Filters
total: 11738
filtered: 6398
-
Catalog
- Publications 6398 available results
- Journals 756 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 292 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 273 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3520 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Evolving neural network as a decision support system — Controller for a game of “2048” case study
PublicationThe paper proposes an approach to designing the neuro-genetic self-learning decision support system. The system is based on neural networks being adaptively learned by evolutionary mechanism, forming an evolved neural network. Presented learning algorithm enables for a selection of the neural network structure by establishing or removing of connections between the neurons, and then for a finding the beast suited values of the network...
-
Router Selfishness in Community Wireless Mesh Networks: Cross-Layer Benefits and Harms
PublicationWęzły sieci mesh nie są poddane administracyjnej kontroli, zarazem nie odczuwają ograniczeń energetycznych. Są przez to skłonne do zachowań egoistycznych w warstwach 2 i 3 OSI, w szczególności w odniesieniu do protokołów MAC i routingowych. W pracy przebadano symulacyjnie wybrane aspekty środowiska mesh uzasadniające podjęcie ataków egoistycznych i zidentyfikowano trzy: gęstość rozmieszczenia i położenie routerów oraz warstwa OSI...
-
Packet routing and frame length optimization in wireless mesh networks with multicast communications
Publication -
Traffic Type Influence on Performance of OSPF QoS Routing
PublicationFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed ON-OFF model was used for self-similar traffic generation. Comparison of simulation results were presented using both relative and...
-
Modelling of wastewater treatment plant for monitoring and control purposes by state - space wavelet networks
PublicationMost of industrial processes are nonlinear, not stationary, and dynamical with at least few different time scales in their internal dynamics and hardly measured states. A biological wastewater treatment plant falls into this category. The paper considers modelling such processes for monitorning and control purposes by using State - Space Wavelet Neural Networks (SSWN). The modelling method is illustrated based on bioreactors of...
-
Current mechanisms of IGP routing - expectations and possibilities in terms of QoS constraints
PublicationOd mechanizmów rutingu oczekuje się nowych możliwości z chwilą wprowadzenia wymagań QoS. W tym kontekście aktualne techniki rutingu IGP nie oferuja rozwiązań określających ścieżki gwarantujące QoS. W pracy przedstawiono propozycję rozszerzenia OSPF, które umożliwia uwzględnienie ograniczeń wynikających z QoS, gwarantując jednocześnie usługi na żądanym poziomie. To rozszerzenie zawiera zarówno liniowe jak i nieliniowe metryki. Wartości...
-
Concept description vectors and the 20 question game
PublicationKnowledge of properties that are applicable to a given object is a necessary prerequisite to formulate intelligent question. Concept description vectors provide simplest representation of this knowledge, storing for each object information about the values of its properties. Experiments with automatic creation of concept description vectors from various sources, including ontologies, dictionaries, encyclopedias and unstructured...
-
Advanced Bayesian study on inland navigational risk of remotely controlled autonomous ship
PublicationThe arise of autonomous ships has necessitated the development of new risk assessment techniques and methods. This study proposes a new framework for navigational risk assessment of remotely controlled Maritime Autonomous Surface Ships (MASS). This framework establishes a set of risk influencing factors affecting safety of navigation of a remotely-controlled MASS. Next, model parameters are defined based on the risk factors, and...
-
Traffic Type Influence on Performance of OSPF QoS Routing
PublicationFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed On-Off model was used for self-similar traffic generation. Comparison of simulation results was presented using both relative and non-relative...
-
The Latest Advances in Wireless Communication in Aviation, Wind Turbines and Bridges
PublicationPresent-day technologies used in SHM (Structural Health Monitoring) systems in many implementations are based on wireless sensor networks (WSN). In the context of the continuous development of these systems, the costs of the elements that form the monitoring system are decreasing. In this situation, the challenge is to select the optimal number of sensors and the network architecture, depending on the wireless system’s other parameters...
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublicationSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Quality assessment of mobile host services in IP networks
PublicationW pracy opisano podstawowe protokoły wspierające komunikację stacji ruchomych w sieciach IP. Przedmiotem zainteresowania były w szczególności rozwiązania MIP oraz Calkular IP i HAWAII - wspierające mobilność w skali makro bądź mikro. Przeprowadzono badania symulacyjne wskazujące na przydatność powyższych protokołów w przypadku różnych konfiguracji sieci.
-
Digital Public Service Innovation: Framework Proposal
PublicationThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
The reliability of tree and star networks
PublicationThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
External Security Strategies of Belarus
PublicationUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Przeglad metod skanowania w bezprzewodowych sieciach likalnych standardu IEEE 802.11
PublicationProcedura skanowania dostępnych sieci bezprzewodowych odgrywa istotną role w trakcie podłączania stacji roboczej do punktu dostępowego sieci IEEE 802.11. Ma ona także istotny wpływ na efektywność przełączania w przypadku zmiany punktu podłączenia do sieci WIFI dla węzłów mobilnych. Prace badawcze wskazują, że procedura ta, realizowana zgodnie ze standardowymi mechanizmami, może być krytycznym czynnikiem uniemożliwiającym spełnienie...
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Designing effective educational games - a case study of a project management game
PublicationThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
A Biofeedback System that Uses the Game to Study Electrical Muscle Activity
PublicationThe aim of this project was to design a system that will allow performing repetitive muscle exercises using a biofeedback device. It is supposed to enhance the motivation and attractiveness of the performed tasks thanks to an interactive game developed for mobile devices with the Android operating system. The built-in calibration mechanisms enable the users to play a game that is independent of their abilities which evens out the...
-
The Waiter Game: Structure and Development of an Hospitality Training Game
Publication -
Badanie wybranych algorytmów rutingu QoS w sieciach MPLS
PublicationW pracy dokonano przeglądu wybranych, opublikowanych algorytmów rutingu QoS dla sieci MPLS. Zrealizowano program "Ruting QoS" w środowisku MATLAB, w którym zaimplementowano trzy algorytmy: Profile-Based Routing, Kowalika-Colliera oraz Erbasa-Mathara. Przedstawiono i omówiono sieci, które zostały użyte do badań. Przebadano zaimplementowane algorytmy w przykładowych sieciach. Porównano badane algorytmy pod względem: procentu obsłużonych...
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
PublicationA class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...
-
Security Mechanisms in the Comcute System
PublicationThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Path Loss Modelling for Location Service Applications
PublicationThe aim of this paper is the path loss modeling for the radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the UMTS are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation of the distance between the mobile station (MS) and the base station (BS) is outlined. This...
-
The Maturity Level of Quality Management and Medical Service Improvement by Wielkopolska District Hospitals
Publication -
How to provide fair service for V2I communications in VANETs?
PublicationIn this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...
-
Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths
PublicationRozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.
-
Safety assurance strategies for autonomous vehicles
PublicationAssuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...
-
Person Tracking in Ultra-Wide Band Hybrid Localization System Using Reduced Number of Reference Nodes
PublicationIn this article a novel method of positional data integration in an indoor hybrid localization system combining inertial navigation with radio distance measurements is presented. A point of interest is the situation when the positional data and the radio distance measurements are obtained from less than thee reference nodes and it is impossible to unambiguously localize the moving person due to undetermined set of positional equations....
-
Throughput vs. Resilience in Multi-hop Wireless Sensor Networks with Periodic Packet Traffic
Publication -
The impact of the temperament model on the behavior of an autonomous driver
PublicationBecause it is generally believed that the personality and temperament of a human driver influence his/her behavior on the road, the article presents a computational model of the temperament of an autonomous agent - a driver. First, a short review of the four ideas of Galen’s temperament in psychology is presented. Temperament traits are grouped into four other sets, one of which is chosen for implementation in the project of integration...
-
Moving object tracking algorithm evaluation in autonomous surveillance system
PublicationResults of evaluation of video object tracking algorithm being a part of an autonomous surveillance system are presented. The algorithm was investigated employing a set of benchmarks recorded locally. The precision of object detection, evaluated with such metrics as fragmentation, object area recall and object precision, is in focus. The experiments aimed at examining the detection quality using various object detection algorithm...
-
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Architektura i mechanizmy Równoległego Internetu IPv6 QoS
PublicationReferat przedstawia propozycję architektury i mechanizmy Równoległego Internetu IPv6 QoS, który jest rozważany jako jeden z trzech Równoległych Internetów w Systemie IIP tworzonym w ramach projektu Inżynieria Internetu Przyszłości (IIP). Referat zawiera funkcje i mechanizmy, które umożliwią działanie sieci wirtualnych dla wybranych typów aplikacji, takich jak e-zdrowie, monitorowanie i bezpieczeństwo publiczne, zdalne nauczanie,...
-
Architektura i mechanizmy Równoległego Internetu Ipv6 QoS
PublicationArtykuł przedstawia propozycje architektury i mechanizmy Równoległego Internetu IPv6 QoS, który jest rozważany jako jeden z trzech równoległych Internatów w systemie IIp tworzonym w ramach projektu Inzynieria Internetu Przyszłości (IIP). Artykuł zawiera funkcje i mechanizmy, które umożliwiają działanie sieci wirtualnych dla wybranych typów aplikacji, takich jak e-zdrowie, monitorowanie, bezpieczeństwo publiczne, zdalne nauczanie,...
-
Równoległy Internet IPv6 QoS: Realizacja systemu zarządzania i sygnalizacji
PublicationW artykule przedstawiono realizację systemu zarządzania i sygnalizacji dla sieci IPv6 QoS. Sieć ta stanowi jeden z Równoległy Internetów w ramach Systemu IIP umożliwia-jącego wirtualizację infrastruktury sieci i zbudowanego w ramach projektu Inżynieria Internetu Przyszłości (IIP). System zarządzania siecią IPv6 QoS odpowiada za realiza-cję następujących procesów: proces tworzenia/usuwania Równoległego Internetu, wymiarowanie sieci,...
-
Embodying Intelligence in Autonomous Systems with the Use of Cognitive Psychology and Motivation Theories
PublicationThe article discusses, on a certain level of abstraction and generalization, a coherent anthropological approach to the issue of controlling autonomous robots or agents. A contemporary idea can be based on appropriate modeling of the human mind using the available psychological knowledge. One of the main reasons for developing such projects is the lack of available and effective top-down approaches resulting from the known research...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
NetBaltic System-Heterogenous Wireless Network for Maritime Communications
PublicationIn case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...
-
Prioritising national healthcare service issues from free text feedback – A computational text analysis & predictive modelling approach
PublicationPatient experience surveys have become a key source of evidence for supporting decision-making and continuous quality improvement within healthcare services. To harness free-text feedback collected as part of these surveys for additional insights, text analytics methods are increasingly employed when the data collected is not amenable to traditional qualitative analysis due to volume. However, while text analytics techniques offer...
-
Next generation ITS implementation aspects in 5G wireless communication network
PublicationIn the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...
-
11 Triennale Małych Form Malarskich
PublicationTriennale Małych Form Malarskich to cykliczny ogólnopolski konkurs zwieńczony wystawą, prezentujący poszukiwania artystów w dziedzinie kameralnej twórczości malarskiej we wszystkich jej odmianach. Organizatorzy pozostawiają malarzom pełną swobodę w wyborze techniki i tematu. Jedyne ograniczenie stanowią wymiary pracy – jej format nie może przekraczać 600 cm2. „Ograniczenie formatowe stawia przed artystami zadanie poszukania nowych...
-
Marine autonomous surface ship - control system configuration
PublicationThis paper addresses the problem of marine autonomous surface ship (MASS) control. The contribution of the paper is the development of a control system configuration, done assuming fully autonomous MASS operation under distinct operational conditions. The overview of hardware and software selection is included.
-
Extendable Safety and Security Ontology
PublicationSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Dynamic risk assessment in autonomous vehicles motion planning
PublicationArguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.