Filters
total: 11738
-
Catalog
- Publications 6398 available results
- Journals 756 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 292 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 273 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3520 available results
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Application of wireless communication to small WECS with induction generator
PublicationWind energy conversion systems (WECS) seem to be self-evident elements of the future smart grids. Among many generator types the squirrel cage induction generator (SCIG) characterizes robustness and low cost. A full-scale power converter can perform smooth grid connection over wide speed range of multiple-stage geared SCIG. Increasing number of sensors can improve the WECS control and diagnostics but increasing number of thin wires...
-
An Intergrated Model of Motion, Steering, Positioning and Stabilization of an Unmanned Autonomous Maritime Vehicle
PublicationIn the paper the aim of an interdisciplinary research is presented. The research method is introduced. An object the unmanned autonomous maritime vehicle is briefly described. The key research problem concerns a combined model of the vehicle motion including the loads of lift and hydrodynamic nature. The model takes into account the gravity and displacement forces, resistance and thrust forces, lift and other hydrodynamic forces....
-
On UMTS security.
PublicationW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions
PublicationAbility to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...
-
Settlement Networks in Polish Spatial Development Regional Plans
PublicationIn 1999, ten years after the great political changes in Poland, 16 self-governed regions (in Polish: voivodeship) were created. According to Polish law, voivodeship spatial development plans, or regional plans in short, determine basic elements of the settlement network. No detailed regulations indicate the specific elements of the settlement network or what features of these elements should be determined. For this reason, centres...
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublicationFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
On Applications of Fractional Derivatives in Circuit Theory
PublicationIn this paper, concepts of fractional-order (FO) derivatives are discussed from the point of view of applications in the circuit theory. The properties of FO derivatives required for the circuit-level modelling are formulated. Potential problems related to the generalization of transmission line equations with the use of FO derivatives are presented. It is demonstrated that some of formulations of the FO derivatives have limited...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Mashup Approaches for Improving Service Oriented Business Scenarios
PublicationTwo kinds of business scenarios are considered: application- and service-oriented. It is shown that the former are more flexible and easier reconfigurable for both traditional (human-oriented) and IT services. Moreover, complex IT services can be created by simple IT services using the modern mashup technology. It is the reason why such business scenarios can be modeled by BPMN in much easier ways. A simple example of a supply...
-
Internal Security
Journals -
Quality Modeling in Grid and Volunteer-Computing Systems
PublicationA model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...
-
On Applications of Fractional Derivatives in Electromagnetic Theory
PublicationIn this paper, concepts of fractional-order (FO) derivatives are analysed from the point of view of applications in the electromagnetic theory. The mathematical problems related to the FO generalization of Maxwell's equations are investigated. The most popular formulations of the fractional derivatives, i.e., Riemann-Liouville, Caputo, Grünwald-Letnikov and Marchaud definitions, are considered. Properties of these derivatives are...
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublicationArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Dynamic GNSS Mission Planning Using DTM for Precise Navigation of Autonomous Vehicles
PublicationNowadays, the most widely used method for estimating location of autonomous vehicles in real time is the use of Global Navigation Satellite Systems (GNSS). However, positioning in urban environments using GNSS is hampered by poor satellite geometry due to signal obstruction created by both man-made and natural features of the urban environment. The presence of obstacles is the reason for the decreased number of observed satellites...
-
Towards a classification of networks with asymmetric inputs
PublicationCoupled cell systems associated with a coupled cell network are determined by (smooth) vector fields that are consistent with the network structure. Here, we follow the formalisms of Stewart et al (2003 SIAM J. Appl. Dyn. Syst. 2, 609–646), Golubitsky et al (2005 SIAM J. Appl. Dyn. Syst. 4, 78–100) and Field (2004 Dyn. Syst. 19, 217–243). It is known that two non-isomorphic n-cell coupled networks can determine the same sets of...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
The dataset of simulations for optimal and non-optimal rotating receiver angles of multicoil dynamic wireless power transfer system
Open Research DataThe provided dataset is part of the simulation results shown in related journal paper "Optimal Rotating Receiver Angles Estimation for Multicoil Dynamic Wireless Power Transfer".
-
System of wireless magnetic sensors for detection and identification of ferromagnetic vehicles
PublicationThe paper presents the results of deformation of the Earth's magnetic field by land vehicles. Basing on the analysis of the shape of the magnetic field deformation, it is possible to detect and identify a vehicle. In order to eliminate the interference of the Earth's magnetic field by the environment, the measurements were performed in a differential configuration. Under a development project a wireless system of magnetic sensors...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Optimal Rotating Receiver Angles Estimation for Multicoil Dynamic Wireless Power Transfer
PublicationThis study proposed an approach to dynamic wireless charging that uses a rotating receiver coil. Our simulation study focused on the verification of a novel way of increasing the coupling coefficient and power transfer stability by following the flux of the transmitting coils. To obtain the highest possible coupling by means of the FEM analysis, we studied the optimization of the trajectory of the angular velocity of the rotating...
-
Performance of Noise Map Service Working in Cloud Computing Environment
PublicationIn the paper a noise map service designated for the user interested in environmental noise subject is presented. It is based on cloud computing. Noise prediction algorithm and source model, developed for creating acoustic maps, are working in cloud computing environment. In the study issues related to noise modeling of sound propagation in urban spaces are discussed with a special focus on road noise. Examples of results obtained...
-
Deep neural networks for data analysis
e-Learning CoursesThe aim of the course is to familiarize students with the methods of deep learning for advanced data analysis. Typical areas of application of these types of methods include: image classification, speech recognition and natural language understanding. Celem przedmiotu jest zapoznanie studentów z metodami głębokiego uczenia maszynowego na potrzeby zaawansowanej analizy danych. Do typowych obszarów zastosowań tego typu metod należą:...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublicationThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
A. Soczyńska 11
e-Learning Courses -
Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
PublicationContext-aware applications running in the intelligent space are taken into account and their execution in the service oriented environment is considered. It has been presented where and how SOA services can be utilized during their execution: to analyze current context of the application and to support execution of strictly determined actions suitable for that context. The proposed mechanism of context-aware service selection and...
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublicationA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
A universal IT system architecture for servicing, collecting, storing, processing and presenting data from wireless devices
PublicationIn the article we present a universal IT system architecture, which allows one to develop, based on mobile and multiplatform JAVA language, applications capable of working with many different wireless systems in an easy and effective way. Modular system architecture supports efficient data processing and enables convenient presentation of chosen parameters. Additionally, proposed IT system architecture provides easy adoption to...
-
Polyarmonic model of synchronous generator for analysis of autonomous power generation systems
PublicationAbstract: This paper presents the polyharmonic modelling of synchronous generator (SG) in machine variables. The simple geometry and windings physical layout has been used for inductance calculations of a salient-pole SG. The main advantage of this model is the ease of describing an autonomous power generation system (APGS) in terms of its topology and thus providing effective analysis at the static and dynamic states, both for...
-
Assessment of Environmental Loads in the Life Cycle of a Retail and Service Building
PublicationIn order to achieve the European Union’s climate and energy goals, investments are required, mainly in the areas of energy efficiency, renewable energy sources and infrastructure. Buildings are responsible for almost half of total energy consumption, and nearly 80% of them are energy and ecologically inefficient. The policy of European countries is increasingly more focused on facilities with the highest potential in the areas...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Pomiary interkonektów typu RLC na pakietach elektronicznych z wykorzystaniem magistrali mieszanej sygnałowo IEEE 1149.4
PublicationPrzedstawiono wyniki badań nad wykorzystaniem magistrali testującej mieszanej sygnałowo zgodnej ze standardem IEEE 1149.4 do pomiarów interkonektów typu RLC na pakietach układów elektronicznych. Do badań użyto pierwszych komercyjnych układów scalonych STA400 wyposażonych w magistralę, opracowanych w firmie National Semoconductor i Logic Vision. Pomiary przeprowadzano metodami proponowanymi w normie IEEE 1149.4 oraz nowoopracowanymi...
-
Automatic tuning of a resonant circuit in wireless power supply systems for biomedical sensors
PublicationIn this paper, a tuning method of a resonant circuit suited for wireless powering of miniature endoscopic capsules is presented and discussed. The method allows for an automatic tuning of the resonant frequency and matching impedance of a full wave rectifier loading the resonant circuit. Thereby, the receiver tunes so as to obtain the highest power efficiency under given conditions of transmission. A prototype receiver for wireless...
-
Module structure in Conley theory with some applications
PublicationA multiplicative structure in the cohomological versjon of Conley index is described . In the case of equivariant flows we apply the normalization procedure known from equivariant degree theory and we propose a new continuation invariant. The theory is then applied to obtain a mountain pass type theorem. Another application is a result on multiple bifurcations for some elliptic PDE.
-
International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks[Qsine])
Conferences -
Data quality assurance
e-Learning CoursesThe first lecture: 22.02.2021 at 8:15 on Teams Pierwszy wykład: 22.02.2021 o 8:15 w Teams ---------------------------------------------- Kierunek: Inżynieria danych (WETI) Studia I stopnia - inżynierskie, stacjonarne, semestr 6
-
Quality 2020 / 2021
e-Learning Courses -
DRinK: A Defense Strategy of Cooperative Wireless Terminals in a Wireless Multihoming Environment
PublicationZ uwagi na brak kontroli administracyjnej nad terminalami bezprzewodowymi w środowisku dołączenia do wielu sieci lokalnych terminal egoistyczny może dążyć do maksymalizacji własnej funkcji użyteczności, związanej z długoterminową średnią wartością uzyskiwanej przepływności. Przyjmując podejście wzorca zachowań proponuje się wbudowanie w protokół terminala nieegoistycznego odpowiedniej strategii obronnej. Strategia taka, pod nazwą...
-
Robustness in Compressed Neural Networks for Object Detection
PublicationModel compression techniques allow to significantly reduce the computational cost associated with data processing by deep neural networks with only a minor decrease in average accuracy. Simultaneously, reducing the model size may have a large effect on noisy cases or objects belonging to less frequent classes. It is a crucial problem from the perspective of the models' safety, especially for object detection in the autonomous driving...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Measurements of passive components using of an IEEE 1149.4 mixed-signal test bus
PublicationW pracy przedstawiono wyniki badań nad wykorzystaniem magistrali testującej mieszanej sygnałowo IEEE 1149.4 do pomiarów elementów pasywnych zamontowanych na pakietach elektronicznych. Do badań użyto wyposażonych w magistralę układów scalonych typu STA400. Zaprezentowano metody pomiaru rezystancji pojedynczych elementów z wykorzystaniem źródła prądowego oraz źródła VH znajdującego się w analogowych modułach ABM układu STA400. Pokazano...
-
Nowe podejście do zasad optymalizacji koegzystencji sieci standardów Bluetooth i IEEE 802.11b
PublicationNiektóre z istniejących algorytmów formowania sieci scatternet Bluetooth (BT) można usprawnić, aby poprawić efektywność współistnienia urządzeń IEEE 802.11b (Wi-Fi) z urządzeniami BT. W niniejszym opracowaniu nakreślono ideę nowego podejścia do zasad optymalizacji współistnienia sieci BT i Wi-Fi, opartą o algorytmy formowania sieci BT.
-
Scattering Theory Summer School 2022
e-Learning CoursesSummer school on Scattering Theory at Gdańsk University of Technology. 1 - 19 August online 22 - 26 August online or in Gdańsk (you choose) Participation is for free! Attractive fellowships! More info and registration: https://ftims.pg.edu.pl/en/science-app/summer-schools-2022/scattering-theory
-
A heterogenous wireless system for maritime communication - the netBaltic system architecture
PublicationIn the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...
-
Zastosowanie magistrali testującej IEEE 1149.6 do diagnostyki układów cyfrowych sprzężonych pojemnościowo
PublicationPrzedstawiono magistralę ułatwionego testowania standardu IEEE 1149.6 przeznaczoną do diagnostyki złożonych układów cyfrowych sprzężonych pojemnościowo. Zaprezentowano metody transmisji sygnałów cyfrowych o b. wysokich częstotliwościach, a następnie przedstawiono rozwiązania kluczowych elementów magistrali: komórkę brzegowego rejestru wyjściowego z nadajnikiem sygnałów testowych oraz detektor sygnałów różnicowych o sprzężeniu pojemnościowym....
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
IEEE Transactions on Signal and Information Processing over Networks
Journals -
Preliminary Results of a System-theoretic Assessment of Maritime Autonomous Surface Ships' Safety
PublicationWhile a system‐theoretic approach to the safety analysis of innovative socio‐technical systems gains a growing acceptance among academia, safety issues of Maritime Autonomous Surface Ships (MASS) remain largely unexplored. Therefore, we applied a System‐Theoretic Process Analysis to develop and analyze a preliminary model of the unmanned shipping system in order to elaborate safety recommendations for...
-
Multicast Traffic Throughput Maximization through Joint Dynamic Modulation and Coding Schemes Assignment, and Transmission Power Control in Wireless Sensor Networks
Publication -
Application of crowdfunding to video game projects financing
Publication