Search results for: LOCAL COMMUNICATION
-
Social media and efficient computer infrastructure in smart city
PublicationSocial media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...
-
A novel dual-band rectifier circuit with enhanced bandwidth for RF energy harvesting applications
PublicationIn recent years, a rapid development of low-power sensor networks, enabling machine-to-machine communication in applications such as environmental monitoring, has been observed. Contemporary sensors are normally supplied by an external power source, typically in a form of a battery, which limits their lifespan and increases the maintenance costs. This problem can be addressed by harvesting and converting ambient RF energy into...
-
Analytical tools for functional assessment of architectural layouts
PublicationFunctional layout of the building, understood as a layout or set of the facility rooms (or groups of rooms) with a system of internal communication, creates an environment and a place of mutual relations between the occupants of the object. Achieving optimal (from the occupants’ point of view) spatial arrangement is possible through activities that often go beyond the stage of architectural design. Adopted in the architectural...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks
PublicationThe rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....
-
Quality Evaluation of Voice Transmission Using BPL Communication System in MV Mine Cable Network
PublicationThis article presents results of a quality evaluation study, considering voice transmission in a 6 kV medium voltage cable network using the BPL (Broadband over Power Line) communication system. The tests are carried out under real mining conditions for the selected power cable without voltage, earthed at both sides. Such a method of monitoring work conditions is of great importance, especially during a disaster. Power cables are...
-
Pathogenesis of psoriasis in the “omic” era. Part II. Genetic, genomic and epigenetic changes in psoriasis
PublicationPsoriasis is a multifactorial disease in which genetic, environmental and epigenetic factors regulating gene expression play a key role. In the “genomic era”, genome-wide association studies together with target genotyping platforms performed in different ethnic populations have found more than 50 genetic susceptible markers associated with the risk of psoriasis which have been identified so far. Up till now, the strongest association...
-
Constrained optimization for generating gain-bandwidth design trade-offs of wideband unidirectional antennas
PublicationBroadband unidirectional antennas realised in microstrip technology find applications in many wireless communication systems. One of their design challenges is the necessity of handling multiple performance figures which is difficult when using traditional design methods, largely based on parameter sweeping. This work presents a simple optimisation-based framework that permits generation of gain-bandwidth trade-off designs for...
-
Creating Polish space language dictionary - lessons learned
PublicationPolish space industry suffers from lack of space vocabulary. Since joining European Space Agency in 2012, the sector has expanded rapidly now employing over 1000 specialists focusing mainly on space sustainability, space debris detection and tracking, robotics and propulsion systems. The Polish Space Agency together with The Polish Committee for Standardization have committed to creating the first lexicon of space language, along...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublicationArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
ICT, financial markets and their impact on firms’ performance and internationalisation
PublicationThe effects of information and communication technology (ICT) and financial development on growth are highly debated in the literature. Motivated by previous studies and their mixed results, in this study, we propose an analysis to re-examine the ICT-finance puzzle. We go beyond country-specific or sector-specific studies and conduct cross-country analysis with firm-level data. It enables obtaining a broad picture of the ICT-finance-growth...
-
Closed-Loop Control System Design for Wireless Charging of Low-Voltage EV Batteries with Time-Delay Constraints
PublicationThis paper presents an inductive power transfer system on the basis of a double single- phase three-level T-type inverter and two split transmitting coils for constant current and constant voltage wireless charging of low-voltage light electric vehicle batteries with closed-loop control, considering time-delay communication constraints. An optimal control structure and a modified control strategy were chosen and implemented to...
-
IoT for healthcare applications
PublicationThis chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...
-
Applying the Lombard Effect to Speech-in-Noise Communication
PublicationThis study explored how the Lombard effect, a natural or artificial increase in speech loudness in noisy environments, can improve speech-in-noise communication. This study consisted of several experiments that measured the impact of different types of noise on synthesizing the Lombard effect. The main steps were as follows: first, a dataset of speech samples with and without the Lombard effect was collected in a controlled setting;...
-
Levels of creativity in architectural education
PublicationArchitectural design combines engineering science and art, thus stimulating creativity is a challenge in the didactic process. There are various levels of creativity that can be attained through architectural education. From idea to architecture (FITA) is a teaching method based on metaphorical and analogical reasoning that was developed, implemented and tested during architectural design classes in the Faculty of Architecture...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublicationIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Quantum entanglement
PublicationAll our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...
-
The risk assessment of adverse events of nursing activities as the element of quality management in healhcare
PublicationThe purpose of the paper is to present MedCARVER+Shock method and Pareto analysis and its usability for the risk assessment of adverse events of nursing activities. 888 activities carried out by all 190 nurses working at the District Hospital X located in Poland were taken into account. During the research the qualitative approach was used. As the result sixteen groups of nursing activities causing the highest risk of adverse events...
-
The Indonesian economy in 2005: An analysis using the input-output approach
PublicationThis study aims to analyze the economic conditions of Indonesia in 2005. This study employs Input-Output (IO) analysis as an analysis instrument. The data of this study is the Indonesian IO table for 2005. Thus, the Indonesian economy is represented by Indonesian industrial sectors mentioned in the data. There are nine industries used in the present study, namely (1) agriculture, livestock, forestry, and fishery, (2) mining and...
-
Toward Fast Calculation of Communication Paths for Resilient Routing
PublicationUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Communication and Load Balancing Optimization for Finite Element Electromagnetic Simulations Using Multi-GPU Workstation
PublicationThis paper considers a method for accelerating finite-element simulations of electromagnetic problems on a workstation using graphics processing units (GPUs). The focus is on finite-element formulations using higher order elements and tetrahedral meshes that lead to sparse matrices too large to be dealt with on a typical workstation using direct methods. We discuss the problem of rapid matrix generation and assembly, as well as...
-
Evaluation of Connectivity Gaps Impact on TCP Transmissions in Maritime Communications
PublicationMany organizations and research working groups, including among others IEEE, ITU, ETSI and IMO are currently working towards improvements in communication of different types of vehicles (cars, trains, planes and vessels) and upgrading utilities and services offered to their crews and passengers travelling all over the world. The paper deals with selected aspects of the TCP protocol connectivity in maritime wireless networks. The...
-
Estimation of Coherence Bandwidth for Underwater Acoustic Communication Channel
PublicationA shallow underwater acoustic communication channel is characterized by strong multipath propagation. The signal reaching the receiver consists of a direct waveform and a number of its delayed and suppressed replica. A significant time dispersion of the transmitted signal and selective fading of its spectrum are observed. Coherence bandwidth defines maximal bandwidth, wherein the channel amplitude characteristic remains constant...
-
Adopting Collaborative Games into Agile Requirements Engineering
PublicationIn agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....
-
STILL ‘FEW, SLOW AND LOW’? ON THE FEMALE DIMENSION OF TECHNOLOGY, LABOUR MARKETS AND ECONOMIC ACTIVITY: EVIDENCE FOR THE PERIOD OF 1990-2017
PublicationThe known in empirical economics question ‘Why so Few? Why so Slow? Why so Low?’ refers here to the persistently small number of women involved in innovative activities, the slowness of change in the inequalities between women and men in these fields, and women’s continuing lower rank in business and academic positions. In developing countries, women`s labour and entrepreneurial activity remains an ‘untapped resource’ for economic...
-
Asymmetrical-Slot Antenna with Enhanced Gain for Dual-Band Applications
PublicationDual-band operation is an important feature of antennas to be applied in modern communication systems. Although high gain of radiators is rarely of concern in urban areas with densely located broadcasting stations, it becomes crucial for systems operating in more remote environments. In this work, a dual-band antenna with enhanced bandwidth is proposed. The structure consists of a driven element in the form of an asymmetrical radiator/slot...
-
Analysis of circular polarization antenna design trade‐offs using low‐cost EM‐driven multiobjective optimization
PublicationCircular polarization (CP) antennas are vital components of modern communication systems. Their design involves handling several requirements such as low reflection and axial ratio (AR) within the frequency range of interest. Small size is an important criterion for antenna mobility which is normally achieved as a by‐product of performance‐oriented modifications of the structure topology. In this work, multiobjective optimization...
-
Post-comatose patients with minimal consciousness tend to preserve reading comprehension skills but neglect syntax and spelling
PublicationModern eye tracking technology provides a means for communication with patients suffering from disorders of consciousness (DoC) or remaining in locked-in-state. However, being able to use an eye tracker for controlling text-based contents by such patients requires preserved reading ability in the first place. To our knowledge, this aspect, although of great social importance, so far has seemed to be neglected. In the paper, we...
-
A New Direct-Sequence Spread Spectrum Signal Detection Method for Underwater Acoustic Communications in Shallow-Water Channel
PublicationDirect-Sequence Spread Spectrum (DSSS) is one of the modulation and coding techniques used in Underwater Acoustic Communication (UAC) systems for reliable data transmision even at low signal levels. However, in a shallow water channel, there is a strong multipath propagation which causes a phase fluctuation of the received signal, affecting the performance of the spread-spectrum system. The article presents a differential method...
-
Digital Transformation and Its Influence on Sustainable Manufacturing and Business Practices
PublicationThe paper focuses on the relationship between businesses and digital transformation, and how digital transformation has changed manufacturing in several ways. Aspects like Cloud Computing, vertical and horizontal integration, data communication, and the internet have contributed to sustainable manufacturing by decentralizing supply chains. In addition, digital transformation inventions such as predictive analysis and big data analytics...
-
Multi-Taper-Based Automatic Correction of Non-Anechoic Antenna Measurements
PublicationPrototype measurements belong to the key steps in the development of antenna structures. Although accurate validation of their far-field performance can be realized in dedicated facilities, such as anechoic chambers, the high cost of their construction and maintenance might not be justified if the main goal of measurements is to support teaching or low-budget research. Instead, they can be performed in non-anechoic conditions and...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublicationWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
Implementation of Hierarchical Control of Drinking Water Supply System
PublicationThe paper presents the outline of the didactical project of a complex computer controlled system realized by the first degree students of the Automatics and Robotics on the Faculty of Electrical and Control Engineering (FoEaCE) in Gdansk University of Technology (GUT). The synthesis, implementation and analysis of a multilayer hierarchical control system for drinking water supply system (DWSS) are main topics of that project. The...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublicationQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
Reshaping financial systems: The role of ICT in the diffusion of financial innovations – Recent evidence from European countries
PublicationExchange-traded funds (ETFs) are among the fastest-growing types of innovative financial products. The emergence and spread of these instruments have been facilitated by the digital revolution. Information and communication technology (ICT) is profoundly reshaping the global economic landscape, laying solid foundations for unrestricted and unbounded flows of information and knowledge, eliminating information asymmetries, and furthering...
-
A compact spline-enhanced monopole antenna for broadband/multi-band and beyond UWB applications
PublicationIn this work, a compact monopole antenna for broadband/multi-band and beyond ultra- wideband (UWB) communication has been proposed. The structure is based on a spline-enhanced radiator with a broadband feed and a modified ground plane. Rigorous design optimization of the radiator has been performed in a two-stage framework where optimization of the structure with respect to electrical performance is followed by explicit miniaturization...
-
Business continuity management framework for Industry 4.0 companies regarding dependability and security of the ICT and ICS/SCADA system
PublicationThis chapter addresses a business continuity management (BCM) framework for the Industry 4.0 companies including the organizational and technical solutions, regarding the dependability and security of the information and telecommunication technology (ICT), and the industrial control system (ICS) / supervisory control and data acquisition (SCADA) system. These technologies and systems play nowadays important roles in modern advanced...
-
What Skills for Multi-Partner Open Innovation Projects? Open Innovation Competence Profile in a Cluster Ecosystem Context
PublicationIndustry 4.0 and the turbulent environment have rendered increasing interest in open inno- vation that extends from the bilateral transmission of expertise to multilateral platform collaborations. Open innovation ventures are seen as intricate collaborations that require the commitment of numer- ous partners during the lifetime of the project. In order to examine the specific competence of open innovation teams, we set the research...
-
Transfer learning in imagined speech EEG-based BCIs
PublicationThe Brain–Computer Interfaces (BCI) based on electroencephalograms (EEG) are systems which aim is to provide a communication channel to any person with a computer, initially it was proposed to aid people with disabilities, but actually wider applications have been proposed. These devices allow to send messages or to control devices using the brain signals. There are different neuro-paradigms which evoke brain signals of interest...
-
Explicit Size-Reduction of Circularly Polarized Antennas through Constrained Optimization with Penalty Factor Adjustment
PublicationModern communication systems of high data capacity incorporate circular polarization (CP) as the preferred antenna radiation field configuration. In many applications, integration of the system circuitry with antennas imposes size limitations on CP radiators, which makes their development process a challenging endeavor. This can be mitigated by means of simulation-driven design, specifically, constrained numerical optimization....
-
Application of commercial microwave links (CMLs) attenuation for quantitative estimation of precipitation
PublicationPrecipitation estimation models are typically sourced by rain gauges, weather radars and satellite observations. A relatively new technique of precipitation estimation relies on the network of Commercial Microwave Links (CMLs) employed for cellular communication networks: the rain-inducted attenuation in the links enables the precipitation estimation. In the paper, it is analysed to what extent the precipitation derived from CML...
-
Quantifying inconsistencies in the Hamburg Sign Language Notation System
PublicationThe advent of machine learning (ML) has significantly advanced the recognition and translation of sign languages, bridging communication gaps for hearing-impaired communities. At the heart of these technologies is data labeling, crucial for training ML algorithms on a huge amount of consistently labeled data to achieve models that generalize well. The adoption of language-agnostic annotations is essential to connect different sign...
-
Toward 6G Optical Fronthaul: A Survey on Enabling Technologies and Research Perspectives
PublicationThe anticipated launch of the Sixth Generation (6G) of mobile technology by 2030 will mark a significant milestone in the evolution of wireless communication, ushering in a new era with advancements in technology and applications. 6G is expected to deliver ultra-high data rates and almost instantaneous communications, with three-dimensional coverage for everything, everywhere, and at any time. In the 6G Radio Access Networks (RANs)...
-
Multi-GPU UNRES for scalable coarse-grained simulations of very large protein systems
PublicationGraphical Processor Units (GPUs) are nowadays widely used in all-atom molecular simulations because of the advantage of efficient partitioning of atom pairs between the kernels to compute the contributions to energy and forces, thus enabling the treatment of very large systems. Extension of time- and size-scale of computations is also sought through the development of coarse-grained (CG) models, in which atoms are merged into extended...
-
An optimized system for sensor ontology meta-matching using swarm intelligent algorithm
PublicationIt is beneficial to annotate sensor data with distinct sensor ontologies in order to facilitate interoperability among different sensor systems. However, for this interoperability to be possible, comparable sensor ontologies are required since it is essential to make meaningful links between relevant sensor data. Swarm Intelligent Algorithms (SIAs), namely the Beetle Swarm Optimisation Algorithm (BSO), present a possible answer...
-
Briding the communicational gap between client and software developer
PublicationOften is it the case that people find it difficult to bridge thecommunicational gap between themselves and others. This is something of a problem, to say the least. My aim is to explain and to clarify the reasons behind this and to hopefully overcome any obstacles, to allow for a much smoother and more accurate means of fulfilling client and software developer needs.I have found through my own personal experience something which...
-
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublicationDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...