Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "data networks" wg kryterium: Temat


Tytuł:
End-to-end service survivability under attacks on networks
Autorzy:
Molisz, W.
Rak, J.
Powiązania:
https://bibliotekanauki.pl/articles/308000.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
survivable data networks
attacks on networks
scale-free networks
routing
resource allocation
Opis:
Network survivability is a capability of a networked system to provide its services despite failures or attacks. Attacks, e.g., due to acts of war, being potentially damaging events, were basically considered in the historical definitions of a survivability phenomenon. The meaning of the term: "network survivability" evolved in the last decade. Recently, attacks replayed the important role again. Their nature, however, including intrusions, probes, denials of service, differs from the old one. Survivability is strongly related to other fields of study. In particular, quality of service depends on network survivability. We investigate these dependencies in scale-free networks. Many networks are scale-free, i.e., their node degree distribution follows the power law. Nodes of the highest degrees, called centers, are highly vulnerable to attacks. Elimination of these nodes seriously degrades the overall performance of network services. In this paper we propose a model, which, based on traffic parameters of a demand, like delay or bit rate, allows to establish the survivable and attack proof end-to-end connections. The key idea of this model is that for the significant traffic, it establishes paths, which omit centers. The important connections become more resistant to attacks. We show that in the best case, obtained for the highest class of service, the number of broken connections is reduced even by factor 3. Example results are compared to those for the standard distance metrics. Our model is applicable to many network architectures and many classes of service.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 3; 19-26
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the connections between optimal control, regulation and dynamic network routing
Autorzy:
Karbowski, A.
Powiązania:
https://bibliotekanauki.pl/articles/307694.pdf
Data publikacji:
2003
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
stabilization
nonlinear control
optimal control
dynamic programming
data networks
routing algorithms
Opis:
The paper is devoted to studying general features of dynamic network routing problems. It is shown that these problems may be interpreted as receding horizon optimal control problems or simply regulation problems. In the basic formulation it is assumed, that the nodes have no dynamics and the only goal of the optimization mechanism is to find the shortest paths from the source to the destination nodes. In this problem the optimization mechanism (i.e. the Bellman-Ford algorithm) may be interpreted as a receding horizon optimal control routine. Moreover, there is one-toone correspondence between the Bellman optimal cost-to-go function in the shortest path problem and the Lyapunov function in the regulation problem. At the end some results of the application of the routing optimization algorithm to an inverted pendulum regulation problem are presented.
Źródło:
Journal of Telecommunications and Information Technology; 2003, 3; 67-72
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust Flow Controllers for a Single Virtual Circuit in Data Transmission Networks with Lossy Links
Autorzy:
Bartoszewicz, A.
Leśniewski, P.
Powiązania:
https://bibliotekanauki.pl/articles/108780.pdf
Data publikacji:
2012
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
data transmission networks
congestion control
sliding-mode control
discrete-time systems
Opis:
The paper concerns an application of regulation theory methods to modeling and effective control of connection-oriented data transmission networks. In particular the problem of congestion control in a single virtual circuit of such a network is considered and new discrete-time sliding mode data flow rate controllers are proposed. The controllers are designed in such a way that packet losses are explicitly accounted for. The closed-loop system stability and finitetime error convergence are proved. Moreover, a number of favorable properties of the proposed controllers are stated as theorems, formally proved and verified in a simulation example. It is demonstrated that the proposed controllers guarantee full utilization of the available bandwidth and eliminates the risk of bottleneck node buffer overflow. Application of time-varying sliding hyperplanes helps avoid excessive transmission rates at the beginning of the control process.
Źródło:
Journal of Applied Computer Science Methods; 2012, 4 No. 1; 5-20
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Referential graphs
Grafy referencyjne
Autorzy:
Ledziński, D.
Marciniak, B.
Śrutek, M.
Powiązania:
https://bibliotekanauki.pl/articles/389824.pdf
Data publikacji:
2013
Wydawca:
Politechnika Bydgoska im. Jana i Jędrzeja Śniadeckich. Wydawnictwo PB
Tematy:
graphs
chordal rings
data communication networks
grafy
grafy referencyjne
projektowanie sieci telekomunikacyjnych
Opis:
The authors of this paper have defined the notion of referential graphs which allow to model data and telecommunication networks in order to optimize them. Parameters of this type of graphs can be compared with parameters of modified chordal rings three and four degree. A description of the program developed for graphs of this type and its effects have been presented.
W artykule zdefiniowano pojęcie Grafu Referencyjnego, za pomocą którego można modelować sieci teleinformatyczne w celu ich optymalizacji. Zdefiniowano parametry takiego typu grafów, które zostały porównane z parametrami modyfikowanych pierścieni cięciwowych trzeciego i czwartego stopnia. Do modelowania poszczególnych przypadków opracowano program symulacyjny. Zaprezentowano opis tego programu oraz wyniki otrzymane przy wyszukiwaniu grafów referencyjnych dla szerokiego spektrum danych wejściowych.
Źródło:
Zeszyty Naukowe. Telekomunikacja i Elektronika / Uniwersytet Technologiczno-Przyrodniczy w Bydgoszczy; 2013, 17; 37-73
1899-0088
Pojawia się w:
Zeszyty Naukowe. Telekomunikacja i Elektronika / Uniwersytet Technologiczno-Przyrodniczy w Bydgoszczy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data security based on neural networks
Autorzy:
Noaman, K.M.G.
Jalab, H.A.
Powiązania:
https://bibliotekanauki.pl/articles/1964155.pdf
Data publikacji:
2005
Wydawca:
Politechnika Gdańska
Tematy:
data security
cryptography
neural networks
Opis:
The paper is concerned with the study and design of a data security system based on neural networks. Data with different keys were taken as test data, encrypted, decrypted and compared with the original data. The results have confirmed its advantages over other techniques.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2005, 9, 4; 409-414
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measurement Data Acquisition System Utilising the GSM Phone System
Autorzy:
Brocki, J
Goetzen, P.
Makuch, J.
Marchlewska, A.
Skowrońska-Kapusta, A.
Powiązania:
https://bibliotekanauki.pl/articles/108728.pdf
Data publikacji:
2010
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
computer networks
data acquisition
GSM
EIS
Opis:
We present a new approach to designing of application which can be used for data acquisition. Cellular phone is used to transfer the data. Connecting many phones builds highly scalable measurement network. SMS messages were used to transfer the data.
Źródło:
Journal of Applied Computer Science Methods; 2010, 2 No. 2; 201-211
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kohonen self-organizing maps for symbolic objects
Samoorganizujące się mapy Kohonena dla obiektów symbolicznych
Autorzy:
Dudek, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/907030.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Classification
visualization
symbolic data
neural networks
Opis:
Visualizing data in the form of illustrative diagrams and searching, in these diagrams, for structures, clusters, trends, dependencies etc. is one of the main aims of multivariate statistical analysis. In the case of symbolic data (e.g. data in form of: single quantitative value, categorical values, intervals, multi-valued variables, multi-valued variables with weights), some well-known methods are provided by suitable 'symbolic' adaptations of classical methods such as principal component analysis or factor analysis. An alternative visualization of symbolic data is obtained by constructing a Kohonen map. Instead of displaying the individual items k = 1,..., n by n points or rectangles in a two dimensional space, the n items are first clustered into a number m of mini-clusters and then these mini-clusters are assigned to the vertices of a rectangular lattice of points in the plane such that 'similar' clusters are represented by neighbouring vertices in the lattice.
Źródło:
Acta Universitatis Lodziensis. Folia Oeconomica; 2008, 216
0208-6018
2353-7663
Pojawia się w:
Acta Universitatis Lodziensis. Folia Oeconomica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The use of can in automation test bench to test the engine cooling system
Autorzy:
Kneba, Z.
Śmieja, M.
Powiązania:
https://bibliotekanauki.pl/articles/243994.pdf
Data publikacji:
2010
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
CAN networks
car networks
data exchange
cooling system
engine operation
Opis:
Can is widely distributed network in the industry and automotive applications with high availability enable its electronic components and the easy integration projects with software engineering research Matlab type, tends to encourage the use of these precious features of CAN to build research stands. The article presents a data transmission system using the CAN protocol as a test of a new generation of cooling systems for internal combustion engines. Adopted for the object of research methodology which involves the simulation of variable parameters of the different control strategies require data processing in real time. A large number of recorded and interpreted online information about the temperatures in many parts of the facility and other variables such as instantaneous fuel consumption, secreted mechanical power, crankshaft and throttle position together with the need to control the plant justify departure from the traditional methods of transmitting signals in separate lines , for the application data exchange network, adopted by the authors as a way of organizing the flow of data based on the CAN protocol using the Matlab Simulink Real Time. The article contains a description of the implementation of networks in the context of very specific features for Controller Area Network particularly regarding mechanisms such as arbitration on the bus, the method of initiation and the provision of sufficient transmission capacity. The presented graphs and diagrams illustrate the proposed and implemented solutions and the results obtained from stucties measuring temperatures for the warm-up and cooling of the engine.
Źródło:
Journal of KONES; 2010, 17, 3; 205-210
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhancing constructive neural network performance using functionally expanded input data
Autorzy:
Bertini, Jr., J. R.
Carmo Nicoletti, do, M.
Powiązania:
https://bibliotekanauki.pl/articles/91786.pdf
Data publikacji:
2016
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
constructive neural networks
functional link artificial neural networks
functionally expanded input data
Opis:
Constructive learning algorithms are an efficient way to train feedforward neural networks. Some of their features, such as the automatic definition of the neural network (NN) architecture and its fast training, promote their high adaptive capacity, as well as allow for skipping the usual pre-training phase, known as model selection. However, such advantages usually come with the price of lower accuracy rates, when compared to those obtained with conventional NN learning approaches. This is, perhaps, the reason for conventional NN training algorithms being preferred over constructive NN (CoNN) algorithms. Aiming at enhancing CoNN accuracy performance and, as a result, making them a competitive choice for machine learning based applications, this paper proposes the use of functionally expanded input data. The investigation described in this paper considered six two-class CoNN algorithms, ten data domains and seven polynomial expansions. Results from experiments, followed by a comparative analysis, show that performance rates can be improved when CoNN algorithms learn from functionally expanded input data.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2016, 6, 2; 119-131
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The flexray networks in the modern motorcars
Autorzy:
Śmieja, M.
Powiązania:
https://bibliotekanauki.pl/articles/247452.pdf
Data publikacji:
2010
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
FlexRay
car networks
data exchange
engine operation
motorcars
Opis:
Advancing the evolution of motor cars, understood as complex mechatronic systems are connected with the ever emerging constrains on coordination between the components of the system objects. Adopted by all environment related to the automotive, the way of communication between the vehicle components via network for data exchange, connected with the necessity to keep up with increasing demands on the transmission speed and level of security. The answers to these requirements concerning the ways to control x-by-wire or complex mechanism to optimize the operation of the engine, seems to have been created by the big automobile companies FlexRay protocol. The article presents the basie features of this method of communication that allows for a 10 fold increase in data rates compared to the conventional CAN network. The remaining features of transmission such as reliability and level of time determinism, which are important for control systems are discussed later in the paper. Included in the summary comments indicate potential further developments and the possibilities of the application if this method of transmission in automotive applications.
Źródło:
Journal of KONES; 2010, 17, 3; 431-435
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementation of remote control device using USB 1208LS
Autorzy:
KARAARSLAN,, Ahmet
ÖZER, Tolga
Powiązania:
https://bibliotekanauki.pl/articles/456901.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski
Tematy:
remote control
USB DAQ
data communications
computer networks
Opis:
In parallel with developments in technology, home automation systems are being increasingly used. In this study, computer networks and the power system can be controlled by Internet for a remote device. This application was carried out in two stages of software and hardware. The software is developed in C # programming language. This software is connected to the computer using a remote server devices, performed the required information has been sent. The second part of the application is prepared in the hardware. The information that come to the server Usb can handled and performed by Usb 1208LS. This circuit design performed and connected to the server Usb. After the coming data has been processed, target device which connected to the circuit making power control and commands sent to the device peaks and the application process has been completed the desired
Źródło:
Edukacja-Technika-Informatyka; 2013, 4, 2; 406-417
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
INFORMATION SECURITY AND PERSONAL DATA PROTECTION ON INTERNET SOCIAL NETWORKS
Autorzy:
Vladimír, Sedlák,
Eduard, Snižik,
Michal, Krajník,
Powiązania:
https://bibliotekanauki.pl/articles/890913.pdf
Data publikacji:
2018-08-22
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
internet
information security
social networks
personal data protection
Opis:
Modern human generation, especially the younger generation, in the digital world spends more and more time. Experts in the area recorded a significant increase of interest of people on social networks. On the present, in a frame of the so-called digital contacting the people themselves is to contact online social networks, perhaps the most popular form. Article mentions the risks of leakage and misuse of personal data on such online social networks.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 15; 258-268
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A neural system of phonematic transformation
Autorzy:
Podolak, I. T.
Bielecki, A.
Powiązania:
https://bibliotekanauki.pl/articles/1931576.pdf
Data publikacji:
2003
Wydawca:
Politechnika Gdańska
Tematy:
neural networks
input-output data representation
phonematic transformation
Opis:
A common task in speech processing for which neural networks are widely employed is text-to-phoneme conversion. In this paper we propose a novel solution to this problem by combining a multilayer neural network and a modular hybrid system that uses basic rules to subdivide the original problem into easier tasks which are then solved by dedicated neural networks. A hybrid solution can be more rapidly constructed than a single net solution, and is easily extendable. Input data representation is also discussed. A voting committee concept is used to enhance generalization abilities of the system. Efficiency of the proposed systems is compared.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2003, 7, 1; 115-130
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Single-ended quality measurement of a music content via convolutional recurrent neural networks
Autorzy:
Organiściak, Kamila
Borkowski, Józef
Powiązania:
https://bibliotekanauki.pl/articles/1849158.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
audio data analysis
artefacts detection
convolutional neural networks
recurrent neural networks
classification model
Opis:
The paper examines the usage of Convolutional Bidirectional Recurrent Neural Network (CBRNN) for a problem of quality measurement in a music content. The key contribution in this approach, compared to the existing research, is that the examined model is evaluated in terms of detecting acoustic anomalies without the requirement to provide a reference (clean) signal. Since real music content may include some modes of instrumental sounds, speech and singing voice or different audio effects, it is more complex to analyze than clean speech or artificial signals, especially without a comparison to the known reference content. The presented results might be treated as a proof of concept, since some specific types of artefacts are covered in this paper (examples of quantization defect, missing sound, distortion of gain characteristics, extra noise sound). However, the described model can be easily expanded to detect other impairments or used as a pre-trained model for other transfer learning processes. To examine the model efficiency several experiments have been performed and reported in the paper. The raw audio samples were transformed into Mel-scaled spectrograms and transferred as input to the model, first independently, then along with additional features (Zero Crossing Rate, Spectral Contrast). According to the obtained results, there is a significant increase in overall accuracy (by 10.1%), if Spectral Contrast information is provided together with Mel-scaled spectrograms. The paper examines also the influence of recursive layers on effectiveness of the artefact classification task.
Źródło:
Metrology and Measurement Systems; 2020, 27, 4; 721-733
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Supporting investment decisions using data mining methods
Autorzy:
Sysiak, W.
Trajer, J.
Janaszek, M.
Powiązania:
https://bibliotekanauki.pl/articles/93017.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
data mining
decision support
k-means clustering
neural networks
Opis:
This paper presents an application of k-means clustering in preliminary data analysis which preceded the choice of input variables for the system supporting the decision about stock purchase or sale on capital markets. The model forecasting share prices issued by companies in the food-processing sector quoted at the Warsaw Stock Exchange was created in STATISTICA 7.1. It was based on neural modeling and allowed for the assessment of changes direction in securities values (increase, decrease) and generates the quantitative forecast of their future price.
Źródło:
Studia Informatica : systems and information technology; 2009, 1(12); 67-78
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exchange Rates: Predictable but not Explainable? Data Mining with Leading Indicators and Technical Trading Rules
Możliwości modelowania i prognozowania kursów walutowych: wskaźniki wyprzedzające i analiza techniczna
Autorzy:
Brandl, Bernd
Powiązania:
https://bibliotekanauki.pl/articles/907593.pdf
Data publikacji:
2005
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
exchange rates
data mining
artificial neural networks
genetic algorithms
Opis:
This paper presents a data mining approach to forecasting exchange rates. It is assumed that exchange rates are determined by both fundamental and technical factors. The balance of fundamental and technical factors varies for each exchange rate and frequency. It is difficult for forecasters to establish the relative relevance of different kinds of factors given this mixture; therefore the utilization of data mining algorithms is advantageous. The approach applied uses a genetic algorithm and neural networks. Out-of-sample forecasting results are illustrated for five exchange rates on different frequencies and it is shown that data mining is able to produce forecasts that perform well.
W artykule przedstawiono proces eksploracji danych statystycznych w prognozowaniu kursów walutowych. Zakładamy, że kursy walutowe pozostają pod wpływem zarówno czynników o charakterze fundamentalnym, jak i czynników pozaekonomicznych. Równowaga pomiędzy tymi czynnikami różni się w zależności od rodzaju kursu walutowego i częstotliwości jego pomiaru. Prognostykom trudno jest ustalić względną siłę wpływu różnych czynników, stąd analiza polegająca na eksploracji danych ma określone zalety. W proponowanym podejściu wykorzystano algorytmy genetyczne i sztuczne sieci neuronowe. Przedstawiliśmy wyniki eksperymentów prognostycznych poza próbą statystyczną w odniesieniu do pięciu kursów walutowych, obserwowanych z różną częstotliwością. Pokazaliśmy, że metoda eksploracji danych może stanowić skuteczne narzędzie prognostyczne.
Źródło:
Acta Universitatis Lodziensis. Folia Oeconomica; 2005, 192
0208-6018
2353-7663
Pojawia się w:
Acta Universitatis Lodziensis. Folia Oeconomica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Applying a neural network ensemble to intrusion detection
Autorzy:
Ludwig, Simone A.
Powiązania:
https://bibliotekanauki.pl/articles/91620.pdf
Data publikacji:
2019
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
ensemble learning
Deep Neural Networks
NSL-KDD data set
Opis:
An intrusion detection system (IDS) is an important feature to employ in order to protect a system against network attacks. An IDS monitors the activity within a network of connected computers as to analyze the activity of intrusive patterns. In the event of an ‘attack’, the system has to respond appropriately. Different machine learning techniques have been applied in the past. These techniques fall either into the clustering or the classification category. In this paper, the classification method is used whereby a neural network ensemble method is employed to classify the different types of attacks. The neural network ensemble method consists of an autoencoder, a deep belief neural network, a deep neural network, and an extreme learning machine. The data used for the investigation is the NSL-KDD data set. In particular, the detection rate and false alarm rate among other measures (confusion matrix, classification accuracy, and AUC) of the implemented neural network ensemble are evaluated.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2019, 9, 3; 177-178
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enriching WSN environment with context information
Autorzy:
Konieczny, M.
Powiązania:
https://bibliotekanauki.pl/articles/305246.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
wireless sensor networks
context-aware systems
data-centric architectures
Opis:
Currently the Internet of Things environment suffer from a variety of unique problems such as low throughput, inadequate support for mobility and notcompatible (and often close) application environments. However, characteristic of physical environment often provides opportunities to address these problems. This paper explores concepts of enriching the WNS environment with context-based information. By context we consider all data available in sensors environment, not only data processed by them. Currently this data are not utilized by sensors, but we think that they can improve overall functionality of the sensor network. We also discuss the practical challenges facing the integration of such an approach into the sensor application stack.
Źródło:
Computer Science; 2012, 13 (4); 101-114
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Occupational accidents data collection and analysis
Autorzy:
Demichela, M.
Murè, S.
Cigna, C.
Monai, L.
Patrucco, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069533.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
occupational accidents
fuzzy logic
neural networks
expert systems
data collection
Opis:
Despite of the always growing attention to safety related topics, the enforcement of directives, regulations and technical standards and the improvement of technical solutions aimed to minimize the occupational risks, the number of people dying every day at workplaces is still excessively high. The overall number of injuries is recently decreasing, but both the frequency and the total yearly number of fatalities still remain fundamentalny unchanged in the last years. The main problem with accidental data, as officially reported, is that very often, no evaluation is possible in terms of root causes, e.g. standard violations. Since the target of the analysis is the determination of the causal chain of events that lead to the accident to understand how it happened and how to avoid the occurrence of similar situations, the lack of detailed information lead to many difficulties in the definition of the suitable prevention measures. This paper shows three different, but integrated. methods able to collect, manage and analyze the information related to occurred accidents for preventive purposes.
Źródło:
Journal of Polish Safety and Reliability Association; 2010, 1, 1; 67--74
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of multi-parameter data visualization by means of autoassociative neural networks to evaluate classification possibilities of various coal types
Autorzy:
Jamroz, D.
Powiązania:
https://bibliotekanauki.pl/articles/109902.pdf
Data publikacji:
2014
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
autoassociative neural networks
coal types
multidimensional visualization
multi-parameter
identification of data
pattern recognition
neural networks
Opis:
The significance of data visualization in modern research is growing steadily. In mineral processing scientists have to face many problems with understanding data and finding essential variables from a large amount of data registered for material or process. Hence it is necessary to apply visualization of such data, especially when a set of data is multi-parameter and very complex. This paper puts forward a proposal to introduce the autoassociative neural networks for visualization of data concerning three various types of hard coal. Apart from theoretical discussion of the method, the empirical applications of the method are presented. The results revealed that it is a useful tool for a researcher facing a complicated set of data which allows for its proper classification. The optimal neural network parameters to successfully separate the analyzed three types of coal were found out for the analyzed example.
Źródło:
Physicochemical Problems of Mineral Processing; 2014, 50, 2; 719-734
1643-1049
2084-4735
Pojawia się w:
Physicochemical Problems of Mineral Processing
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Developments on an IEEE 802.15.4-based wireless sensor network
Autorzy:
Scheers, B.
Mees, W.
Lauwens, B.
Powiązania:
https://bibliotekanauki.pl/articles/308225.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
wireless sensor networks
IEEE 802.15.4
effective data capacity
positioning
Opis:
In this paper a summary is given of the ongoing research at the Belgian Royal Military Academy in the field of mobile ad hoc networks in general and wireless sensor networks (WSNs) in particular. In this study, all wireless sensor networks are based on the physical and the medium access layer of the IEEE 802.15.4 low rate wireless personal area networks standard. The paper gives a short overview of the IEEE 802.15.4 standard in the beaconless mode together with a description of the sensor nodes and the software used throughout this work. The paper also reports on the development of a packet sniffer for IEEE 802.15.4 integrated in wireshark. This packet sniffer turns out to be indispensable for debugging purposes. In view of future applications on the wireless network, we made a theoretical study of the effective data capacity and compared this with measurements performed on a real sensor network. The differences between measurements and theory are explained. In case of geograph- ically meaningful sensor data, it is important to have a knowledge of the relative position of each node. In the last part of the paper we present some experimental results of positioning based on the received signal strength indicators (RSSI). As one could expect, the accuracy of such a method is poor, even in a well controlled environment. But the method has some potential.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 46-53
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analizy big data w serwisach społecznościowych
Big data Analysis in Social Network
Autorzy:
Polańska, Krystyna
Wassilew, Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/548338.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
big data
sieci społecznościowe
polityka prywatności
social networks
political of privacy
Opis:
Analizy big data otworzyły nowy rozdział w podejściu do wnioskowania na podstawie danych pozyskiwanych z Internetu. Przede wszystkim dostępne dane mają już nie tylko historyczny charakter i nie dotyczą tylko prób z badanych populacji, ale zyskały walor aktualności i masowości dzięki ekstrakcji danych z Internetu. Nadal jednak poza obszarem obserwacji badawczych pozostali wykluczeni cyfrowo, którzy są niewidoczni w sieci choć pozostają częścią społeczeństwa. Celem artykułu jest wskazanie możliwości wykorzystania analiz dużych zbiorów danych pozyskiwanych z Internetu oraz określenie wskaźników pochodzących z sieci społecznościowych, które mogą służyć do wnioskowania w opisie zjawisk społecznych, politycznych i gospodarczych.
Analysis of big data opened a new chapter in the approach to inference on the basis of data obtained from the Internet. First of all available data no longer has just a historical nature and does not apply only to samples of the studied population, but have gained the values of current affairs and mass scale through extraction of data from the Internet. Still, beyond the research observations are thedigitally excluded who are invisible in the network although they remain a part of society. The aim of this article is to show the possibility of analysing big data obtained from the Internet to identify indicators from social networks, which can be used for inference in the description of social, political and economic phenomena.
Źródło:
Nierówności Społeczne a Wzrost Gospodarczy; 2015, 44 cz. 2; 117-128
1898-5084
2658-0780
Pojawia się w:
Nierówności Społeczne a Wzrost Gospodarczy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Investigation of the Applicability of Data-Driven Techniques in Hydrological Modeling: The Case of Seyhan Basin
Autorzy:
Turhan, Evren
Keleş, Mümine Kaya
Tantekin, Atakan
Keleş, Abdullah Emre
Powiązania:
https://bibliotekanauki.pl/articles/1811777.pdf
Data publikacji:
2019
Wydawca:
Politechnika Koszalińska. Wydawnictwo Uczelniane
Tematy:
artificial neural networks
drought analysis
data mining
Multilayer Perceptron
Seyhan Basin
Opis:
Proper water resources planning and management is based on reliable hydrological data. Missing rainfall and runoff observation data, in particular, can cause serious risks in the planning of hydraulics structures. Hydrological modeling process is quitely complex. Therefore, using alternative estimation techniques to forecast missing data is reasonable. In this study, two data-driven techniques such as Artificial Neural Networks (ANN) and Data Mining were investigated in terms of availability in hydrology works. Feed Forward Back Propagation (FFBPNN) and Generalized Regression Neural Networks (GRNN) methods were performed on rainfall-runoff modeling for ANN. Besides, Hydrological drought analysis were examined using data mining technique. The Seyhan Basin was preferred to carry out these techniques. It is thought that the application of different techniques in the same basin could make a great contribute to the present work. Consequently, it is seen that FFBPNN is the best model for ANN in terms of giving the highest R2 and lowest MSE values. Multilayer Perceptron (MLP) algorithm was used to predict the drought type according to limit values. This system has been applied to show the relationship between hydrological data and measure the prediction accuracy of the drought analysis. According to the obtained data mining results, MLP algorithm gives the best accuracy results as flow observation stations using SRI-3 month data.
Źródło:
Rocznik Ochrona Środowiska; 2019, Tom 21, cz. 1; 29-51
1506-218X
Pojawia się w:
Rocznik Ochrona Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards textual data augmentation for neural networks: synonyms and maximum loss
Autorzy:
Jungiewicz, Michał
Smywiński-Pohl, Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/305750.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
deep learning
data augmentation
neural networks
natural language processing
sentence classification
Opis:
Data augmentation is one of the ways to deal with labeled data scarcity and overfitting. Both of these problems are crucial for modern deep-learning algorithms, which require massive amounts of data. The problem is better explored in the context of image analysis than for text; this work is a step forward to help close this gap. We propose a method for augmenting textual data when training convolutional neural networks for sentence classification. The augmentation is based on the substitution of words using a thesaurus as well as Princeton University's WordNet. Our method improves upon the baseline in most of the cases. In terms of accuracy, the best of the variants is 1.2% (pp.) better than the baseline.
Źródło:
Computer Science; 2019, 20 (1); 57-83
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Addressing Anticompetitive Data Aggregation: a Comment to Bundeskartellamt Decision B6-22/16
Autorzy:
Skopowska, Laura
Powiązania:
https://bibliotekanauki.pl/articles/2159203.pdf
Data publikacji:
2019-10-29
Wydawca:
Uniwersytet Warszawski. Wydawnictwo Naukowe Wydziału Zarządzania
Tematy:
data aggregation
data-driven markets
platforms
networks
data
information asset
abuse of dominant position
abusive business terms
exclusionary
abuse
exploitative abuse
Opis:
Data aggregation, understood as the process of gathering and combining data in order to prepare datasets that might be useful for specific business or other purposes, is not per se forbidden. However, some forms of it can be considered anticompetitive. In the Decision B6-22/16 of the German Federal Cartel Office (Bundeskartellamt) data aggregation, which included the collection of data from sources outside of Facebook’s social network (from Facebook-owned services such as WhatsApp and Instagram and from third party websites or mobile applications) and their combination with the information connected with a particular Facebook user account without that user’s consent, constituted an abuse of Facebook’s dominant position on the German market for social networks. The Bundeskartellamt found that the processing of user’s personal data by Facebook has, to some extent, been carried out in a way which infringed GDPR provisions. In the same decision, the Bundeskartellamt also identified the exclusionary nature of Facebook’s anticompetitive behaviour. According to the Bundeskartellamt, the illegal data aggregation formed a barrier to entry for Facebook’s competitors which, through compliance with data protection standards, found themselves in a worst position. Facebook, through its inappropriate data aggregation gained a competitive advantage. The Bundeskartellamt’s decision is, therefore, reflecting the anticompetitive dangers that data aggregation might pose. Nevertheless, it is debated whether the Bundeskartellamt, as a competition authority, is competent to determine the compliance or lack of compliance of business terms with the provisions of the GDPR. This paper analyzes the Bundeskartellamt’s decision as to where an anticompetitive nature of data processing has been identified, and tries to answer the question why it is problematic that it was the Bundeskartellamt and not a data protection supervisory authority that has issued such a decision.
L’agrégation de données, entendue comme le processus de collecte et de combinaison de données en vue de la préparation d’ensembles de données qui pourraient être utiles à des fins commerciales spécifiques ou pour d’autres fins, n’est pas en soi interdite. Toutefois, certaines formes peuvent être considérées comme anticoncurrentielles. Dans la décision B6-22/16, l’Office fédéral allemand des cartels(Bundeskartellamt) a examiné l’agrégation de données effectuée par Facebook, qui comprenait la collecte de données provenant de sources autres que le réseau social Facebook (de services appartenant à Facebook tels que WhatsApp et Instagram ou sites Web tiers ou applications mobiles) et leur combinaison aux informations liées aux comptes utilisateurs Facebook sans consentement de l’utilisateur. Premièrement, le Bundeskartellamt a considéré qu’un tel comportement constituait un abus de position dominante de Facebook sur le marché allemand des réseaux sociaux. Le Bundeskartellamt a également constaté que le traitement des données à caractère personnel des utilisateurs par Facebook a, dans une certaine mesure, été effectué en violation des dispositions du GDPR. Dans la même décision, le Bundeskartellamt a aussi identifié le caractère exclusif du comportement anticoncurrentiel de Facebook. Selon le Bundeskartellamt, l’agrégation illégale de données a constitué une barrière à l’entrée pour les concurrents de Facebook qui, en respectant les normes de protection des données, se sont trouvés dans la pire position. Facebook, par son agrégation inappropriée de données, a acquis un avantage concurrentiel. La décision du Bundeskartellamt reflète donc les dangers anticoncurrentiels que l’agrégation de données pourrait poser. Néanmoins, la question de savoir si le Bundeskartellamt, en tant qu’autorité de concurrence, est compétent pour déterminer si les conditions commerciales sont conformes ou non aux dispositions du GDPR est une question qui fait débat. Le présent article analyse la décision du Bundeskartellamt lorsqu’une nature anticoncurrentielle du traitement des données a été identifiée et essaye de répondre à la question du fait que ce soit le Bundeskartellamt qui ait pris une telle décision et non une autorité de contrôle en charge la protection des données.
Źródło:
Yearbook of Antitrust and Regulatory Studies; 2019, 12, 19; 139-172
1689-9024
2545-0115
Pojawia się w:
Yearbook of Antitrust and Regulatory Studies
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies