Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "interface network" wg kryterium: Temat


Wyświetlanie 1-13 z 13
Tytuł:
Application of IP monitoring in the supervising system of a building
Zastosowanie monitoringu IP w systemie nadzoru budynku
Autorzy:
Boguta, A.
Powiązania:
https://bibliotekanauki.pl/articles/791898.pdf
Data publikacji:
2011
Wydawca:
Komisja Motoryzacji i Energetyki Rolnictwa
Tematy:
WiFi network
IP camera
monitoring
supervising system
building
modern technology
computer network
interface network
Źródło:
Teka Komisji Motoryzacji i Energetyki Rolnictwa; 2011, 11
1641-7739
Pojawia się w:
Teka Komisji Motoryzacji i Energetyki Rolnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Distributed social network - data security
Autorzy:
Tunia, M. A.
Powiązania:
https://bibliotekanauki.pl/articles/106200.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
social network
data security
data repository
system architecture
interface
Opis:
The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can become. Users’ personal data can constitute significant value. One of the issues of social networking is storing and processing data by only one entity. Users cannot choose the most suitable security policy because there is only one provided for certain social network. Being part of it, means accepting the risk of unauthorized data distribution and data leakage because of application vulnerabilities. This paper presents new architecture of social network, which provides mechanisms for dividing data between more than one entity and combining independent data repositories in order to deliver one social network with clearly defined interfaces used to connect new data sources.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 113-122
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Requirements of 4G-Based Mobile Broadband on Future Transport Networks
Autorzy:
Fricke, M.
Heckwolf, A.
Herber, R.
Nitsch, R.
Schwarze, S.
Voß, S.
Powiązania:
https://bibliotekanauki.pl/articles/309203.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
backhauling
LTE advanced
mobile network de-sign
X2 interface
Opis:
Long term evolution technologies provide new standards in mobile communications regarding available bandwidth. It is expected that users of one radio cell will share more than 100 Mbit/s in future. To take advantage of the full feature set of next generation mobile networks, transport network design has to face new requirements, caused by the architectural changes of LTE technologies. Especially the newly defined X2 interface impacts on the transport network requirements. X2 enables direct communication between evolved base stations (eNBs) and thus, enforces local solutions. At the same time a tendency of locating network elements at fewer, central sites to reduce operational expenditure can be observed, in particular concerning the transport layer. This leads to the question of how the direct X2 connection of eNBs on the logical layer can be accommodated with a general centralization of transport networks. Our considerations show that for LTE, a centralized transport network is able to realize the local meshing between eNBs. However, for LTE Advanced, the standards currently discussed by the 3GPP initiative could lead to enhanced requirements on the X2 interface latency. Consequently, the implications for the network architecture have to be analyzed in more detail.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 2; 21-28
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Interfejs graficzny do badań identyfikacji bramek logicznych z zastosowaniem sztucznych sieci neuronowych
Graphic Interface to Research Identification Logic Gates by Using Artificial Neural Networks
Autorzy:
KWATER, Tadeusz
KRUTYS, Paweł
BOLANOWSKI, Marek
Powiązania:
https://bibliotekanauki.pl/articles/456536.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski
Tematy:
bramki logiczne
sieci nauronowe
interfejs
logic gates
naural network
interface
Opis:
Zaprojektowany i wykonany interfejs graficzny do zastosowania w sztucznych sieciach neuronowych pozwala na lepsze zrozumienie zagadnień sztucznej inteligencji oraz przyszłych innych zastosowań. Dalsze prace mogą być prowadzone jako rozwiniecie tej idei.
Designed and manufactured graphical interface to be used in artificial neural networks allows for a better understanding of the issues of artificial intelligence and the future of other applications. Further work can be carried out as you develop this idea.
Źródło:
Edukacja-Technika-Informatyka; 2015, 6, 3; 333-338
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Concept of unifying the data exchange interface in heterogeneous ITS networks
Autorzy:
Sumila, M.
Powiązania:
https://bibliotekanauki.pl/articles/393649.pdf
Data publikacji:
2014
Wydawca:
Polskie Stowarzyszenie Telematyki Transportu
Tematy:
Datex2
NTCIP
heterogeneous network
shared interface
sieć heterogeniczna
wspólny interfejs
Opis:
A concept of unifying the communications interface between heterogeneous ITS subsystems was presented in this paper. In its first part, it concentrates on causes for and consequences of having heterogeneous networks. Then it goes to present methods developed to counteract that phenomenon through the seven layer OSI model and the CORBA standard. In latter parts, two data exchange protocols in heterogeneous ITS networks were presented. In the context of their limitations, an original concept was developed using a shared database as a universal communication interface between different ITS systems.
Źródło:
Archives of Transport System Telematics; 2014, 7, 4; 45-49
1899-8208
Pojawia się w:
Archives of Transport System Telematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Convolutional neural networks for P300 signal detection applied to brain computer interface
Autorzy:
Riyad, Mouad
Khalil, Mohammed
Adib, Abdellah
Powiązania:
https://bibliotekanauki.pl/articles/2141900.pdf
Data publikacji:
2020
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
deep learning
convolutional neural network
brain computer interface
P300
classification
Opis:
A Brain‐Computer Interface (BCI) is an instrument capa‐ ble of commanding machine with brain signal. The mul‐ tiple types of signals allow designing many applications like the Oddball Paradigms with P300 signal. We propose an EEG classification system applied to BCI using the con‐ volutional neural network (ConvNet) for P300 problem. The system consists of three stages. The first stage is a Spatiotemporal convolutional layer which is a succession of temporal and spatial convolutions. The second stage contains 5 standard convolutional layers. Finally, a lo‐ gistic regression is applied to classify the input EEG sig‐ nal. The model includes Batch Normalization, Dropout, and Pooling. Also, It uses Exponential Linear Unit (ELU) function and L1‐L2 regularization to improve the lear‐ ning. For experiments, we use the database Dataset II of the BCI Competition III. As a result, we get an F1‐score of 53.26% which is higher than the BN3 model.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2020, 14, 4; 58-63
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heuristic evaluation of visualization of the semantic searching economic information the comparative analysis of four experiments
Autorzy:
Dudycz, H.
Powiązania:
https://bibliotekanauki.pl/articles/95015.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
interface
visual interface
visualization
semantic network
searching information
ontology
interfejs
wizualny interfejs
wizualizacja
sieć semantyczna
wyszukiwanie informacji
ontologia
Opis:
The main goal of this paper is to discuss the research on heuristic evaluation of visualization in the semantic search of economic information. It is already the fourth experiment with participants. This time in the research we used two applications built in Protégé 4.1: for analysis of Return on Investment (ROI) indicator according to Du Pont model and for multidimensional early warning system. In the article we briefly described semantic networks as visual interface and premises of conducted study. Then we analysed and compared results of these experiments. Finally, we presented conclusions.
Źródło:
Information Systems in Management; 2013, 2, 3; 194-206
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Docking for drug interface residues of modelled VPS33B of human with PtpA of Mycobacterium tuberculosis CDC1551
Autorzy:
Reddy, K.M.
Pattathil, M.D.
Jayachandra, S.Y.
Parameshwar, A.
Sulochana, M.B.
Powiązania:
https://bibliotekanauki.pl/articles/11443.pdf
Data publikacji:
2014
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
antigenicity
protein-protein interaction
network
homology modelling
drug design
interface residue
Mycobacterium tuberculosis
man
protein
biological function
Opis:
VPS33B, a human Vacuolar Protein Sorting (VPS) protein which mediates the phagolysosomal fusion in macrophage of the eukaryotic organisms. This protein has a great role during the mycobacterial infections, which binds with the Mycobacterium protein tyrosine phosphatase A (PtpA). A single functional domain of PtpA has been identified using SMART domain databases, followed by finding the antigenicity of PtpA using CLC main workbench tool. The protein-protein interaction network predicts the interface of biological functions of proteins, built by using Cytoscape 2.8.3 version tool for manual literature survey of protein sets. According to the literature the specific interactivity of PtpA with VPS33B of human lead to pathogenesis, and provided a good platform to find the structure of VPS33B as it lacks the 3 dimensional structure in PDB. Homology Modelling of VPS33B provides a significant properties to design a specific drug through screening the drug databases (eDrug3D). The modelled protein has been validated through SAVES server maintained by NIH and UCLA with the standard Ramachandran plot with accuracy of 90.7 %. From our findings the interface residues are very crucial points which has been found through docking the modelled protein and Mycobacterium protein and interface residues were selected manually using PyMol software.
Źródło:
International Letters of Natural Sciences; 2014, 11, 2
2300-9675
Pojawia się w:
International Letters of Natural Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ship-Cargo Interface: Concept of Optimization, Using Risk Assessment Methods and Network Data Exchanging Technologies
Autorzy:
Sagaydak, A.
Torskiy, V.
Powiązania:
https://bibliotekanauki.pl/articles/1841524.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
risk assessment
ship-cargo Interface
concept of optimization
network data exchanging technologies
Data Exchanging Technologies
Port State Control
Opis:
The idea of the proposed concept is to optimize information exchange between ship managers and potential charterers. There are many attempts to create electronic system for facilitation of information exchange, but all of them are aimed to find solution in particular area: container or oil trade, collecting data on ships or some other Port State Control issues. Existing technical solutions in most cases are not taking into account possibility of data change, which may vary significantly during ship’s trip. Moreover, there is no deep analysis of each proposed variant, which can take into account all variable factors. Also – there is no complex solution, applicable to any ship / any cargo. Proposed concept describes the system of electronic data exchange, which assists in decision-making and based on risk assessment of changing scenario in the process of choosing the best solution for fixing the ship.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 2; 359-366
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prediction of Secondary Dendrite Arm Spacing in Squeeze Casting Using Fuzzy Logic Based Approaches
Autorzy:
Patel, M. G. C.
Krishna, P.
Parappagoudar, M. B.
Powiązania:
https://bibliotekanauki.pl/articles/380567.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
squeeze casting process
secondary dendrite arm spacing
fuzzy logic
adaptive network based fuzzy
interface system
prasowanie stopu
odległość ramion dendrytów
logika rozmyta
system interfejsowy
Opis:
The quality of the squeeze castings is significantly affected by secondary dendrite arm spacing, which is influenced by squeeze cast input parameters. The relationships of secondary dendrite arm spacing with the input parameters, namely time delay, pressure duration, squeeze pressure, pouring and die temperatures are complex in nature. The present research work focuses on the development of input-output relationships using fuzzy logic approach. In fuzzy logic approach, squeeze cast process variables are expressed as a function of input parameters and secondary dendrite arm spacing is expressed as an output parameter. It is important to note that two fuzzy logic based approaches have been developed for the said problem. The first approach deals with the manually constructed mamdani based fuzzy system and the second approach deals with automatic evolution of the Takagi and Sugeno’s fuzzy system. It is important to note that the performance of the developed models is tested for both linear and non-linear type membership functions. In addition the developed models were compared with the ten test cases which are different from those of training data. The developed fuzzy systems eliminates the need of a number of trials in selection of most influential squeeze cast process parameters. This will reduce time and cost of trial experimentations. The results showed that, all the developed models can be effectively used for making prediction. Further, the present research work will help foundrymen to select parameters in squeeze casting to obtain the desired quality casting without much of time and resource consuming.
Źródło:
Archives of Foundry Engineering; 2015, 15, 1; 51-68
1897-3310
2299-2944
Pojawia się w:
Archives of Foundry Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of Speaker Voice Identification Using Main Tone Boundary Statistics for Applying To Robot-Verbal Systems
Autorzy:
Amirgaliyev, Yedilkhan
Musabayev, Timur
Yedilkhan, Didar
Wojcik, Waldemar
Amirgaliyeva, Zhazira
Powiązania:
https://bibliotekanauki.pl/articles/963938.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
speaker voice identification
voice interface (FXO)
human being
human-robot interaction
HRI
speech recognition
statistics of voice fundamental tone
computer-aided learning
neural network
Opis:
Hereby there is given the speaker identification basic system. There is discussed application and usage of the voice interfaces, in particular, speaker voice identification upon robot and human being communication. There is given description of the information system for speaker automatic identification according to the voice to apply to robotic-verbal systems. There is carried out review of algorithms and computer-aided learning libraries and selected the most appropriate, according to the necessary criteria, ALGLIB. There is conducted the research of identification model operation performance assessment at different set of the fundamental voice tone. As the criterion of accuracy there has been used the percentage of improperly classified cases of a speaker identification.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 583-588
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementation of a Web-based remote control system for qZS DAB application using low-cost ARM platform
Autorzy:
Korzeniewski, M.
Kulikowski, K.
Zakis, J.
Jasiński, M.
Malinowski, A.
Powiązania:
https://bibliotekanauki.pl/articles/201276.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ARM processor
DAB converter controller
network controller
web-based user interface
energy control
procesor ARM
kontroler
konwerter
kontroler sieciowy
interfejs użytkownika oparty na sieci Web
kontrola energii
DAB
Opis:
Continuous development of intelligent network applications drives the demand for deployment-ready hardware and software solutions. Such solutions are highly valued not only by distributed producers of energy but by energy consumers as well. The use of intelligent network applications enables the development and improvement of the quality of services. It also increases self-sufficiency and efficiency. This paper describes an example of such device that allows for the control of a dual active bridge (DAB) converter and enables its remote control in real time over an IP-based network. The details of both hardware and software components of proposed implementation are provided. The DAB converter gives a possibility to control and manage the energy between two DC power systems with very different voltage levels. Not only information, but also the quality of energy, the direction of power flow, and energy storage systems can be easily controlled through an IP-based network and power electronics converters. Information technology, together with intelligent control of power electronics technology, provides a flexible solution, especially for sustainable smart grids.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2016, 64, 4; 887-896
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nieinwazyjne metody oceny i poprawy bezpieczeństwa systemów komputerowych bazujące na standardach DISA
Non-intrusive assessment approach and improving security of computer systems based on DISA standards
Autorzy:
Kołodziejczyk, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/41204019.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
autentykacja
uwierzytelnianie
autoryzacja
aplikacja
baza danych
bezpieczeństwo
lista kontrolna
procedura manualna
GoldDisk
hasła
interfejs
konta użytkowników
Linux
logi
logowanie zdarzeń systemowych
Microsoft Windows
PKI
SRR
STIG
system operacyjny
Unix
wymagania
authentication
authorization
application
checklist
manual procedure
database
passwords
interface
logs
network services
operating system
requirements
security
system event logging
user accounts
Opis:
Artykuł jest próbą analizy dostępnych, nieinwazyjnych metod pozwalających na całościową analizę i ocenę bezpieczeństwa systemów komputerowych. Opisane metody nie ingerują bezpośrednio w działanie gotowych systemów, skupiając się w dużej mierze na statycznej analizie systemu. Analiza taka opiera się na stwierdzeniu zgodności systemu z poszczególnymi wymaganiami bezpieczeństwa, tworzonymi przez organizację DISA. Organizacja ta swoje wymagania przedstawia w trojaki sposób: tworząc statyczne wymagania tzw. STIG'i, manualne procedury, mające pomóc w analizie bezpieczeństwa oraz skrypty automatyczne dla części systemów (tzw. SRR). Przekrój systemów objętych wymaganiami jest ogromny, zaczynając od systemów operacyjnych, idąc przez systemy bazodanowe, sieci a skończywszy na tworzonych przez programistów aplikacjach. Artykuł zawiera również krótką analizę pewnych braków, niedogodności i wad wyżej wymienionych metod oraz jest próbą odpowiedzi w jakim kierunku powinien iść ich rozwój.
This article is an attempt to analyze the available, non-intrusive methods of analyzing and assessing if the overall security of computer systems. These methods do not interfere directly in the working systems, focusing largely on static analysis of the system. The analysis base on the finding of compliance with the various safety requirements, formed by the DISA organization. This organization presents its requirements in three ways: by creating the static requirements, so-called STIGs, manual procedures (checklists), helped in the analysis of the security and automated scripts for system components (SRR). The scope of the systems covered by the requirements is very big, including operating systems, database systems, the network and applications created by software developers. This article also contains a brief analysis of some shortcomings, disadvantages and drawbacks of the above-mentioned methods and is an attempt to answer for the question: what should be done in the nearest future for static security analysis.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2010, 2; 23-30
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-13 z 13

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies