Filters
total: 1032
filtered: 503
-
Catalog
Chosen catalog filters
Search results for: ict information and communication technology
-
The Microwave Sources for EPR Spectroscopy
Publication -
Automatic Image and Speech Recognition Based on Neural Network
Publication -
Linux scheduler improvement for time demanding network applications, running on Communication Platform Systems
PublicationCommunication Platform Systems as ex. ATCA standard blades located in standardized chassis provides high level communication services between system peripherals. Each ATCA blade brings dedicated functionality to the system but can as well exist as separated host responsible for servicing set of task. According to platform philosophy these parts of system can be quite independent against another solutions provided by competitors....
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublicationThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Propagation Path Loss Modeling in Container Terminal Environment
PublicationThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublicationThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublicationThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Quality Aspects in Digital Broadcasting and Webcasting Systems: Bitrate versus Loudness
PublicationIn this paper the quality aspects of bitrate and loudness in digital broadcasting and webcasting systems are examined. The authors discuss a survey concerning user preferences related with processing and managing audio content. The coding efficiency of a popular audio format is analyzed in the context of storing media. An objective study on a representative group of signal samples, as well as a subjective study of the perceived...
-
Approximation of Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture Using Phase-Type Distributions
PublicationCurrently it is assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Traffic Type Influence on Performance of OSPF QoS Routing
PublicationFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed On-Off model was used for self-similar traffic generation. Comparison of simulation results was presented using both relative and non-relative...
-
Call and Connections Times in ASON/GMPLS Architecture
PublicationIt is assumed that demands of information soci- ety could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded by performance evaluation to guarantee society expectations. Call and connections times are in ASON/GMPLS architecture important for real-time applications. Practical...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
A detector of sleep disorders for using at home
PublicationObstructive sleep apnea usually requires all-ni ght examination in a specialized clinic, under the supervision of a medical staff. Because of those requirements it is an expensive and a non-widely utilized test. Moving the examination procedure to patients’ home with automatic analysis algorithms involved will decrease the costs and make it available for larger group of patients. The developed device allows all-night recordings...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
New Tool for Examining QoS in the VToIP Service
PublicationThis paper is dedicated to the subject of measuring QoS in the Video Telephony over IP (VToIP) service. QoS measurement models in general and then models designed specifically for measuring QoS in the VToIP service are presented. A new numerical tool for examining the quality of VToIP video streams VToIP is described. The tool’s functionality is then put to the test in a number of analysis scenarios. The results and insights gained...
-
Ubiquity of client access in heterogeneous access environment
PublicationWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Human awareness versus Autonomous Vehicles view: comparison of reaction times during emergencies
PublicationHuman safety is one of the most critical factors when a new technology is introduced to the everyday use. It was no different in the case of Autonomous Vehicles (AV), designed to replace generally available Conventional Vehicles (CV) in the future. AV rules, from the start, focus on guaranteeing safety for passengers and other road users, and these assumptions usually work during normal traffic conditions. However, there is still...
-
Self-employment of women: an opportunity or the last resort?
PublicationIt is believed that automatization and technological changes will be the main drivers of work in the future. At the same time, there is a growing discussion about new forms of employment, such as self-employment. It may be either perceived as a chance for empowerment, through creating new job opportunities, that were not reachable previously, or as precarious work, with less stability, higher risk, and uncertain income. The main...
-
Triangular 3D Laser Scanning in Underwater Photogrammetry
PublicationThe use of triangular 3D laser scanning may significantly enhance the visual inspection of underwater objects. In these days of high demand for accurate information, exclusively photographic documentation is not enough, as it is geometrically flawed. The authors of this article are trying to present the rudiments of laser scanning, a modern means of measuring, which is reliable, relatively easy to use and works in accordance with...
-
Application of algorithms for reasoning from imperfect knowledge in it evaluation environment
PublicationThe paper describes concept of building multi-agent system dedicated for information technology evaluation or selection for IT enterprises management (IT_MAS). Authors present the model of Knowledge Processing Environment, which is one of main components of the solution. Either facts or rules will be based on IT specialists' experience. However, knowledge which is being acquisited from IT domain is mostly imperfect - uncertain...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Auditory Display Applied to Research in Music and Acoustics . Obrazowanie dźwiękowe w muzyce i akustyce.
PublicationThis paper presents a relationship between Auditory Display (AD) and the domains of music and acoustics. First, some basic notions of the Auditory Display area are shortly outlined. Then, the research trends and system solutions within the fields of music technology, music information retrieval and music recommendation and acoustics that are within the scope of AD are discussed. Finally, an example of AD solution based on gaze...
-
Subjective Quality Evaluation of Underground BPL-PLC Voice Communication System
PublicationDesigning a reliable voice transmission system is not a trivial task. Wired media, thanks to their resistance to mechanical damage, seem an ideal solution. The BPL-PLC (Broadband over Power Line – Power Line Communication) cable is resilient to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency situation, including paramedic rescue operations. These features...
-
Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine
PublicationIn order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...
-
Multi-Beam Antenna for Ka-Band CubeSat Connectivity Using 3-D Printed Lens and Antenna Array
PublicationIn this paper, the design of a passive multi-beam lens antenna is proposed for the CubeSat space communication system as an alternative application of a 2-D microstrip antenna array that has originally been designed for a 39 GHz 5 G MU-MIMO system. The half-ellipsoid lens is 3-D printed using stereolithography (SLA) technology. The antenna prototype is capable of selecting the main beam between 16 different directions with a gain...
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublicationIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublicationW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Building Information Modelling as an opportunity and risk for stakeholders involved in construction investment process
PublicationThe requirements to apply Building Information Modelling (BIM) in public investments worldwide are currently very high. Significant interest (sometimes formulated also as a requirement) in BIM technology can be observed also among private investors. Design technology that applies BIM is supported by many private investors due to its numerous advantages. A growing group of construction designers (steel, concrete and reinforced concrete...
-
A system for Direction-Of-Arrival estimation in ISM 2.4 GHz frequency band based on ESPAR antenna and SDR technology
PublicationDetermination of the direction of the signal arrival (DOA) finds many applications in various areas of science and industry. Knowledge of DOA is used, among others to determine the position of a satellite with a low Earth orbit (LEO), localization of people and things as well as in research of wireless communication systems, for instance the determination of the number of...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Impact of information systems (IS) infusion on Open Government Data (OGD) adoption
PublicationPurpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Źródła informacji rynkowych przy kształtowaniu nowych produktów
PublicationCelem pracy jest przedstawienie stopnia korzystania z różnych źródeł informacji rynkowych przy kształtowaniu nowych produktów przez krajowe przedsiębiorstwa średnio-wysokiej i wysokiej techniki oraz powiązania między rodzajem źródła a wynikami nowych produktów.
-
Towards an experience based collective computational intelligence for manufacturing
PublicationKnowledge based support can play a vital role not only in the new fast emerging information and communication technology based industry, but also in traditional manufacturing. In this regard, several domain specific research endeavors have taken place in the past with limited success. Thus, there is a need to develop a flexible domain independent mechanism to capture, store, reuse, and share manufacturing knowledge. Consequently,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
How can the work environment be redesigned to enhance the well-being of individuals with autism?
PublicationPurpose – This article examines the opportunities to create optimal conditions for individuals with autism, to work successfully within the contemporary workplace and improve their well-being. These opportunities arise from digital technology (DT) development, enabling the work environment to be remodeled by providing new possibilities and ways of working. The author discusses both technology-based as well as non-technological accommodations...
-
Sposoby zbierania informacji rynkowych przy kształtowaniu nowych produktów
PublicationCelem pracy jest określenie, w jakim stopniu krajowe przedsiębiorstwa średnio-wysokiej i wysokiej techniki stosują różne sposoby zbierania informacji rynkowych przy wdrażaniu nowych produktów, oraz jak te sposoby wiążą się z osiąganiem sukcesu nowego produktu.
-
Electromagnetic Modeling of Microstrip Elements Aided with Artificial Neural Network
PublicationThe electromagnetic modeling principle aided withartificial neural network to designing the microwave widebandelements/networks prepared in microstrip technology is proposedin the paper. It is assumed that the complete information is knownfor the prototype design which is prepared on certain substratewith certain thickness and electric permittivity. The longitudinaland transversal dimensions of new design...
-
Post-comatose patients with minimal consciousness tend to preserve reading comprehension skills but neglect syntax and spelling
PublicationModern eye tracking technology provides a means for communication with patients suffering from disorders of consciousness (DoC) or remaining in locked-in-state. However, being able to use an eye tracker for controlling text-based contents by such patients requires preserved reading ability in the first place. To our knowledge, this aspect, although of great social importance, so far has seemed to be neglected. In the paper, we...
-
Digital Transformation and Its Influence on Sustainable Manufacturing and Business Practices
PublicationThe paper focuses on the relationship between businesses and digital transformation, and how digital transformation has changed manufacturing in several ways. Aspects like Cloud Computing, vertical and horizontal integration, data communication, and the internet have contributed to sustainable manufacturing by decentralizing supply chains. In addition, digital transformation inventions such as predictive analysis and big data analytics...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Potential of Polish R&D industry in the context of prototyping, design, development and control of a dedicated national satellite SAR system for marine ecosystem monitoring. Technical paper - preliminary study
Publicationpace technology is currently one of the most important elements in the advance of information societies and knowledge-based economies all over the world. The European Space Agency (ESA) is in the focal point of European space activities, while the European Union provides strong financial support for the development of space technologies and applications in its flagship programs. In a domestic scope, the Polish Space Agency (POLSA)...
-
Study of railway traffic safety based on the railway track condition monitoring system
PublicationThe solution to the problem of monitoring the railway track, as well as potentially dangerous objects and phenomena in the adjacent territories, is determined by the need to implement increased requirements for traffic safety (primarily to the geometric parameters of the devices of a long railway track under construction and functioning load-bearing highways), prevention of technological disasters and large-scale negative effects...
-
Smart Services supporting Drivers in Effective Cars Parking
PublicationThe paper shows how to design and implement intelligent, service oriented systems for management of free places in distributed car parks. The idea of SOA technology is widely used. It is assumed that a state of every car park is automatically determined by a special electronic infrastructure including IoT solutions. The information received from such an infrastructure is sent to the main management system, which processes it and,...
-
Networkig activities of general judiciary - from theory to practice
PublicationOver the last three decades, networks - as a field of research - have acquired a significant place among management sciences. Unfortunately, in the judiciary they have become a subject of more careful analyses only recently, which resulted in a large discrepancy of knowledge - both in theory and in its practical adaptation for the needs of the courts. In order to fill this cognitive gap, an attempt was made to identify levels of...
-
Information-driven network resilience: Research challenges and perspectives
PublicationInternet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...
-
A New Direct-Sequence Spread Spectrum Signal Detection Method for Underwater Acoustic Communications in Shallow-Water Channel
PublicationDirect-Sequence Spread Spectrum (DSSS) is one of the modulation and coding techniques used in Underwater Acoustic Communication (UAC) systems for reliable data transmision even at low signal levels. However, in a shallow water channel, there is a strong multipath propagation which causes a phase fluctuation of the received signal, affecting the performance of the spread-spectrum system. The article presents a differential method...