Filters
total: 556
filtered: 474
Search results for: MOBILE NETWORK
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublicationIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublicationWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
ZAPEWNIENIE SYNCHORNIZACJI CZASU PRZY CZĘŚCIOWYM WSPARCIU SIECI
PublicationCelem badań zaprezentowanych w artykule było sprawdzenie czy możliwe jest zapewnienie dużej dokładności synchronizacji czasu przy częściowym wsparciu sieci w oparciu o model HRM-1 składający się z 12 szeregowo podłączonych urządzeń sieciowych wraz z wygenerowanym ruchem sieciowym. Badania wykazały, że dla obecnie stosowanych technologii mobilnych takich jak LTE TDD możliwe jest zapewnienie odpowiedniej jakości synchronizacji czasu....
-
Overview of cooperative communication methods
PublicationThe paper presents issues related to the cooperative communication in wireless networks. Cooperative com-munication involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. It is also possible to use several different data transmission standards. The paper presents the methods used to implement cooperative communication. The types of cooperative...
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublicationThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
A Survey of Vehicular Network Systems for Road Traffic Management
PublicationIn this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublicationWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Throughput-Coverage Characteristics for Soft and Partial Frequency Reuse in the LTE Downlink
PublicationThe paper presents results of simulation and evaluation of throughput-coverage characteristics for the OFDMA-based LTE network with Soft Frequency Reuse or Partial Frequency Reuse. Firstly, simulation results of throughput characteristics for a single user connection are presented, which allow the evaluation of the stability and availability of bit rate achieved in different areas of a cell. Secondly, the capacity characteristics...
-
Technological substitution in Asia
PublicationThis book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublicationFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publication. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublicationWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle
PublicationIn the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...
-
The searchlight problem for road networks
PublicationWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublicationThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
Augmenting digital documents with negotiation capability
PublicationActive digital documents are not only capable of performing various operations using their internal functionality and external services, accessible in the environment in which they operate, but can also migrate on their own over a network of mobile devices that provide dynamically changing execution contexts. They may imply conflicts between preferences of the active document and the device the former wishes to execute on. In the...
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublicationMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Realizacja przełączeń terminali ruchomych przez elementy infrastruktury systemu mobilności
PublicationW artykule przedstawione zostało rozwiązanie pozwalające zrealizować mobilność terminali, które nie posiadają zaimplementowanych zaawansowanych mechanizmów dedykowanych dla tej usługi. Opisano protokół Proxy Mobile IPv6 jako rozwiązanie wpisujące się w model network-based localized mobility management, w której to elementy infrastruktury systemu odpowiadają za zachowanie ciągłości połączenia w trakcie przełączania. Zaprezentowane...
-
Obsługa przełączeń terminali ruchomych niewspierających mobilności
PublicationArtykuł omawia koncepcję network-based mobility management umożliwiającą obsługę terminali ruchomych niewspierających protokołów mobilności. Praca koncentruje się na protokole Proxy Mobile IPv6 (PMIPv6) który zapewnienia ciągłą osiągalność terminala ruchomego, pomimo zmiany punktu przyłączenia terminala do sieci. W dalszej części artykuł przybliża wysiłki autorów poczynione w celu uruchomienia środowiska do testowania efektywności...
-
Pose classification in the gesture recognition using the linear optical sensor
PublicationGesture sensors for mobile devices, which have a capability of distinguishing hand poses, require efficient and accurate classifiers in order to recognize gestures based on the sequences of primitives. Two methods of poses recognition for the optical linear sensor were proposed and validated. The Gaussian distribution fitting and Artificial Neural Network based methods represent two kinds of classification approaches. Three types...
-
Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective
PublicationCurrently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...
-
Intelligent Autonomous Robot Supporting Small Pets in Domestic Environment
PublicationIn this contribution, we present preliminary results of the student project aimed at the development of an intelligent autonomous robot supporting small pets in a domestic environment. The main task of this robot is to protect a freely moving small pets against accidental stepping on them by home residents. For this purpose, we have developed the mobile robot which follows a pet and makes an alarm signal when a human is approaching....
-
Stanowisko wizualizacji zdarzeń w systemie STRADAR – realizacja i funkcje dla operatora
PublicationIt is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The system, with the use of a network of sensors located in both stationary and mobile...
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublicationIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
Resilience of 5G Mobile Communication Systems to Massive Disruptions
PublicationThis chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the remaining part of the network and (c) multi-operator protection to address the resilience...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
5G Millimeter Wave Network Optimization: Dual Connectivity and Power Allocation Strategy
PublicationThe fifth generation (5G) of mobile networks utilizing millimeter Wave (mmWave) bands can be considered the leading player in meeting the continuously increasing hunger of the end user demands in the near future. However, 5G networks are characterized by high power consumption, which poses a significant challenge to the efficient management of base stations (BSs) and user association. Implementing new power consumption and user...
-
Gesture Recognition With the Linear Optical Sensor and Recurrent Neural Networks
PublicationIn this paper, the optical linear sensor, a representative of low-resolution sensors, was investigated in the multiclass recognition of near-field hand gestures. The recurrent neural network (RNN) with a gated recurrent unit (GRU) memory cell was utilized as a gestures classifier. A set of 27 gestures was collected from a group of volunteers. The 27 000 sequences obtained were divided into training, validation, and test subsets....
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublicationFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
THE ROLE OF INFERENCE IN MOBILE MEDICAL APPLICATION DESIGN
PublicationIn the early 21st century, artificial intelligence began to be used to process medical information. However, before this happened, predictive models used in healthcare could only consider a limited number of variables, and only in properly structured and organised medical data. Today, advanced tools based on machine learning techniques - which, using artificial neural networks, can explore extremely complex relationships - and...
-
Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces
PublicationFourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analytical work shows that it has numerous technological gaps that prevent its direct implementation in military communications systems. However, the recent armed world conflicts showed that...
-
Projekt badawczy BRIK: Opracowanie innowacyjnej metody wyznaczania precyzyjnej trajektorii pojazdu szynowego
PublicationW artykule przedstawiono podstawowe informacje dotyczące projektu badawczego realizowanego na zlecenie Narodowego Centrum Badań i Rozwoju oraz Spółki PKP Polskie Linie Kolejowe S. A. przez Konsorcjum Politechniki Gdańskiej i Uniwersytetu Morskiego w Gdyni. Projekt obejmuje wykorzystanie nowoczesnych metod pomiarowych, takich jak techniki pozycjonowania satelitarnego GNSS, pomiary inercyjne INS oraz skaning laserowy LS, w procesie...
-
A Method of MOS Evaluation for Video Based Services
PublicationThis paper deals with a method for QoE evaluation for the services transmitting large amount of data perceived by the end user in relatively short time periods, e.g. streaming video in mobile operator...
-
Design and Evaluation of the Compact and Autonomous Energy Subsystem of a Wave Energy Converter
PublicationThis paper presents the results of the design process focused on the development of the energy subsystem (ES) of a wave energy converter (WEC). The ES is an important electrical part that significantly affects the energy reliability and energy efficiency of the entire WEC device. The designed ES was intended for compact WECs powering IoT network devices working in the distributed grid. The developed ES is an electronic circuit...
-
A Low-Cost System for Far-Field Non-Anechoic Measurements of Antenna Performance Figures
PublicationPrototype measurements are the key step in the development of antenna structures. Typically, their far-field characteristics are validated in expensive, dedicated facilities such as open range sites, or anechoic chambers. Despite being necessary for obtaining high-precision data (e.g., for device qualification), the use of costly infrastructure might not be fully justified when the main goal of measurements includes demonstration...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublicationThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
PublicationIn its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublicationIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
Automated Parameter Determination for Horizontal Curves for the Purposes of Road Safety Models with the Use of the Global Positioning System
PublicationThis paper presents the results of research conducted to develop an automated system capable of determining parameters for horizontal curves. The system presented in this article could calculate the actual course of a road by means of a two-stage positioning of recorded points along the road. In the first stage, measurements were taken with a Real-Time Network (RTN) receiver installed in a research vehicle. In the second stage,...
-
Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks
PublicationRendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...
-
Projektowanie i eksploatacja dróg szynowych z wykorzystaniem mobilnych pomiarów satelitarnych
PublicationNiniejsza monografia zawiera szczegółowy opis aktywnych sieci geodezyjnych GNSS oraz modelowania dokładności określania pozycji w pomiarach satelitarnych. Omówiono również opracowaną technikę mobilnych pomiarów satelitarnych toru kolejowego oraz aplikacje związane z jej zastosowaniem w projektowaniu i eksploatacji dróg szynowych. Autorzy zawarli w pracy wyniki swoich badań, wykonywanych na przestrzeni lat 2009–2015. Badania przeprowadzono...
-
Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud Computing
PublicationNumber of mobile devices and applications is growing rapidly in recent years. Capabilities and performance of these devices can be tremendously extended with the integration of cloud computing. However, multiple challenges regarding implementation of these type of mobile applications are known, like differences in architecture, optimization and operating system support. This paper summarizes issues with mobile cloud computing and...