Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "network model" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
N-Body Potential Interaction as a Cost Function in the Elastic Model for SANET Cloud Computing
Autorzy:
Chaczko, Z.
Resconi, G.
Chiu, C.
Aslanzadeh, S.
Powiązania:
https://bibliotekanauki.pl/articles/227216.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
elastic network model
cloud computing
Sensor-Actor networks
matrix calculus
N-Body interactions
cost functions
Opis:
Given a connection graph of entities that send and receive a flow of data controlled by effort and given the parameters, the metric tensor is computed that is in the elastic relational flow to effort. The metric tensor can be represented by the Hessian of the interaction potential. Now the interaction potential or cost function can be among two entities: 3 entities or 'N' entities and can be separated into two main parts. The first part is the repulsion potential the entities move further from the others to obtain minimum cost, the second part is the attraction potential for which the entities move near to others to obtain the minimum cost. For Pauli's model [1], the attraction potential is a functional set of parameters given from the environment (all the elements that have an influence in the module can be the attraction of one entity to another). Now the cost function can be created in a space of macro-variables or macro-states that is less of all possible variables. Any macro-variable collect a set of micro-variables or microstates. Now from the hessian of the macro-variables, the Hessian is computed of the micro-variables in the singular points as stable or unstable only by matrix calculus without any analytical computation - possible when the macro-states are distant among entities. Trivially, the same method can be obtained by a general definition of the macro-variable or macro-states and micro-states or variables. As cloud computing for Sensor-Actor Networks (SANETS) is based on the bonding concept for complex interrelated systems; the bond valence or couple corresponds to the minimum of the interaction potential V and in the SANET cloud as the minimum cost.
Źródło:
International Journal of Electronics and Telecommunications; 2012, 58, 1; 63-70
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Neural Network Model for Object Mask Detection in Medical Images
Autorzy:
Tereikovskyi, Igor
Korchenko, Oleksander
Bushuyev, Sergey
Tereikovskyi, Oleh
Ziubina, Ruslan
Veselska, Olga
Powiązania:
https://bibliotekanauki.pl/articles/2200721.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
model
neural network
object mask
medical images
Opis:
In modern conditions in the field of medicine, raster image analysis systems are becoming more widespread, which allow automating the process of establishing a diagnosis based on the results of instrumental monitoring of a patient. One of the most important stages of such an analysis is the detection of the mask of the object to be recognized on the image. It is shown that under the conditions of a multivariate and multifactorial task of analyzing medical images, the most promising are neural network tools for extracting masks. It has also been determined that the known detection tools are highly specialized and not sufficiently adapted to the variability of the conditions of use, which necessitates the construction of an effective neural network model adapted to the definition of a mask on medical images. An approach is proposed to determine the most effective type of neural network model, which provides for expert evaluation of the effectiveness of acceptable types of models and conducting computer experiments to make a final decision. It is shown that to evaluate the effectiveness of a neural network model, it is possible to use the Intersection over Union and Dice Loss metrics. The proposed solutions were verified by isolating the brachial plexus of nerve fibers on grayscale images presented in the public Ultrasound Nerve Segmentation database. The expediency of using neural network models U-Net, YOLOv4 and PSPNet was determined by expert evaluation, and with the help of computer experiments, it was proved that U-Net is the most effective in terms of Intersection over Union and Dice Loss, which provides a detection accuracy of about 0.89. Also, the analysis of the results of the experiments showed the need to improve the mathematical apparatus, which is used to calculate the mask detection indicators.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 41--46
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Statement Networks to Condition Monitoring of the Sealless Pump
Autorzy:
Rzydzik, S.
Amarowicz, M.
Psiuk, K.
Rogala, T.
Powiązania:
https://bibliotekanauki.pl/articles/226493.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
diagnostic model
statement network
multi-layer
expert system
Opis:
This paper shows an application of multi-layer statement networks to condition monitoring of the sealless magnetic drive pump. In this case, statement networks are computed based on the use of Bayesian probabilities. Moreover, the tool called REx which allows implementing such networks is described. An example of created four-layer network as well as final results of the performed tests shows also.
Źródło:
International Journal of Electronics and Telecommunications; 2014, 60, 3; 265-269
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Software-Defined Networking Controller : the Distributed Active Information Model (DAIM)
Autorzy:
Pupatwibul, P.
Banjar, A.
Hossain, M. I.
Braun, R.
Moulton, B.
Powiązania:
https://bibliotekanauki.pl/articles/226996.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
distributed network
OpenFlow
DAIM model
software defined networking
next generation networks
Opis:
This paper presents a new OpenFlow controller: the Distributed Active Information Model (DAIM). The DAIM controller was developed to explore the viability of a logically distributed control plane. It is implemented in a distributed way throughout a software-defined network, at the level of the switches. The method enables local process flows, by way of local packet switching, to be controlled by the distributed DAIM controller (as opposed to a centralised OpenFlow controller). The DAIM ecosystem is discussed with some sample code, together with flowcharts of the implemented algorithms. We present implementation details, a testing methodology, and an experimental evaluation. A performance analysis was conducted using the Cbench open benchmarking tool. Comparisons were drawn with respect to throughput and latency. It is concluded that the DAIM controller can handle a high throughput, while keeping the latency relatively low. We believe the results to date are potentially very interesting, especially in light of the fact that a key feature of the DAIM controller is that it is designed to enable the future development of autonomous local flow process and management strategies.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 209-216
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Authenticated Routing Protocol for Wireless Ad Hoc Network Based on Small World Model
Autorzy:
Wang, Daxing
Xu, Leying
Powiązania:
https://bibliotekanauki.pl/articles/1844509.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small world model
wireless ad hoc network
routing protocol
authentication theory
AODV routing protocol
Opis:
Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 3; 425-430
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Autorzy:
Lakhno, Valerii
Alimseitova, Zhuldyz
Kalaman, Yerbolat
Kryvoruchko, Olena
Desiatko, Alona
Kaminskyi, Serhii
Powiązania:
https://bibliotekanauki.pl/articles/27311974.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
informatization object
distributed computing network
mathematical model
vulnerability coefficient
virtualization
IDS
SIEM
Opis:
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 475--483
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wireless Sensor Node Localization based on LNSM and Hybrid TLBO : Unilateral technique for Outdoor Location
Autorzy:
Kaundal, V.
Sharma, P.
Prateek, M.
Powiązania:
https://bibliotekanauki.pl/articles/226010.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
log normal shadowing model (LNSM)
teacher learning based optimization (TLBO)
trilateration
unilateral
RSSI
ZigBee
wireless sensor network
Opis:
The paper aims at localization of the anchor node (fixed node) by pursuit nodes (movable node) in outdoor location. Two methods are studied for node localization. The first method is based on LNSM (Log Normal Shadowing Model) technique to localize the anchor node and the second method is based on Hybrid TLBO (Teacher Learning Based Optimization Algorithm) - Unilateral technique. In the first approach the ZigBee protocol has been used to localize the node, which uses RSSI (Received Signal Strength Indicator) values in dBm. LNSM technique is implemented in the self-designed hardware node and localization is studied for Outdoor location. The statistical analysis using RMSE (root mean square error) for outdoor location is done and distance error found to be 35 mtrs. The same outdoor location has been used and statistical analysis is done for localization of nodes using Hybrid TLBO-Unilateral technique. The Hybrid-TLBO Unilateral technique significantly localizes anchor node with distance error of 0.7 mtrs. The RSSI values obtained are normally distributed and standard deviation in RSSI value is observed as 1.01 for outdoor location. The node becomes 100% discoverable after using hybrid TLBO- Unilateral technique.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 389-397
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies