Filtry
wszystkich: 3217
-
Katalog
- Publikacje 2646 wyników po odfiltrowaniu
- Czasopisma 87 wyników po odfiltrowaniu
- Konferencje 86 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 105 wyników po odfiltrowaniu
- Projekty 9 wyników po odfiltrowaniu
- Kursy Online 36 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 244 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: network reconfiguration
-
Clothes Detection and Classification Using Convolutional Neural Networks
PublikacjaIn this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Measures of region failure survivability for wireless mesh networks
PublikacjaWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
The networking of the justice system as part of public court networks
PublikacjaThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
Diagnosis of damages in family buildings using neural networks
PublikacjaThe article concerns a problem of damages in family buildings, which result from traffic-induced vibrations. These vibrations arise from various causes and their size is influenced by many factors. The most important is the type of a road, type and weight of vehicles that run on the road, type and condition of the road surface, the distance from the house to the source of vibrations and many others which should be taken into account....
-
Architectural Modifications to Enhance Steganalysis with Convolutional Neural Networks
PublikacjaThis paper investigates the impact of various modifications introduced to current state-of-the-art Convolutional Neural Network (CNN) architectures specifically designed for the steganalysis of digital images. Usage of deep learning methods has consistently demonstrated improved results in this field over the past few years, primarily due to the development of newer architectures with higher classification accuracy compared to...
-
Mobility management solutions for current IP and future networks
PublikacjaEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...
-
Distinguishing views in symmetric networks: A tight lower bound
PublikacjaThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublikacjaDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Discriminatory expressions, the young and social networks: The effect of gender
PublikacjaIn the framework of the «Project I: CUD» (Internet: Creatively Unveiling Discrimination), carried out in the United Kingdom, Italy, Belgium, Romania and Spain, we conducted a study into the expressions of discrimination used by young people on social network sites. To do so we designed a methodological strategy for detecting discriminatory content in 493 Facebook profiles and used this strategy to collect 363 examples for further...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublikacjaThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublikacjaOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Gossiping by energy-constrained mobile agents in tree networks
PublikacjaEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublikacjaMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublikacjaIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
Outlier detection method by using deep neural networks
PublikacjaDetecting outliers in the data set is quite important for building effective predictive models. Consistent prediction can not be made through models created with data sets containing outliers, or robust models can not be created. In such cases, it may be possible to exclude observations that are determined to be outlier from the data set, or to assign less weight to these points of observation than to other points of observation....
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublikacjaIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
PublikacjaCommunication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublikacjaThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Mobile Networks' Analysis in Terms of QoS Performance Assessment
PublikacjaQuality of service (QoS) assessment is one of the basic processes carried out by mobile network operators (MNOs) and regulators of the telecommunications market. Usually, professional companies carry out measurements for various country areas and use cases (scenarios). In this paper, we show exemplary measurement results carried out in drive tests in the vicinity of the Polish capital by a professional company. The measurement...
-
Characterizing the Scalability of Graph Convolutional Networks on Intel® PIUMA
PublikacjaLarge-scale Graph Convolutional Network (GCN) inference on traditional CPU/GPU systems is challenging due to a large memory footprint, sparse computational patterns, and irregular memory accesses with poor locality. Intel’s Programmable Integrated Unffied Memory Architecture (PIUMA) is designed to address these challenges for graph analytics. In this paper, a detailed characterization of GCNs is presented using the Open-Graph Benchmark...
-
Neural networks in the diagnostics of induction motor rotor cages.
PublikacjaW środowisku Lab VIEW została stworzona aplikacja służąca do pomiaru, prezentacji i zapisu przebiegów widma prądu stojana z uwzględnieniem potrzeb pomiarowych występujących podczas badania wirników silników indukcyjnych przy użyciu sieci neuronowych. Utworzona na bazie zbioru uczącego sieć Kohonena z powodzeniem rozwiązała stawiany przed nią problem klasyfikacji widm prądu stojana, a co za tym idzie również diagnozy stanu...
-
Applications of neural networks and perceptual masking to audio restoration
PublikacjaOmówiono zastosowania algorytmów uczących się w dziedzinie rekonstruowania nagrań fonicznych. Szczególną uwagę zwrócono na zastosowanie sztucznych sieci neuronowych do usuwania zakłócających impulsów. Ponadto opisano zastosowanie inteligentnego algorytmu decyzyjnego do sterowania maskowaniem perceptualnym w celu redukowania szumu.
-
Quality assessment of mobile host services in IP networks
PublikacjaW pracy opisano podstawowe protokoły wspierające komunikację stacji ruchomych w sieciach IP. Przedmiotem zainteresowania były w szczególności rozwiązania MIP oraz Calkular IP i HAWAII - wspierające mobilność w skali makro bądź mikro. Przeprowadzono badania symulacyjne wskazujące na przydatność powyższych protokołów w przypadku różnych konfiguracji sieci.
-
Scheduling algorithms for multimedia services in hiperlan/2 networks
PublikacjaW artykule zaprezentowano tradycyjne wykorzystanie oraz nowe metody przydziału pasma użytkownikom lokalnych sieci bezprzewodowych. W szczególności analizowano przydatność dwóch propozycji - algorytmów obsługi strumieni ruchu o zróżnicowanych priorytetach. Propozycje te uwzględniają rezerwację zasobów. Przeprowadzone badanie symulacyjne potwierdziły przydatność obu algorytmów do obsługi ruchu multimedialnego.
-
Extraction of music information based on artifical neutral networks
PublikacjaW artykule przedstawiono założenia systemu automatycznego rozpoznawania muzyki. Na podstawie przeprowadzonych eksperymentów w artykule przedstawiono efektywność zaimplementowanych algorytmów w zależności od sposobu opisu danych muzycznych. Zaimpementowany system jest oparty o sztuczne sieci neuronowe.
-
Seamless roaming between UMTS and IEEE 802.11 networks.
PublikacjaW artykule opisano metody przełączania pomiędzy systemami UMTS i sieciami standardu IEEE 802.11 - wykorzystującymi protokół MIP. Zaproponowano parametry i ........związane z przełączeniami połączeń, pozwalające na zwiększenie efektywności pracy systemów końcowych, uzyskujących dostęp do Intrnetu za pomocą wspomnianych wyżej systemów. Propozycje zostały zweryfikowane metodami symulacyjnymi, z wykorzystaniem symulatora NS-2.
-
Application of neural networks for turbine rotor trajectory investigation.
PublikacjaW pracy przedstawiono rezultaty badań sieci neuronowych przewidujących trajektorię wirnika turbinowego uzyskanych ze stanowiska turbiny modelowej. Badania wykazały, iż sieci neuronowe wydają się być z powodzeniem zastosowane do przewidywania trajektorii ruchu wirnika turbiny. Najważniejszym zadaniem wydaje się poprawne określenie wektorów sygnałów wejściowych oraz wyjściowych jak również prawidłowe stworzenie sieci neuronowej....
-
Problems in toxicity analysis - application of fuzzy neural networks
PublikacjaPraca dotyczy zastosowania sztucznych sieci neuronowych do przygotowywania danych do szacowania toksyczności (wody powierzchniowe). Przygotowanie to polega na sztucznym zagęszczaniu zbioru danych, które następnie mogą być wykorzystane do szacowania/modelowania wartości toksyczności na ich podstawie.
-
End-to-end service survivability under attacks on networks
PublikacjaW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
MAC-layer vulnerabilities of IEEE 802.11 wireless networks
PublikacjaDla sieci bezprzewodowych pracujących według standardu IEEE 802.11 przeprowadzono analizę symulacyjną i badania pomiarowe w specjalnie zestawionej konfiguracji w celu określenia rozdziału pasma transmisyjnego pomiędzy stacje uczciwe i stacje atakujące wybrane mechanizmy protokołu MAC.
-
LEARN Journal: Language Education and Acquisition Research Network
Czasopisma -
Enantioselective Extraction System Containing Binary Chiral Selectors and Chromatographic Enantioseparation Method for Determination of the Absolute Configuration of Enantiomers of Cyclopentolate
Publikacja -
Dimolybdenum Tetraacetate as an Auxiliary Chromophore in Absolute Configuration Determination of Amino Acids from their Circular Dichroism Spectra - Foundations and Developments
Publikacja -
Robert Burczyk mgr inż.
OsobyRobert Burczyk received Eng. degree and M. SC. Eng. degree in electronics and telecommunictions engineering in 2017 and 2018 successively with specialization in radiocommunication systems and networks. The subject of the dissertations was focused on Wireless Body Area Network (WBAN). Currently, he is a PhD student and an employee at the Department of Radiocommunication Systems and Networks, Gdansk University of Technology. His...
-
Method using bilinear transformation for measurement of impedance parameters of a multielement two-terminal network
PublikacjaArtykuł przedstawia metodę identyfikacji parametrów impedancyjnych obiektów modelowanych dwójnikami. Metoda wykorzystuje właściwości przekształcenia biliniowego pozwalającego na przedstawienie impedancji obiektu jako funkcji każdego z parametrów obwodu zastępczego z osobna. Odwrotne przekształcenie biliniowe pozwala na wyznaczenie wartości każdego parametru na podstawie pomiaru impedancji na jednej częstotliwości dobranej dla...
-
A new approach to provide the differentiated levels of network survivability under a double node failure
PublikacjaW artykule zaproponowano klasową metodę ochrony strumieni ruchu w sieciach WDM zapewniającą szybkie odtwarzanie połączeń w sytuacji jednoczesnej awarii jej dwóch elementów. Szczególny nacisk położono na zagadnienie zapewnienia zróżnicowanych poziomów przeżywalności w celu ich lepszego dopasowania do zróżnicowanych wymagań użytkowników. Pokazano, że w celu zapenienia ochrony przed awarią dwóch elementów, wymagania dotyczące przepustowości...
-
Fast synchronous distribution network of data streams for RPC Muon Trigger in CMS experiment
Publikacja -
Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network
PublikacjaWe analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative...
-
Operation of trolleybus transport in Portugal. Revitalization of trolleybus network in Coimbra and development plans in Amadora
PublikacjaW artykule opisano sytuację komunikacji trolejbusowej w Portugalii.
-
An application of neural network for Structural Health Monitoring of an adaptive wing with an array of FBG sensors
PublikacjaW pracy przedstwiono możliwości zastoswania sieci czujników FBG i sztucznych sieci neuronowych do detekcji uszkodzeń w poszyciu adaptacyjnego skrzydła.
-
Analysis of energy recovery from surplus water pressure of municipal heat distribution network
Publikacja -
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublikacjaCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
Comparative Evaluation of Multicoil Inductive Power Transfer Approaches Based on Z-source Network
Publikacja -
Novel Inductive Power Transfer Approach Based on Z-Source Network with Compensation Circuit
Publikacja -
The Influence of the Soil Environment on the Corrosivity of Failure Infrastructure - Case Study of the Exemplary Water Network
Publikacja -
<title>FPGA-based modular configurable controller with fast synchronous optical network</title>
Publikacja