Filters
total: 522
filtered: 450
Search results for: it service management
-
Orientation effects on the fracture behaviour of additively manufactured stainless steel 316L subjected to high cyclic fatigue
PublicationIn this paper, stainless steel 316L (SS316L) bars were additively manufactured (AM) in three orientations (Z – vertical, XY – horizontal, ZX45 – midway between vertical and horizontal) by using the Laser Powder Bed Fusion Melting (LPBF-M) method. The AM specimens were subjected to load control fatigue testing under full tension and compression (R = -1) at stress amplitudes ±350, ±400 and ±450 MPa. The XY and ZX45 printing orientations...
-
REINFORCED CONCRETE SUPPORTING CONSTRUCTION OF THE STADIUM COVER FOR EURO 2012 IN GDAŃSK
PublicationIn the article structural issues that connected with the reinforced concrete supporting construction of the stadium roofing for EURO 2012 in Gdańsk were described. In the first part of the article the concept of stadium foundation were described. In the second the static - strength analysis for two variants fastening together individual foundation elements were made. The two assumed geometrically different concept of foundation...
-
Testing Watermark Robustness against Application of Audio Restoration Algorithms
PublicationThe purpose of this study was to test to what extent watermarks embedded in distorted audio signals are immune to audio restoration algorithm performing. Several restoration routines such as noise reduction, spectrum expansion, clipping or clicks reduction were applied in the online website system. The online service was extended with some copyright protection mechanisms proposed by the authors. They contain low-level music features...
-
What fosters firm-level labour productivity in Eastern European and Central Asian countries?
PublicationThis study examines labour productivity performance and its determinants in Eastern European and Central Asian (EECA) firms using micro-level data. We find significant differences in labour productivity among members of the European Union in Eastern Europe and other Eastern European and Central Asian countries. We also confirm the important impact of foreign ownership, exporter status, and highly skilled workers on productivity...
-
A novel genetic approach to provide differentiated levels of service resilience in IP-MPLS/WDM networks
PublicationThis paper introduces a novel class-based method of survivable routing for connection-oriented IP-MPLS/WDM networks, called MLS-GEN-H. The algorithm is designed to provide differentiated levels of service survivability in order to respond to varying requirements of end-users. It divides the complex problem of survivable routing in IP-MPLS/WDM networks into two subproblems, one for each network layer, which enables finding the...
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Markov Model of Disease Development and Recovery
PublicationMarkov models are commonly used to simulate diseases and allow modeling of multiple health states and outcomes. Starting with the well known Le Bras multistate model (cascading failure model) with time-independent transitions we will see how simple Markov mortality models may be pressed into the service of survival and event history analysis. We will focus on more complex models which will be able to take into account remission,...
-
Providing Differentiated Levels of Service Availability in VANET Communications
PublicationInter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...
-
Low Cost Method for Location Service in the WCDMA System
PublicationA new and low cost method for a location service (LCS) in the Wideband Code Division Multiple Access (WCDMA) system is outlined. This method, which is called TDOA + RTT, enables calculation of the geographical position of a mobile station (MS) without knowledge of relative time differences (RTDs) between base stations (BSs). The TDOA+RTT method is based on the measurement of round trip times (RTTs) between the MS and the serving...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Big Data and the Internet of Things in Edge Computing for Smart City
PublicationRequests expressing collective human expectations and outcomes from city service tasks can be partially satisfied by processing Big Data provided to a city cloud via the Internet of Things. To improve the efficiency of the city clouds an edge computing has been introduced regarding Big Data mining. This intelligent and efficient distributed system can be developed for citizens that are supposed to be informed and educated by the...
-
INDICES FOR ASSESSING POTENTIAL ENVIRONMENTAL HAZARD FROM FUTURE SHIP SCRAPPING PROCESS, DETERMINABLE IN SHIP DESIGN STAGE
PublicationThis paper shortly presents the issue of utilization of ships after their withdrawal from service. Information on number of floating units liquidated in previous years was presented. Hazards to the environment , health and life of workers employed in the Far East ship scrapping yards operating on the beaches, were indicated. Then, the most important rules which have to make the ship recycling process safe were referred to. This...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
Driving the Image of an Electricity Supplier through Marketing Activities
PublicationThe aim of this study is to determine how marketing actions undertaken within the marketing mix by electricity providers influence their image. Referring to the Stimulus-Organism-Response (SOR) theory, research hypotheses were formulated, and a regression model was constructed, assuming positive impacts of selected marketing actions of electricity providers on their image. A quantitative approach was employed to test the research...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublicationThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Implementacja warstwy danych i sterowania dla Równoległego Internetu IPv6 QoS
PublicationW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. W sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakietów w sieci. Implementacja węzłów IPv6 QoS w środowisku umożliwiającym...
-
Innovative Railway Stations
PublicationIn relation to modern demographic trends, evolving technologies and environmentfriendly solutions increases the potential of rail considered as sustainable form of public transport. Contemporary tendencies of designing railway stations in Europe are focused on lowering energy consumption and reducing carbon emission. The main goal of the designers is to create a friendly and intuitive space for its users and at the same time a...
-
Long-Term GNSS Tropospheric Parameters for the Tropics (2001-2018) Derived from Selected IGS Stations
PublicationThis paper describes dataset “Tropospheric parameters derived from selected IGS stations in the tropics for the years 2001-2018” contains GNSS-derived zenith tropospheric delay (ZTD), a posteriori corrected zenith wet delay (ZWD), and precipitable water vapour (PWV) time series. These troposphere-related data were estimated for the Jan 2001 – Dec 2018 period for 43 International GNSS Service (IGS) stations located across the global...
-
The paradigm change of flexible production systems desing
PublicationNiniejszy artykuł pokazuje zmiany paradygmatu projektowania i eksploatacji elastycznych systemów produkcyjnych, na przykładzie różnych modeli systemów nowej generacji NGMS (Next Generation Manufacturing System). Dokonano analizy porównawczej wybranych rozwiązań w przedmiotowym obszarze, formułując prognozy rozwojowe w oparciu o zaproponowane megatrendy rozwojowe: miniaturyzacji, sieciowości (networking), mobilności, i wirtualizacji....
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublicationWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Composite as a Material of the Future in the Era of Green Deal Implementation Strategies
PublicationComposite materials have become synonymous with modernity, desired in nearly every aspect of our daily lives, from simple everyday objects to sanitary facilities, pipelines, the construction of modern sewer networks, their renovation, water supply, and storage reservoirs, to complex structures—automotive, planes, and space science. Composites have seen a considerable rise in attention owing to their characteristics, durability,...
-
Ubiquity of client access in heterogeneous access environment
PublicationWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Generalized access control in hierarchical computer network
PublicationThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Influence of Toll Collection Method on Motorways on Traffic Safety and Efficiency
PublicationThe paper presents the results of the effectiveness analysis for various forms of toll collection on motorway gates and their impact on safety and efficiency of traffic. The results from field tests that were performed on the A1 motorway in Rusocin were used for the analysis. The research included the analysis of the video image of driver behaviour on the way to the toll booths and at toll booths. The PTV VISSIM tool was used to...
-
Asynchronous Wide Area Multilateration System
PublicationA new method for a location service in the wide area multilateration (WAM) system is outlined. This method, which is called asynchronous WAM (AWAM), enables calculation of the geographical position of an aircraft without knowledge of relative time differences (RTDs) between measuring ground stations (sensors). The AWAM method is based on the measurement of round trip times (RTTs) between the aircraft and the serving ground station,...
-
New approach for determining the QoS of MP3-coded voice signals in IP networks
PublicationPresent-day IP transport platforms being what they are, it will never be possible to rule out conflicts between the available services. The logical consequence of this assertion is the inevitable conclusion that the quality of service (QoS) must always be quantifiable no matter what. This paper focuses on one method to determine QoS. It defines an innovative, simple model that can evaluate the QoS of MP3-coded voice data transported...
-
HOW TO ASSESS THE MATURITY OF SMALL AND MEDIUM-SIZED ENTERPRISES TO LEAN SIX SIGMA PROJECTS
PublicationThis article describes the considerations for the implementation of the Lean Six Sigma (LSS) methodology in small and medium-sized enterprises. Pilot research was conducted in Polish and French SMEs (nine Polish and nine French enterprises from the service and production sectors) referring to the context of the implementation and application of the Lean Six Sigma concept. The studies led to the identification of the motives, needs,...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Modeling of Accidental Bunker Oil Spills as a Result of Ship's Bunker Tanks Rupture - a Case Study
PublicationAIS (Automatic Identification System) data analysis is used to define ship domain for grounding scenarios. The domain has been divided into two areas as inner and outer domains. Inner domain has clear border, which is based on ship dynamic characteristics. Violation of inner domain makes the grounding accident unavoidable. Outer domain area is defined with AIS data analyzing. Outer domain shows the situation of own ship in compare...
-
Messmethoden zur beurteilung der qualität von VoIP-verbindungen
PublicationPraca jest poświęcona tematyce QoS (Quality of Service) w sieciach IP. Na początku pracy opisano i porównano standaryzowane metody oceny jakości połączeń telefonicznych, tzn. MOS, PAMS, PSQM, PESQ, 3SQM, E-Modell. Następnie przedstawiono nowy efektywny system pomiarowy TraceView®:VoIP. Przy jego użyciu jest możliwy objektywny pomiar jakości usługi VoIP (Voice over IP) w sieciach IP. System ten umożliwia również dokonanie w...
-
“Don’t call it work”: An interpretative phenomenological analysis of volunteer firefighting in young adults based on the volunteer process model
PublicationThe number of people engaging in volunteer firefighting is on the decline. It is important to understand what factors on a personal and social level and from the three stages of the volunteer process model: antecedents, experiences and consequences, might be linked to starting and sustaining such engagement. To address this problem, a qualitative, interview-based study was performed on a sample of 10 volunteer firefighters from...
-
Cargo ships heat demand - operational experiment
PublicationThe paper presents the results of an experiment conducted on two cargo ships – a 5300 TEU container with a steam heating system and a 7500 dwt general cargo ship with a thermal oil system. On both ships research has been carried out using specially designed measuring equipment. After gathering data about flow velocity and temperatures (steam/ cooling water/ thermal oil/ seawater/ outside air), calculations have been done, resulting...
-
Shaping the New Vistula Spit Channel: Political, Economic, and Environmental Aspects
PublicationIn September 2022, the new shipping channel in Poland was opened for service. It connects the Port of Elbląg and the Gdańsk Bay in Poland, cutting through the Vistula Spit and the Vistula Lagoon. It was intended to enable direct access to the Baltic Sea from the Port of Elbląg without crossing Russian territory. Originally conceptualized decades ago, it has taken its final shape only recently. Its construction was associated with...
-
Energy efficient beam control for 5G antennas
PublicationThe rapid development of 5G and beyond systems demands improvement in communication speed, latency and safety to maintain the required quality of service. This paper presents an overview of different concepts of energy-efficient antenna systems, which offer beam-shaping and beam-steering functionalities, that enhance connectivity performance and can be used in 5G applications. Different designs for 5.9 GHz, 39 GHz and 60 GHz frequency...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Application tool for IP QoS network design
PublicationDespite the fact that differentiated-service-aware network implementation has been a widely discussed topic for quite some time, network design still proofs nontrivial. Well developed software could put an end to network designer's problems. This chapter describes work, which has been aimed at creating a comprehensive network design tool, offering a fair range of functionality and high reliability. The presented tool is able to...
-
Evaluation of ASON/GMPLS Connection Control Servers Performance
PublicationPerformance aspects have always been very important in telecommunications, especially in control elements. That problem also regards ASON/GMLPS network, which is one of the propositions for Next Generation Network (NGN) transport stratum. In this paper we investigate performance of ASON/GMPLS Connection Control Servers (CCSs) in laboratory testbed, which architecture and operation are also described. In order to evaluate the performance...
-
Semantic Integration of Heterogeneous Recognition Systems
PublicationComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture
PublicationCurrently is it assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Probabilistic Methods in Reliability Assessment of Engineering Lightweight Structures
PublicationThe paper considers the probability-based analysis of structural safety measures. Two different numerical examples of representative lightweight structures are considered – a submerged truss tower supporting an offshore platform, and an overhead power line support truss tower. On the basis of these examples, the importance of a motivated selection of analysis method and a proper choice of the number of important variables is shown....
-
Space syntax analysis - methodology of understanding the space
PublicationNowadays space is considered as a net of connections between different areas. The questions how to delineate its character and how it is possible to objectively compare two spaces is the matter under consideration. This was the reason for creating new theories about the structure of place. "Space syntax analysis" (SSA) or simply "Space Syntax" defines a number of theories and research areas devoted to the analysis of space configuration....
-
Simulation model of IMS/NGN call processing performance
PublicationIn current telecommunications it is assumed that demands of the information society for quickly delivered services will be satisfied by the Next Generation Network (NGN) architecture, which includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS), proper design and dimensioning of NGN is absolutely necessary, for which appropriate models have to be proposed. As the NGN architecture is very complicated,...
-
Call processing performance in multidomain IMS/NGN architecture
PublicationThe Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...
-
Disruption of the communication process on the example of ALEP-PL web application
PublicationBy creating a dedicated web service, such as the presented ALEP-PL solution, you can not assume that its users have suffcient knowledge of the energy sector. This application is dedicated to the local energy planning. The ALEP-PL makes it easier to incorporate in the planning of key players in the local energy market. This group of ALEP-PL users represents mainly the ocials of energy companies and specialist offcers. In the paper...
-
Implementacja płaszczyzny danych i płaszczyzny sterowania dla Równoległego Internetu IPv6 QoS
PublicationW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. Zgodnie z architekturą DiffServ, w sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakie¬tów w sieci. Implementacja węzłów IPv6...