Filters
total: 7774
filtered: 5951
-
Catalog
- Publications 5951 available results
- Journals 607 available results
- Conferences 406 available results
- Publishing Houses 1 available results
- People 377 available results
- Inventions 1 available results
- Projects 19 available results
- Research Teams 3 available results
- Research Equipment 1 available results
- e-Learning Courses 185 available results
- Events 18 available results
- Offers 1 available results
- Open Research Data 204 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INTERNET OF THINGS MOBILE COMPUTING COMPUTER NETWORKS DISTRIBUTED COMPUTING QUALITY OF SERVICE CLOUD COMPUTING
-
Highly Integrable Planar-structured Printed Circularly Polarized Antenna for Emerging Wideband Internet of Things Applications in the Millimeter-Wave Band
PublicationThis paper proposes a numerically and experimentally validated printed wideband antenna with a planar geometry for Internet of Things (IoT) applications. This design tackles the challenges associated with deploying IoT sensors in remote areas or across extensive geographical regions. The proposed design exploits a coplanar-waveguide-fed modified microstrip line monopole for excitation of circularly polarized waves radiating in...
-
Reduced-cost optimization-based miniaturization of microwave passives by multi-resolution EM simulations for internet of things and space-limited applications
PublicationStringent performance specifications along with constraints imposed on physical dimensions, make the design of contemporary microwave components a truly onerous task. In recent years, the latter demand has been growing in importance, with the innovative application areas such as Internet of Things coming into play. The need to employ full-wave electromagnetic (EM) simu-lations for response evaluation, reliable yet CPU heavy, only...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublicationThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublicationA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Quality of Resilience in IP-based Future Internet Communications
PublicationInternet Przyszłości (zwany również Internetem 3.0 czy też NGN) jest następnym krokiem ewolucji Internetu. Prace badawcze związane z nową architekturą obejmują szerokie spektrum zagadnień, a zwłaszcza: architekturę sieci (protokoły), technologie sieciowe, aplikacje, itd. W tym artykule zakładamy wykorzystanie koncepcji Differentiated Services (DiffServ). W szczególności, proponujemy podejście ochrony zróżnicowanej ruchu. Jest ono...
-
Asynchronous time difference of arrival (ATDOA) method
PublicationA new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublicationWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
TensorHive: Management of Exclusive GPU Access for Distributed Machine Learning Workloads
PublicationTensorHive is a tool for organizing work of research and engineering teams that use servers with GPUs for machine learning workloads. In a comprehensive web interface, it supports reservation of GPUs for exclusive usage, hardware monitoring, as well as configuring, executing and queuing distributed computational jobs. Focusing on easy installation and simple configuration, the tool automatically detects the available computing...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
The methods of design reliable distributed networks
PublicationOpisano dwie metody projektowania niezawodnych sieci rozległych. W pierwszej metodzie przyjęto, że koszt konstrukcji każdego połączenia jest jednakowy, w drugiej koszty opisuje zadana macierz kosztów. Jako parametr niezawodnościowy przyjęto liczbę niezależnych dróg pomiędzy węzłami sieci. Pierwsza z metod jest metodą dokładną, druga heurystyczną. Zdefiniowano i oceniono błąd metody heurystycznej. Opublikowano wyniki otrzymane...
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
Industrial computer networks and functional safety
PublicationW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
Applications of Tensor Analysis in Continuum Mechanics
PublicationA tensor field is a tensor-valued function of position in space. The use of tensor fields allows us to present physical laws in a clear, compact form. A byproduct is a set of simple and clear rules for the representation of vector differential operators such as gradient, divergence, and Laplacian in curvilinear coordinate systems. The tensorial nature of a quantity permits us to formulate transformation rules for its components...
-
On weak solutions of boundary value problems within the surface elasticity of Nth order
PublicationA study of existence and uniqueness of weak solutions to boundary value problems describing an elastic body with weakly nonlocal surface elasticity is presented. The chosen model incorporates the surface strain energy as a quadratic function of the surface strain tensor and the surface deformation gradients up to Nth order. The virtual work principle, extended for higher‐order strain gradient media, serves as a basis for defining...
-
Distributed MIND - A New Processing Model Based on Mobile Interactive Documents
PublicationObliczenia w trybie zespołowym pozwalają na integrację działań ludzi i agentów systemowych w otwartym środowisku rozproszonym w celu rozwiązywania problemów formułowanych dynamicznie w trakcie pracy systemu. Problemy te najczęściej nie mają charakteru algorytmicznego, tzn. generowane rozwiązania nie mogłyby zostać wyliczone w skończonej liczbie kroków na podstawie danych charakteryzujących uczestników obliczeń. Autorzy proponują...
-
Advances in Architectures, Big Data, and Machine Learning Techniques for Complex Internet of Things Systems
PublicationTe feld of Big Data is rapidly developing with a lot of ongoing research, which will likely continue to expand in the future. A crucial part of this is Knowledge Discovery from Data (KDD), also known as the Knowledge Discovery Process (KDP). Tis process is a very complex procedure, and for that reason it is essential to divide it into several steps (Figure 1). Some authors use fve steps to describe this procedure, whereas others...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Multi-Aspect Quality Assessment Of Mobile Image Classifiers For Companion Applications In The Publishing Sector
PublicationThe paper presents the problem of quality assessment of image classifiers used in mobile phones for complimentary companion applications. The advantages of using this kind of applications have been described and a Narrator on Demand (NoD) functionality has been described as one of the examples, where the application plays an audio file related to a book page that is physically in front of the phone's camera. For such a NoD application,...
-
Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children
PublicationThis paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublicationMultimodal interfaces development history is reviewed briefly in the introduction. Some applications of multimodal interfaces to education software for disabled people are presented. One of them, the LipMouse is a novel, vision-based human-computer interface that tracks user’s lip movements and detect lips gestures. A new approach to diagnosing Parkinson’s disease is also shown. The progression of the disease can be measured employing...
-
Three levels of fail-safe mode in MPI I/O NVRAM distributed cache
PublicationThe paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...
-
Structural and Temporal Topic Models of Feedbacks on Service Quality – A Path to Theory Development?
PublicationThere is growing interest in applying computational methods in analysing large amount of data without sacrificing rigour in Information Systems research. In this paper, we demonstrate how the use of structural and temporal topic modelling can be employed to produce insights of both theoretical and practical importance from the analysis of textual comments on the quality of services in hospitals. As a first step, we revealed the...
-
Video Cloud Services for Hospitals: Designing an End-to-End Cloud Service Platform for Medical Video Storage and Secure Access
Publication -
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
REAL-TIME VOICE QUALITY MONITORING TOOL FOR VOIP OVER IPV6 NETWORKS
PublicationThe primary aim of this paper is to present a new application which is at this moment the only open source real-time VoIP quality monitoring tool that supports IPv6 networks. The application can keep VoIP system administrators provided at any time with up-to-date voice quality information. Multiple quality scores that are automatically obtained throughout each call reflect influence of variable packet losses and delays on voice...
-
Model of distributed learning objects repository for a heterogenic internet environment
PublicationW artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...
-
Centralized and Distributed Structures of Intelligent Systems for Aided Design of Ship Automation
PublicationA design process and accepted solutions made during this process, often base on non-formalized knowledge, obtained from designer (expert) intuition and practice. There are no formalized rules assuring the correctness of design solutions. The analysis of design process of ship automation, including ship power system, shows that this process can be supported by application of the artificial intelligence elements. The article presents...
-
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
PublicationIn this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...
-
medVC — A remote collaboration solution enhanced with cloud services and future internet capacities
Publication -
Computer Supported Analysis of the Human Body Surface Area
PublicationRecent scientific studies show the growing importance of the coefficients: BSA and TBSA, as an alternative to the widely used BMI. The relevant indicators are widely used in medicine, including such areas as: the treatment of burns, chemotherapy, dermatology and toxicology; as benchmarks when calculating doses of drugs and fluids. The particular problems concerning this subject are: the change of the reference parameter value which...
-
Smartphones as tools for equitable food quality assessment
PublicationBackground: The ubiquity of smartphones equipped with an array of sophisticated sensors, ample processing power, network connectivity and a convenient interface makes them a promising tool for non-invasive, portable food quality assessment. Combined with the recent developments in the areas of IoT, deep learning algorithms and cloud computing, they present an opportunity for advancing wide-spread, equitable and sustainable food...
-
Service and service decomposition model - theoretical foundation of it service management
PublicationThe publication contains different definitions of Service - one of the fundamental IT Service Management term. It describes types of Service attributes nad introduces so-called ''distinguish functions'' in order to propose different categories of Services. It proposes both general model of Service decomposition and practical model based on CMDB implementation limitations. In summarizes obtained results and gives some remarks about...
-
Evaluation of IEEE 802.11E extensions for quality of service
PublicationZaprezentowano założenia wersji "e" standardu 802.11, wspierającej obsługę zróżnicowanych, pod względem potrzeb QoS, strumień ruchu. Przeprowadzono różnorodne badania symulacyjne dla opcji EDCF oraz HCF tego standardu. Wskazano na mankamenty oraz zalety nowych rozwiązań.
-
Human-Computer Interface Based on Visual Lip Movement and Gesture Recognition
PublicationThe multimodal human-computer interface (HCI) called LipMouse is presented, allowing a user to work on a computer using movements and gestures made with his/her mouth only. Algorithms for lip movement tracking and lip gesture recognition are presented in details. User face images are captured with a standard webcam. Face detection is based on a cascade of boosted classifiers using Haar-like features. A mouth region is located in...
-
A Solution to Image Processing with Parallel MPI I/O and Distributed NVRAM Cache
PublicationThe paper presents a new approach to parallel image processing using byte addressable, non-volatile memory (NVRAM). We show that our custom built MPI I/O implementation of selected functions that use a distributed cache that incorporates NVRAMs located in cluster nodes can be used for efficient processing of large images. We demonstrate performance benefits of such a solution compared to a traditional implementation without NVRAM...
-
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix
PublicationIn this paper we build on our previously proposed MPI I/O NVRAM distributed cache for high performance computing. In each cluster node it incorporates NVRAMs which are used as an intermediate cache layer between an application and a file for fast read/write operations supported through wrappers of MPI I/O functions. In this paper we propose optimizations of the solution including handling of write requests with a synchronous mode,...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublicationApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Radio Link Measurement Methodology for Location Service Applications
PublicationThe aim of this paper is the methodology of measurements executed in a radio link for the realization of radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the universal mobile telecommunications system (UMTS) are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation...
-
Approximate Quality Criteria for Difficult Multi-Objective Optimization Problems
PublicationThis paper introduces approximate analytic quality criteria useful in assessing the efficiency of evolutionary multi-objective optimization (EMO) procedures. We present a summary of extensive research into computing. In the performed comparative study we take into account the various approaches of the state-of-the-art, in order to objectively assess the EMO performance in highly dimensional spaces; where some executive criteria,...
-
Approximate Quality Criteria for Difficult Multi-Objective Optimization Problems
PublicationThis paper introduces approximate analytic quality criteria useful in assessing the efficiency of evolutionary multi-objective optimization (EMO) procedures. We present a summary of extensive research into computing. In the performed comparative study we take into account the various approaches of the state-of-the-art, in order to objectively assess the EMO performance in highly dimensional spaces; where some executive criteria,...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
PublicationThe paper presents an evaluation of all-reduce collective MPI algorithms for an environment based on a geographically-distributed compute cluster. The testbed was split into two sites: CI TASK in Gdansk University of Technology and ICM in University of Warsaw, located about 300 km from each other, both connected by a fast optical fiber Ethernet-based 100 Gbps network (900 km part of the PIONIER backbone). Each site hosted a set...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Algorithms of fast service restoration in survivable multilayer networks
PublicationGłównym celem rozprawy jest zaproponowanie nowych modeli/algorytmów doboru tras zapewniających przeżywalność usług w sieciach IP-MPLS/WDM poprzez zastosowanie wyznaczonych zawczasu ścieżek zabezpieczających. Zakres pracy obejmuje: dokonanie przeglądu mechanizmów transmisji informacji w warstwowych sieciach teleinformatycznych IP-MPLS/WDM; szczegółowy opis sposobów zapewniania przeżywalności usług; zaproponowanie nowych metod doboru...
-
Service restoration in survivable networks under malicious attacks
PublicationW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...