration captured at wrist during small and moderate body movements
Dane BadawczeHeart rate PPG signals with acceleration captured at wrist during small and moderate body movements
-
Efficient uncertainty quantification using sequential sampling-based neural networks
PublikacjaUncertainty quantification (UQ) of an engineered system involves the identification of uncertainties, modeling of the uncertainties, and the forward propagation of the uncertainties through a system analysis model. In this work, a novel surrogate-based forward propagation algorithm for UQ is proposed. The proposed algorithm is a new and unique extension of the recent efficient global optimization using neural network (NN)-based...
-
Robust output prediction of differential – algebraic systems – application to drinking water distribution system
PublikacjaThe paper presents the recursive robust output variable prediction algorithm, applicable for systems described in the form of nonlinear algebraic-differential equations. The algorithm bases on the uncertainty interval description, the system model, and the measurements. To improve the algorithm efficiency, nonlinear system models are linearised along the nominal trajectory. The effectiveness of the algorithm is demonstrated on...
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublikacjaThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Weighted Clustering for Bees Detection on Video Images
PublikacjaThis work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...
-
A Monte Carlo Strategy to simulate Positrons and Positronium in biological Materials
PublikacjaWe present an algorithm for Monte Carlo simulations of positron tracks in biological materials. The algorithm takes into account the cross-section data for elastic and inelastic collisions between positrons and molecules and processes like direct annihilation, ionization and positronium formation. In the case of positronium formation, the algorithm considers the interactions of positronium with molecules. The algorithm can be used...
-
Evaluation of propagation parameters of open guiding structures with the use of complex root finding algorithms
PublikacjaAn efficient complex root tracing algorithm is utilized for the investigation of electromagnetic wave propagation in open guiding structures. The dispersion characteristics of propagated and leaky waves are calculated for a couple of chosen waveguides. The efficiency of the root tracing algorithm is discuses and compared to a global root finding algorithm.
-
0-step K-means for clustering Wikipedia search results
PublikacjaThis article describes an improvement for K-means algorithm and its application in the form of a system that clusters search results retrieved from Wikipedia. The proposed algorithm eliminates K-means isadvantages and allows one to create a cluster hierarchy. The main contributions of this paper include the ollowing: (1) The concept of an improved K-means algorithm and its application for hierarchical clustering....
-
Silence/noise detection for speech and music signals
PublikacjaThis paper introduces a novel off-line algorithm for silence/noise detection in noisy signals. The main concept of the proposed algorithm is to provide noise patterns for further signals processing i.e. noise reduction for speech enhancement. The algorithm is based on frequency domain characteristics of signals. The examples of different types of noisy signals are presented.
-
Parallel Background Subtraction in Video Streams Using OpenCL on GPU Platforms
PublikacjaImplementation of the background subtraction algorithm using OpenCL platform is presented. The algorithm processes live stream of video frames from the surveillance camera in on-line mode. Processing is performed using a host machine and a parallel computing device. The work focuses on optimizing an OpenCL algorithm implementation for GPU devices by taking into account specific features of the GPU architecture, such as memory access,...
-
A non-uniform real-time speech time-scale stretching method
PublikacjaAn algorithm for non-uniform real-time speech stretching is presented. It provides a combination of typical SOLA algorithm (Synchronous Overlap and Add ) with the vowels, consonants and silence detectors. Based on the information about the content and the estimated value of the rate of speech (ROS), the algorithm adapts the scaling factor value. The ability of real-time speech stretching and the resultant quality of voice were...
-
Comparison of various speech time-scale modificartion methods
PublikacjaThe objective of this work is to investigate the influence of the different time-scale modification (TSM) methods on the quality of the speech stretched up using the designed non-uniform real-time speech time-scale modification algorithm (NU-RTSM). The algorithm provides a combination of the typical TSM algorithm with the vowels, consonants, stutter, transients and silence detectors. Based on the information about the content and...
-
A low complexity double-talk detector based on the signal envelope
PublikacjaA new algorithm for double-talk detection, intended for use in the acoustic echo canceller for voice communication applications, is proposed. The communication system developed by the authors required the use of a double-talk detection algorithm with low complexity and good accuracy. The authors propose an approach to doubletalk detection based on the signal envelopes. For each of three signals: the far-end speech, the microphone...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
IPMSM rotor position estimator based on analysis of phase current derivatives
PublikacjaThis paper describes an algorithm for estimation of IPMSM angular rotor position. The algorithm uses derivatives of motor phase currents resulting from PWM modulation to obtain the rotor position. The presented method is designed for medium- and high-speed range, since it is based on determination of the EMF vector. Algorithm is characterised by a very simple formulae. The calculation of rotor position is performed in every PWM...
-
Implementation of discrete convolution using polynomial residue representation
PublikacjaConvolution is one of the main algorithms performed in the digital signal processing. The algorithm is similar to polynomial multiplication and very intensive computationally. This paper presents a new convolution algorithm based on the Polynomial Residue Number System (PRNS). The use of the PRNS allows to decompose the computation problem and thereby reduce the number of multiplications. The algorithm has been implemented in Xilinx...
-
Semantic modeling of contextual augmented reality environments
PublikacjaDespite significant progress in the field of augmented reality (AR), regarding both hardware and software, there is still a lack of universal models and methods that would enable building ubiquitous AR systems that could be used anywhere and anytime, covering different application areas. This dissertation describes a new approach to building AR systems, called the Contextual Augmented Reality Environment (CARE). The CARE approach...
-
Model Predictive Super-Twisting Sliding Mode Control for An Autonomous Surface Vehicle
PublikacjaThis paper presents a new robust Model Predictive Control (MPC) algorithm for trajectory tracking of an Autonomous Surface Vehicle (ASV) in presence of the time-varying external disturbances including winds, waves and ocean currents as well as dynamical uncertainties. For fulfilling the robustness property, a sliding mode control-based procedure for designing of MPC and a super-twisting term are adopted. The MPC algorithm has been...