Filters
total: 583
filtered: 562
Search results for: mobile application
-
KIERUNKI ROZWOJU HANDLU ELEKTRONICZNEGO
PublicationCelem artykułu jest ukazanie istoty e-commerce oraz wskazanie najważniejszych kierunków jego rozwoju w Polsce. Opracowano uniwersalną definicję handlu elektronicznego oraz ukazano jego miejsce na tle biznesu elektronicznego oraz gospodarki internetowej. W dalszej części przedstawiono wyniki badań dotyczących najbardziej istotnych w najbliższych latach kierunków rozwoju handlu elektronicznego, jakimi są mobile commerce oraz social...
-
Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet
PublicationThe paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...
-
A universal IT system architecture for servicing, collecting, storing, processing and presenting data from wireless devices
PublicationIn the article we present a universal IT system architecture, which allows one to develop, based on mobile and multiplatform JAVA language, applications capable of working with many different wireless systems in an easy and effective way. Modular system architecture supports efficient data processing and enables convenient presentation of chosen parameters. Additionally, proposed IT system architecture provides easy adoption to...
-
Path Loss Modelling for Location Service Applications
PublicationThe aim of this paper is the path loss modeling for the radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the UMTS are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation of the distance between the mobile station (MS) and the base station (BS) is outlined. This...
-
Analysis of the parameters of respiration patterns extracted from thermal image sequences
PublicationRemote estimation of vital signs is an important and active area of research. The goal of this work was to analyze the feasibility of estimating respiration parameters from video sequences of faces recorded using a mobile thermal camera. Different estimators were analyzed and experimentally verified. It was demonstrated that the respiration rate, periodicity of respiration, and presence and length of apnea periods could be reliably...
-
Evaluation of respiration rate and pattern using a portable thermal camera
PublicationThe goal of this paper was to analyze the accuracy of the proposed method for the evaluation of respiration rate and respiration rhythm patterns (e.g. inspiration slope) using the portable and mobile thermal camera module that could be a part of smart glasses. Parameters were analyzed for 12 volunteers in two experiments, when subjects speak and do not speak. The pressure, chest belt was used as a reference measurement method....
-
Android OS: A Review
PublicationDue to the technological development, mobile terminals have evolved into functionally sophisticated devices such as smartphones and tablets. The Android platform has become one of the most popular operating system with millions of new users each year. Despite many studies, none have provided a comprehensive description of this operating system. In this paper we present a review of the Android OS. We describe the platforms history...
-
Low-Cost Unattended Design of Miniaturized 4 × 4 Butler Matrices with Nonstandard Phase Differences
PublicationDesign of Butler matrices dedicated to Internet of Things and 5th generation (5G) mobile systems—where small size and high performance are of primary concern—is a challenging task that often exceeds capabilities of conventional techniques. Lack of appropriate, unified design approaches is a serious bottleneck for the development of Butler structures for contemporary applications. In this work, a low-cost bottom-up procedure for...
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublicationIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Dynamic risk assessment in autonomous vehicles motion planning
PublicationArguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...
-
Color Processing for Color-Blind Individuals Using Smart Glasses
PublicationIn this paper we investigated image processing methods for color-blind individuals. In particular we experimentally verified color naming procedure, generation of maps with color perception differences for average observers and for dichromats, and two color transformation methods. In experiments 7 mobile devices were used: 3 smart glasses and 4 smartphones. User studies were performed with 38 average observers and 9 dichromats....
-
Asynchronous time difference of arrival (ATDOA) method
PublicationA new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring
PublicationOne of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...
-
Collision-Free Network Exploration
PublicationA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublicationIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Connected searching of weighted trees
PublicationW artykule rozważamy problem spójnego przeszukiwania drzew obciążonych. Autorzy w [L. Barriere i inni, Capture of an intruder by mobile agents, SPAA'02 (2002) 200-209] twierdzą, że istnieje wielomianowy algorytm dla problemu obliczania optymalnej strategii przeszukiwania obciążonego drzewa. W niniejszej pracy pokazano, że problem ten jest obliczeniowo trudny nawet dla wierzchołkowo-obciążonych drzew (wagi krawędzi równe 1) oraz...
-
Empirical Propagation Model for the Container Terminal Environment
PublicationIn the paper the empirical propagation model for mobile radio links in a container terminal environment is presented and the investigated environment Deepwater Container Terminal in Gdansk, Poland) is characterized. Described empirical model was elaborated on the basis of almost 290 thousand propagation path measurements in real conditions. The diversity of conditions occurring in different places of the container terminal has...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Deterministic Rendezvous in Restricted Graphs
PublicationIn this paper we consider the problem of synchronous rendezvous in which two anonymous mobile entities (robots) A and B are expected to meet at the same time and point in a graph G = (V;E). Most of the work devoted to rendezvous in graphs assumes that robots have access to the same sets of nodes and edges, where the topology of connections may be initially known or unknown. In our work we assume the movement of robots is restricted...
-
Computational complexity and length of recorded data for fluctuation enhanced sensing method in resistive gas sensors
PublicationThis paper considers complexity and accuracy of data processing for gas detection using resistance fluctuation data observed in resistance gas sensors. A few selected methods were considered (Principal Component Analysis – PCA, Support Vector Machine – SVM). Functions like power spectral density or histogram were used to create input data vector for these algorithms from the observed resistance fluctuations. The presented considerations...
-
Intelligent Autonomous Vehicles
PublicationAdvanced mobile vehicles and robots have long been one of the main issues in engineering. They have various applications in emergency, lifeguarding and entertainment as well as in various industrial, civil and military systems. Among them, you can distinguish robots that can move in an open environment or operate only in predetermined confined spaces. Open world robots are very demanding because they have...
-
Kinetics and mechanism of the chemically modified starches during gelatinization.
PublicationNative starch was silicated by means of microwave-assisted reactions with varying doses of reagents. Resulting products were characterized by DSC and HMR-relaxation methods. It was observed that the hydratation of the silicated starches during gelatinization decreases when compared to that of the native potato starch. The amount of unfrozen water for ungelitinizated silicated starches are less than in control samples. At the same...
-
A Visual Method of Measuring Railway-Track Weed Infestation Level
PublicationThis paper concerns the assessment of railway track surface conditions in relation to the degree of weed infestation. The paper conceptually describes the proposed method using a visual system to analyse weed infestation level. The use of image analysis software for weed detection is also proposed. This new measurement method allows for a mobile assessment of the track’s weed infestation status. Validation of the assessment method...
-
Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers
PublicationHandover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...
-
Common methods for the chiral determination of amphetamine and related compounds I. Gas, liquid and thin-layer chromatography
PublicationThis article reviews the most common, useful methods for the chiral determination of amphetamine (AM) and AM-deriveddesigner drugs in different of matrix, including blood, hair, urine, medicaments or standard solutions, taking into considerationarticles published in the past 15 years. We consider chromatographic methods (e.g., gas, liquid, high-performance liquid, and thinlayer). We describe several types of chiral derivatization...
-
Augmenting digital documents with negotiation capability
PublicationActive digital documents are not only capable of performing various operations using their internal functionality and external services, accessible in the environment in which they operate, but can also migrate on their own over a network of mobile devices that provide dynamically changing execution contexts. They may imply conflicts between preferences of the active document and the device the former wishes to execute on. In the...
-
Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych
PublicationIn the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...
-
ASYNCHRONICZNA METODA TDOA
PublicationPrzedstawiono nową metodę lokalizowania terminali ruchomych MT (Mobile Terminal) w sieciach radiowych, w których stacje bazowe BS (Base Station) pracują asynchronicznie względem siebie. Metoda ta, nazwana ATDOA (Asynchronous Time Difference of Arrival), umożliwia estymację położenia MT na podstawie pomiarów różnicy czasów propagacji sygnałów radiowych pomiędzy terminalem ruchomym będącym w ruchu, a pojedynczą stacją bazową w różnych...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
The Snow Team Problem
PublicationWe study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset~$\cS$ of vertices of a digraph $D$ and a positive integer $k$, the objective is to determine whether there is a subgraph $H=(\cV_H,\cA_H)$ of $D$ such that (a) $\cS \subseteq \cV_H$, (b)...
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublicationDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Measuring research on radio wave propagation
PublicationTelecommunication connections are increasingly based on the wireless links, both fixed and mobile, carried out under different radio systems. This kind of solution has many advantages. However, the propagation medium is a factor that causes many difficulties in designing wireless networks, because of large diversity of propagation environments. Transmission loss in each environment is determined by many variables phenomena and...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces
PublicationFourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analytical work shows that it has numerous technological gaps that prevent its direct implementation in military communications systems. However, the recent armed world conflicts showed that...
-
Analiza efektywności metod estymacji położenia terminala ruchomego w środowisku propagacji wielodrogowej
PublicationW referacie została zaprezentowana analiza efektywności metod estymacji położenia terminala ruchomego w systemie WCDMA/FDD (Wideband Code Division Multiple Access / Frequency Division Duplex) w warunkach propagacji wielodrogowej. Analizie poddano cztery, najczęściej spotykane w literaturze przedmiotu, metody: Chan'a, Foy'a, Fang'a oraz Friedlander'a. Metody te umożliwiają wyznaczanie położenia geograficznego termi-nala ruchomego...
-
Analiza modalna konstrukcji stanowiska badawczego dynamiki małogabarytowych wirników przy wykorzystaniu wzbudników drgań część 1. badania eksperymentalne
PublicationStreszczenie: W artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. Wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był SCADAS Mobile, a środowiskiem, w którym pracowano był Test.Lab 11 B. Obiekt badań podwieszono na elastycznych linach by...
-
Analiza modalna konstrukcji podpierającej stanowiska badawczego dynamiki małogabarytowych wirników / część pierwsza - badania eksperymentalne
PublicationStreszczenie: W artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. Wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był SCADAS Mobile, a środowiskiem, w którym pracowano był Test.Lab 11 B. Obiekt badań podwieszono na elastycznych linach by...
-
Modification of Selected Propagation Models in Terms of Path Loss Estimation in Container Terminal
PublicationIt is particularly important to look for any propagation model that could be useful for designing mobile radio networks in container terminal environment. Selected propagation models have been investigated. Firstly - basing on measurements results - they have been evaluated in this scope and the analysis has shown, that the adjustment is needed. This modification improved significantly the accuracy of path loss modelling. For the...
-
Obsługa przełączeń terminali ruchomych niewspierających mobilności
PublicationArtykuł omawia koncepcję network-based mobility management umożliwiającą obsługę terminali ruchomych niewspierających protokołów mobilności. Praca koncentruje się na protokole Proxy Mobile IPv6 (PMIPv6) który zapewnienia ciągłą osiągalność terminala ruchomego, pomimo zmiany punktu przyłączenia terminala do sieci. W dalszej części artykuł przybliża wysiłki autorów poczynione w celu uruchomienia środowiska do testowania efektywności...
-
Evolution of Animats Following a Moving Target in an Artificial Ecosystem
PublicationMany biological animals, even microscopically small, are able to track moving sources of food. In this paper, we investigate the emergence of such behavior in artificial animals (animats) in a 2-dimensional simulated liquid environment. These "predators" are controlled by evolving artificial gene regulatory networks encoded in linear genomes. The fate of the predators is determined only by their ability to gather food and reproduce—no...
-
Performance evaluation of parallel background subtraction on GPU platforms
PublicationImplementation of the background subtraction algorithm on parallel GPUs is presented. The algorithm processes video streams and extracts foreground pixels. The work focuses on optimizing parallel algorithm implementation by taking into account specific features of the GPU architecture, such as memory access, data transfers and work group organization. The algorithm is implemented in both OpenCL and CUDA. Various optimizations of...
-
Analiza modalna konstrukcji stanowiska badawczego dynamiki małogabarytowych wirników przy wykorzystaniu wzbudników drgań. cz. I. badania eksperymentalne.
Publicationstreszczenie: w artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był scadas mobile, a środowiskiem, w którym pracowano był test.lab 11 b. obiekt badań podwieszono na elastycznych linach by...
-
Realizacja przełączeń terminali ruchomych przez elementy infrastruktury systemu mobilności
PublicationW artykule przedstawione zostało rozwiązanie pozwalające zrealizować mobilność terminali, które nie posiadają zaimplementowanych zaawansowanych mechanizmów dedykowanych dla tej usługi. Opisano protokół Proxy Mobile IPv6 jako rozwiązanie wpisujące się w model network-based localized mobility management, w której to elementy infrastruktury systemu odpowiadają za zachowanie ciągłości połączenia w trakcie przełączania. Zaprezentowane...
-
Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS
PublicationCelem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...
-
Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems
PublicationEmail is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....
-
Design and Configuration of Context-aware VoIP Telephony Systems
PublicationVoice over IP is a widely used concept with regard to a realization technology of different types of telephony systems, including those that are used in enterprises. Such systems of a call procesing component and a set of desk endpoints that are pervasove from a user perspective. Those andpoints are usually not mobile, but in result can deliver a much greater set of functions needed in an everyday office work. Those functions also...
-
Balancing energy consumption in limited power grid with active front-end and three phase dual active bridge system
PublicationPaper deals with simulation analysis of bidirectional power converters system for charging station of electric vehicle in condition of limited power source in city infrastructure. In case of incapability to provide additional power supply through the grid by virtue of historical, architectural and economic reasons it is possible to solve this issue by implementation of mobile battery-powered supply source. The proposed bidirectional...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
Mobility management solutions for current IP and future networks
PublicationEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...