Filters
total: 424
filtered: 380
Search results for: 5G NETWORK SLICING VIRTUALISATION MARITIME COMMUNICATION 5G ARCHITECTURE
-
LOS and NLOS identification in real indoor environment using deep learning approach
PublicationVisibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a deep learning (DL) model to classify LOS/NLOS...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Uwierzytelnienie i autoryzacja w systemie STRADAR
PublicationPrzedstawiono rozwiązanie serwera uwierzytelnienia i autoryzacji (AA) w rozproszonym systemie STRADAR, udostępniającym funkcjonalności dla prowadzenia działań operacyjnych Morskiego Oddziału Straży Granicznej. System umożliwia prezentację na stanowisku wizualizacji zdarzeń (SWZ) bieżącej i archiwalnej sytuacji na mapie (AIS, radary), obrazu z kamer, zdjęć, notatek, rozmów telefonicznych oraz plików i wiadomości tekstowych (SMS)...
-
Improved-Efficacy EM-Based Antenna Miniaturization by Multi-Fidelity Simulations and Objective Function Adaptation
PublicationThe growing demands for integration of surface mount design (SMD) antennas into miniatur-ized electronic devices have been continuously imposing limitations on the structure dimen-sions. Examples include embedded antennas in applications such as on-board devices, picosatel-lites, 5G communications, or implantable and wearable devices. The demands for size reduction while ensuring a satisfactory level of the electrical and field...
-
Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji.
PublicationThe development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical skills that...
-
Bimodal Emotion Recognition Based on Vocal and Facial Features
PublicationEmotion recognition is a crucial aspect of human communication, with applications in fields such as psychology, education, and healthcare. Identifying emotions accurately is challenging, as people use a variety of signals to express and perceive emotions. In this study, we address the problem of multimodal emotion recognition using both audio and video signals, to develop a robust and reliable system that can recognize emotions...
-
Technological substitution in Asia
PublicationThis book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
W stronę spersonalizowanego miasta?
PublicationOd czasów Platona i Witruwiusza nie ustają wysiłki na rzecz dążenia do prawdy, dobra i piękna skupione wokół miasta jako idei politycznej i przestrzeni fundamentalnie egzystencjalnej. Towarzyszy im od wieków myślenie o idealnej organizacji i kompozycji miasta, o poczuciu podmiotowości mieszkańców i użytkowników, doświadczaniu przez nich czasu i przestrzeni. Szczególnie w ostatnich dekadach, gdy już nie przestrzeń, a czas i jego...
-
Impact of SDN Controller’s Performance on Quality of Service
PublicationSoftware Defined Networking is a paradigm in network architecture; that is quickly becoming commonplace in modern telecommunication systems. It facilitates network customization for the requirements of different applications and simplifies the implementation of new services. Since its proposal, a significant evolution in its functionality has occurred. However, this development brought along problems of efficiency and performance,...
-
Information System for Drivers Within the Integrated Traffic Management System - TRISTAR
PublicationAdvanced traveler information systems (ATIS) for drivers are a very important element of modern traffic management. In recent years ITS infrastructure is being developed also in Poland. It allows for delivering to drivers information related to the conditions in the road network through, inter alia, dedicated Variable Message Signs (VMS). Such information enables drivers to take decisions, contributing to improving the efficiency...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublicationIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
Gesture Recognition With the Linear Optical Sensor and Recurrent Neural Networks
PublicationIn this paper, the optical linear sensor, a representative of low-resolution sensors, was investigated in the multiclass recognition of near-field hand gestures. The recurrent neural network (RNN) with a gated recurrent unit (GRU) memory cell was utilized as a gestures classifier. A set of 27 gestures was collected from a group of volunteers. The 27 000 sequences obtained were divided into training, validation, and test subsets....
-
Sieć sensorowa do rejestracji drgań górnej sieci trakcyjnej w celach diagnostyki eksploatacyjnej
PublicationWraz ze wzrostem prędkości kolejowych pojazdów elektrycznych zwiększają się wymagania utrzymania sieci trakcyjnej w odpowiednim stanie technicznym. Ciągły monitoring i diagnostyka pozwalają wykrywać pogarszającą się jakość odbioru prądu z sieci jezdnej. Jedną z metod jest umieszczenie czujników przyspieszenia na przewodzie jezdnym. Analiza przebiegu przyspieszenia pozwala określić jakość współpracy sieci jezdnej z pantografem....
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation
PublicationThis research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...
-
High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation
PublicationThis research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...
-
Markthal Rotterdam as a contemporary continuation of nineteenth-entury market-halls' architectural ideas in Europe, 3rd International Multidisciplinary Scientific Conference, Social Sciences and Arts, Conference proceedings, book 4, Arts, Performing Arts, Architecture and design, Volume II, Vienna, Austria; pp. 391-398
PublicationIn the nineteenth century the reorganization of the European city local trading model resulted in the network of a series of newly constructed covered market halls. The large-format objects superseded the trade forms of previous streets and squares. In the second half of the twentieth century the panoply of the public trade markets was dominated by food super- and hypermarkets. It seemed that the era of old-time market halls,...
-
System Weryfikacji Autentyczności Podpisu Odręcznego
PublicationW referacie przedstawiono system statycznej i dynamicznej weryfikacji autentyczności podpisu odręcznego, składanego piórem biometrycznym, wyposażonym w 2 akcelerometry, 2 żyroskopy i 3 czujniki ścisku, na rezystancyjnej powierzchni dotykowej, łączącym się bezprzewodowo z urządzeniami komputerowymi. We wstępie przedstawiono architekturę sieciową wielomodalnego systemu biometrii. Przedstawiono warstwę sprzętową systemu weryfikacji...
-
Projekt badawczy BRIK: Opracowanie innowacyjnej metody wyznaczania precyzyjnej trajektorii pojazdu szynowego
PublicationW artykule przedstawiono podstawowe informacje dotyczące projektu badawczego realizowanego na zlecenie Narodowego Centrum Badań i Rozwoju oraz Spółki PKP Polskie Linie Kolejowe S. A. przez Konsorcjum Politechniki Gdańskiej i Uniwersytetu Morskiego w Gdyni. Projekt obejmuje wykorzystanie nowoczesnych metod pomiarowych, takich jak techniki pozycjonowania satelitarnego GNSS, pomiary inercyjne INS oraz skaning laserowy LS, w procesie...
-
Scanning networks with cactus topology
PublicationThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
PublicationThe new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...
-
Complementarity between entanglement-assisted and quantum distributed random access code
PublicationCollaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific...
-
Frequency-Reconfigurable Hybrid SIW-Based Self-Diplexing Antenna Using Solid and Liquid Dielectric Loading
PublicationThis paper presents a novel frequencyreconfigurable self-diplexing antenna (SDA) utilizing a hybrid substrate-integrated waveguide (SIW). The antenna comprises a radiating slot, a feeding network, and a hybrid SIW cavity featuring half-mode circular and half-mode rectangular SIW structures. The unique feature of this antenna lies in its fine-tuning capability of each resonant frequency by inserting or injecting solid and liquid...
-
Social Media in the Fashion Industry. Fundamentals, Strategy and Research Methods
PublicationThis book introduces social network fundamentals in the fashion domain. It addresses the creation of social media marketing plans, highlighting strategic approaches that allow fashion brands to differentiate themselves in the ephemeral and challenging fashion context. Through a variety of academic and professional sources and by sharing the results of their own research, the authors present research methodologies, including netnography,...
-
Subjective and Objective Quality Evaluation Study of BPL -PLC Wired Medium
PublicationThis paper presents results of research on the effectiveness of bi-directional voice transmission in a 6 kV mine cable network using BPL-PLC (Broadband over Power Line - Power Line Communication) technology. It concerns both emergency cable state (supply outage with cable shorted at both ends) and loaded with distorted current waveforms. The narrowband (0.5 MHz–15 MHz) and broadband (two different modes, frequency range of 3 MHz–7.5...
-
Study on CPU and RAM Resource Consumption of Mobile Devices using Streaming Services
PublicationStreaming multimedia services have become very popular in recent years, due to the development of wireless networks. With the growing number of mobile devices worldwide, service providers offer dedicated applications that allow to deliver on-demand audio and video content anytime and everywhere. The aim of this study was to compare different streaming services and investigate their impact on the CPU and RAM resources, with respect...
-
City and Urbanity in the Social Discourse
PublicationThe aim of our article is an attempt to present the concept of urbanity that has been shaped throughout centuries along with the development of European civilisation and now entered a new phase of social production of space based on cultural dimensions. The future of the majority of World’s population is connected currently with the urban life with the assumption that qualitative characteristics of life in the 21st century define...
-
A system of visualization of operational situation on digital maps for mobile units of the Border Guards
PublicationBorder guards have to be equipped with technology enabling a communication, an acquisition, an exchange, and a visualization of data in different operational situations. This also applies to the staff, which is located on mobile units such as ground vehicles, aircrafts and vessels. Within the project realized for the Polish Border Guard and financed by The National Centre for Research and Development, a system was designed and...
-
Design Methodology for Small Passenger Ships On the Example of the Ferryboat Motława 2 Driven by Hybrid Propulsion System
PublicationDynamic development in practically all elds of science and engineering has not passed over shipbuilding . In last years , engineers got to their use computer soware which makes it possible to perform strength and hydrodynamic calculations as well as to visualize design projects in 3 D space [1-4]. At their disposal they have full spectrum of modern solutions associated with the use of advanced materials and technologies [5-7]....
-
Paradygmat informacyjny projektowania systemów wytwórczych nowej generacji
PublicationW niniejszym rozdziale pokazano informacyjny paradygmat projektowania i eksploatacji elastycznych systemów produkcyjnych na przykładzie róznych modeli systemów nowej generacji NGMS (Next Generation Manufacturing System). Na bazie modeli BMS (Bionc Manufacturing System)HMS (Holonie Manufacturing System), FFMS (Fraktal Factory Maufacturing System) dokonano analizy porównawczej wybranych rozwiązań w przedmiotowym obszarze, formułując...
-
How to Sort Them? A Network for LEGO Bricks Classification
PublicationLEGO bricks are highly popular due to the ability to build almost any type of creation. This is possible thanks to availability of multiple shapes and colors of the bricks. For the smooth build process the bricks need to properly sorted and arranged. In our work we aim at creating an automated LEGO bricks sorter. With over 3700 different LEGO parts bricks classification has to be done with deep neural networks. The question arises...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
RESIDENTIAL FUNCTION IN MULTI-CRITERIA MULTIFUNCTIONAL BUILDING SYSTEM DESIGN PROCESS
PublicationThe paper presents the multi-criteria approach in the design process of residential structure as a part of a multifunctional building system. The purpose of work was to broaden the field of multifunctional building system design process. Background for the presented work is to define the direction of architectural growth of the modern city center area where actually are built complex and large capacity structures with a great impact...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublicationIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublicationThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks
PublicationObject detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...
-
Characterizing the Scalability of Graph Convolutional Networks on Intel® PIUMA
PublicationLarge-scale Graph Convolutional Network (GCN) inference on traditional CPU/GPU systems is challenging due to a large memory footprint, sparse computational patterns, and irregular memory accesses with poor locality. Intel’s Programmable Integrated Unffied Memory Architecture (PIUMA) is designed to address these challenges for graph analytics. In this paper, a detailed characterization of GCNs is presented using the Open-Graph Benchmark...
-
Applying artificial neural networks for modelling ship speed and fuel consumption
PublicationThis paper deals with modelling ship speed and fuel consumption using artificial neural network (ANN) techniques. These tools allowed us to develop ANN models that can be used for predicting both the fuel consumption and the travel time to the destination for commanded outputs (the ship driveline shaft speed and the propeller pitch) selected by the ship operator. In these cases, due to variable environmental conditions, making...
-
Bees Detection on Images: Study of Different Color Models for Neural Networks
PublicationThis paper presents an approach to bee detection in video streams using a neural network classifier. We describe the motivation for our research and the methodology of data acquisition. The main contribution to this work is a comparison of different color models used as an input format for a feedforward convolutional architecture applied to bee detection. The detection process has is based on a neural binary classifier that classifies...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks
PublicationThe rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....
-
Emotion Recognition from Physiological Channels Using Graph Neural Network
PublicationIn recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...
-
Progress towards a unified approach to entanglement distribution
PublicationEntanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...
-
Architektura przyszłości – przekraczanie granic poprzez interfejsy
PublicationArchitektura przyszłości rozpatrywana jest w kontekście rozwoju technologii cyfrowych, które umożliwiają nadawanie obiektom architektonicznym cech interfejsów. Przekraczanie granic dotyczy więc nadawania architekturze nowych funkcji - funkcjonalności zapożyczonych ze świata wirtualnego, emisji informacji oraz interakcji. W tym ujęciu „interfejs architektoniczny” stanowi płaszczyznę komunikacji pomiędzy obiektem architektonicznym...