Filters
total: 1351
filtered: 1125
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: networks
-
Benchmarking Deep Neural Network Training Using Multi- and Many-Core Processors
PublicationIn the paper we provide thorough benchmarking of deep neural network (DNN) training on modern multi- and many-core Intel processors in order to assess performance differences for various deep learning as well as parallel computing parameters. We present performance of DNN training for Alexnet, Googlenet, Googlenet_v2 as well as Resnet_50 for various engines used by the deep learning framework, for various batch sizes. Furthermore,...
-
ZAPEWNIENIE SYNCHORNIZACJI CZASU PRZY CZĘŚCIOWYM WSPARCIU SIECI
PublicationCelem badań zaprezentowanych w artykule było sprawdzenie czy możliwe jest zapewnienie dużej dokładności synchronizacji czasu przy częściowym wsparciu sieci w oparciu o model HRM-1 składający się z 12 szeregowo podłączonych urządzeń sieciowych wraz z wygenerowanym ruchem sieciowym. Badania wykazały, że dla obecnie stosowanych technologii mobilnych takich jak LTE TDD możliwe jest zapewnienie odpowiedniej jakości synchronizacji czasu....
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
Low-Cost 3-D Printed Lens Antenna for Ka-Band Connectivity Applications
PublicationThis paper discusses the use of low-cost 3-D printing technology to fabricate dielectric lenses for Ka-band wireless networks. A low-cost FDM alternative to previously presented 3-D printed lens in SLA technology with high performance resin is presented. The presented approach has been demonstrated for a 39 GHz MU-MIMO antenna array modified to realize multibeam or switched-beam antenna that can support demanding energy-efficient...
-
Design and implementation of GEPON architecture in laboratory testbed
PublicationThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
Selfie and Personal Branding Phenomena in the Context of the Network Economy. A Literature Review
PublicationSelf-taken pictures called “selfies” shared in social media have become a worldwide phenomenon. This is due to the increased need of human being to share to other people their daily lives and to build their own personal brand in the networked world. Despite that, the subject of personal branding has not been sufficiently discussed in academic marketing literature over the past decade. The objective of the study is to present the...
-
Different Ways to Apply a Measurement Instrument of E-Nose Type to Evaluate Ambient Air Quality with Respect to Odour Nuisance in a Vicinity of Municipal Processing Plants
PublicationThis review paper presents different ways to apply a measurement instrument of e-nose type to evaluate ambient air with respect to detection of the odorants characterized by unpleasant odour in a vicinity of municipal processing plants. An emphasis was put on the following applications of the electronic nose instruments: monitoring networks, remote controlled robots and drones as well as portable devices. Moreover, this paper presents...
-
Operation, Administration, Maintenance in Carrier Grade Ethernet
PublicationOAM (Operation, Administration and Maintenance) plays a crucial role in carrier networks. OAM functionality ensures that network operators and service providers can maintain the quality of the services they offer. One of its major tasks is the detection of anomalies in the network before they become a problem. This enables network operators and service providers to deliver services that come up to a predetermined level of quality...
-
Low Cost Method for Location Service in the WCDMA System
PublicationA new and low cost method for a location service (LCS) in the Wideband Code Division Multiple Access (WCDMA) system is outlined. This method, which is called TDOA + RTT, enables calculation of the geographical position of a mobile station (MS) without knowledge of relative time differences (RTDs) between base stations (BSs). The TDOA+RTT method is based on the measurement of round trip times (RTTs) between the MS and the serving...
-
Influence of a Radio Frequency on RF Fingerprinting Accuracy Based on Ray Tracing Simulation
PublicationIn this paper the influence of a radio signal frequency on performance of Indoor Positioning System based on fingerprinting has been examined using ray-tracing simulations. It has been simulated how spatial distribution of an RF signal strength change with the signal’s frequency. The results were used to show its’ impact on the behavior of localization algorithms that are employing RSS measurements to determine node’s position...
-
Vision-based parking lot occupancy evaluation system using 2D separable discrete wavelet transform
PublicationA simple system for rough estimation of the occupancy of an ad-hoc organized parking lot is presented. A reasonably simple microprocessor hardware with a low resolution monochrome video camera observing the parking lot from the location high above the parking surface is capable of running the proposed 2-D separable discrete wavelet transform (DWT)-based algorithm, reporting the percentage of the observed parking area occupied by...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Velocity measurement using the fdoa method in ground-based radio navigation system
PublicationVelocity is one of the main navigation parameters of the moving objects. However some systems of position estimation using radio wave measurements cannot provide velocity data due to limitation of their performance. In this paper a velocity measurement method for DS-CDMA radio navigation system is proposed, which doesn’t require full synchronization of reference stations carrier frequencies. The article presents basics of FDOA...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublicationThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublicationThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Fractional Calculus Evaluation of Hyaluronic Acid Crosslinking in a Nanoscopic Part of Articular Cartilage Model System
PublicationThis work presents a study of the mechanism of physical crosslinking of hyaluronic acid in the presence of common phospholipids in synovial joint organ systems. Molecular dynamic simulations have been executed to understand the formation of hyaluronan networks at various phospholipid concentrations. The results of the simulations suggest that the mechanisms exhibit subdiffusion characteristics. Transportation quantities derive...
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublicationThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublicationVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Advanced sensitivity analysis of the impact of the temporal distribution and intensity of rainfall on hydrograph parameters in urban catchments
PublicationKnowledge of the variability of the hydrograph of outflow from urban catchments is highly important for measurements and evaluation of the operation of sewer networks. Currently, hydrodynamic models are most frequently used for hydrograph modeling. Since a large number of their parameters have to be identified, there may be problems at the calibration stage. Hence, sensitivity analysis is used to limit the number of parameters....
-
Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models
PublicationDeep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...
-
Inteligentne systemy agentowe w systemach zdalnego nauczania
PublicationW pracy omówiono inteligentne systemy agentowe w systemach zdalnego nauczania. Po krótkim przedstawieniu ewolucji systemów zdalnego nauczania i ich wybranych zastosowań, scharakteryzowano inteligentne agenty edukacyjne. Omówiono wykorzystanie programowania genetycznego oraz algorytmów neuro-ewolucyjnych do implementacji oprogramowania tej klasy. Ponadto, nawiązano do modelu Map-Reduce, który efektywnie wspiera architekturę nowoczesnego...
-
Działalność w obszarze grantów realizowana przez Katedrę Sieci Teleinformacyjnych
PublicationPrzedstawiono działalność Katedry Sieci Teleinformacyjnych PG WETI w obszarze grantów finansowanych przez instytucje centralne, przy czym główny nacisk położono na scharakteryzowanie aktualnie realizowanych projektów. Opisano dwa projekty finansowane przez NCBiR. Pierwszy dotyczy koncepcji oraz implementacji integracji informacji w rozproszonych elementach systemu wymiany danych Straży Granicznej, natomiast drugi strumieniowej...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublicationOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Projektowanie i eksploatacja dróg szynowych z wykorzystaniem mobilnych pomiarów satelitarnych
PublicationNiniejsza monografia zawiera szczegółowy opis aktywnych sieci geodezyjnych GNSS oraz modelowania dokładności określania pozycji w pomiarach satelitarnych. Omówiono również opracowaną technikę mobilnych pomiarów satelitarnych toru kolejowego oraz aplikacje związane z jej zastosowaniem w projektowaniu i eksploatacji dróg szynowych. Autorzy zawarli w pracy wyniki swoich badań, wykonywanych na przestrzeni lat 2009–2015. Badania przeprowadzono...
-
Jakość usług w optycznej sieci wielodomenowej z hierarchiczną strukturą płaszczyzn sterowania
PublicationW rozprawie przedstawiono przegląd architektur sieci z gwarancją jakości klas usług oraz stan prac w zakresie realizacji optycznych sieci ASON, GMPLS oraz ASON/GMPLS. Opisano wymagania i zaawansowanie prac w realizacji sieci ASON/GMPLS z hierarchiczną strukturą płaszczyzn sterowania oraz problemy związane z zagadnieniem jakości klas usług w tej sieci. Zaprezentowano założenia, koncepcję oraz realizację modelu symulacyjnego optycznej...
-
OBTAINING FLUID FLOW PATTERN FOR TURBINE STAGE WITH NEURAL MODEL.
PublicationIn the paper possibility of applying neural model to obtaining patterns of proper operation for fluid flow in turbine stage for fluid-flow diagnostics is discussed. Main differences between Computational Fluid Dynamics (CFD) solvers and neural model is given, also limitations and advantages of both are considered. Time of calculations of both methods was given, also possibilities of shortening that time with preserving the accuracy...
-
Interpretable Deep Learning Model for the Detection and Reconstruction of Dysarthric Speech
PublicationWe present a novel deep learning model for the detection and reconstruction of dysarthric speech. We train the model with a multi-task learning technique to jointly solve dysarthria detection and speech reconstruction tasks. The model key feature is a low-dimensional latent space that is meant to encode the properties of dysarthric speech. It is commonly believed that neural networks are black boxes that solve problems but do not...
-
Influence of User Mobility on System Loss and Depolarization in a BAN Indoor Scenario
PublicationIn this article, an analysis of system loss and depolarization in body area networks (BANs) for body-toinfrastructure (B2I) communications based on a measurement campaign in the 5.8 GHz band in an indoor environment is performed. Measurements were performed with an off-body antenna transmitting linearly polarized signals and dual-polarized receiving antennas carried by the user on the body. A normal distribution with a mean of...
-
Application Of Generative Adversarial Network for Data Augmentation and Multiplication to Automated Cell Segmentation of the Corneal Endothelium
PublicationConsidering the automatic segmentation of the endothelial layer, the available data of the corneal endothelium is still limited to a few datasets, typically containing an average of only about 30 images. To fill this gap, this paper introduces the use of Generative Adversarial Networks (GANs) to augment and multiply data. By using the ``Alizarine'' dataset, we train a model to generate a new synthetic dataset with over 513k images....
-
Comparison of Deep Neural Network Learning Algorithms for Mars Terrain Image Segmentation
PublicationThis paper is dedicated to the topic of terrain recognition on Mars using advanced techniques based on the convolutional neural networks (CNN). The work on the project was conducted based on the set of 18K images collected by the Curiosity, Opportunity and Spirit rovers. The data were later processed by the model operating in a Python environment, utilizing Keras and Tensorflow repositories. The model benefits from the pretrained...
-
Disciplines and measures of information resilience
PublicationCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Evolution of artificial single-cell organisms foraging for resources in a 3-dimensional environment
PublicationForaging for resources is a simple cognitive task that even one-celled biological organisms can ac- complish. We present an Artificial Life system in which artificial unicellular organisms (animats) forage for food in a 3-dimensional simulated liquid environment. The movement of animats is controlled by evolving artificial gene regulatory networks encoded in linear genomes. When an animat consumes enough food, it produces offspring...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublicationProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Analysing and processing of geotagged social media
PublicationThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Fading Modelling in Dynamic Off-Body Channels
PublicationThis paper presents an off-body fading channel model for Body Area Networks. The proposed model, based on both simulations and measurements at 2.45 GHz in a realistic indoor environment, consists of three components: mean path loss, body shadowing, and multipath fading. The first is modelled as a log function of distance, the path loss exponent being in between 0.4 and 1.6. A statistical perspective is taken for the other two components,...
-
Current air quality analytics and monitoring: A review
PublicationThis review summarizes the different tools and concepts that are commonly applied in air quality monitoring. The monitoring of atmosphere is extremely important as the air quality is an important problem for large communities. Main requirements for analytical devices used for monitoring include a long period of autonomic operation and portability. These instruments, however, are often characterized by poor analytical performance....
-
Energy recovery effectiveness in trolleybus transport
PublicationNowadays the issue of electric energy saving in public transport is becoming a key area of interest whichis connected both with a growth in environmental awareness of the society and an increase in the pricesof fuel and electricity. One of the possibilities to reduce energy consumption in urban public transport isto increase the extent of regenerative braking energy utilization. This can be achieved by its accumulationin the supercapacitors...
-
Applying Decisional DNA to Internet of Things: The Concept and Initial Case Study
PublicationIn this article, we present a novel approach utilizing Decisional DNA to help the Internet of Things capture decisional events and reuse them for decision making in future operations. The Decisional DNA is a domain-independent, standard and flexible knowledge representation structure that allows its domains to acquire, store, and share experiential knowledge and formal decision events in an explicit way. We apply this approach...
-
Experimental Testbed of ASON/GMPLS architecture
PublicationThe paper presents the ASON/GMPLS architecture realized in the Department of Teleinformation Networks at Gdansk University of Technology based on the FSP 3000R7 ADVA Optical Networking platform. The FSP 3000R7 is a high-performance WDM networking system with GMPLS control plane for bidirectional transmission of optical signals. The system uses a modular structure which enables a flexible upgrade of capacity and functionality. The...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Risk Diagnosis and Management with BBN for Civil Engineering Projects during Construction and Operation
PublicationThe authors demonstrate how expert knowledge about the construction and operation phases combined with monitoring data can be utilized for the diagnosis and management of risks typical to large civil engineering projects. The methodology chosen for estimating the probabilities of risk elements is known as Bayesian Belief Networks (BBN). Using a BBN model one can keep on updating the risk event probabilities as the new evidence...
-
Residual MobileNets
PublicationAs modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...
-
Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles
PublicationAs the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Directions and Prospects for the Development of the Electric Car Market in Selected ASEAN Countries
PublicationThe purpose of this article is to present the current situation and evaluate the opportuni‐ ties for the development of the electric car market in selected Southeast Asian countries in the con‐ text of the current situation in the rest of the world. Currently, the electric car market is at an ad‐ vanced stage of development in regions such as Western Europe, the USA, and China. It should be noted, however, that the number of electric...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Dynamic Signal Strength Mapping and Analysis by Means of Mobile Geographic Information System
PublicationBluetooth beacons are becoming increasingly popular for various applications such as marketing or indoor navigation. However, designing a proper beacon installation requires knowledge of the possible sources of interference in the target environment. While theoretically beacon signal strength should decay linearly with log distance, on-site measurements usually reveal that noise from objects such as Wi-Fi networks operating in...