Filters
total: 11738
-
Catalog
- Publications 6398 available results
- Journals 756 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 292 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 273 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3520 available results
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Sensors and Sensor’s Fusion in Autonomous Vehicles
PublicationAutonomous vehicle navigation has been at the center of several major developments, both in civilian and defense applications. New technologies such as multisensory data fusion, big data processing, and deep learning are changing the quality of areas of applications, improving the sensors and systems used. New ideas such as 3D radar, 3D sonar, LiDAR, and others are based on autonomous vehicle revolutionary development. The Special...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublicationIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
Pattern matching localization in ZigBee wireless sensor networks.
PublicationLokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.
-
Distributed Trust Management Model for Wireless Sensor Networks
Publication -
Localization in wireless sensor networks based on zigbee platform
PublicationW artykule porównano dwie różne metody lokalizacji w sieciach sensorów bezprzewodowych. Jedną z metod jest implementacja sprzętowa algorytmu w układzie nadawczo odbiorczym CC2431. Drugą metodą jest implementacja programowa. Wyniki testów przeprowadzonych na otwartym terenie oraz w pomieszczeniach zamkniętych zostały przedstawione i porównane w pracy.
-
Design of Weather Disruption-Tolerant Wireless Mesh Networks
PublicationZ uwagi na wysoki koszt realizacji sieci teleinformatycznych wykorzystujących przewodową transmisję światłowodową, bezprzewodowe sieci kratowe (WMN) oferujące transmisję rzędu 1-10 Gb/s (przy wykorzystaniu pasma millimeter-wave - 71-86 GHz), wydają się być obiecującą alternatywą dla przewodowych sieci MAN. Jednakże z uwagi na właściwości transmisji bezprzewodowej w oparciu o łącza wysokiej częstotliwości, łącza te są bardzo wrażliwe...
-
Design of Optical Wireless Networks with Fair Traffic Flows
Publication -
Algorithms of fast service restoration in survivable multilayer networks
PublicationGłównym celem rozprawy jest zaproponowanie nowych modeli/algorytmów doboru tras zapewniających przeżywalność usług w sieciach IP-MPLS/WDM poprzez zastosowanie wyznaczonych zawczasu ścieżek zabezpieczających. Zakres pracy obejmuje: dokonanie przeglądu mechanizmów transmisji informacji w warstwowych sieciach teleinformatycznych IP-MPLS/WDM; szczegółowy opis sposobów zapewniania przeżywalności usług; zaproponowanie nowych metod doboru...
-
Inductive Bifilar Coil Based Wireless Charging System for Autonomous Electric Boat
Publication -
Jacek Stefański prof. dr hab. inż.
PeopleJJacek Stefański received M.Sc., Ph.D. and D.Sc. degrees in telecommunications engineering from Gdansk University of Technology (GUT), Poland, in 1993, 2000 and 2012, respectively. Awarded title of Professor by the President of Poland in 2020. Currently, he works as a professor at the Department of Radio Communication Systems and Networks (DRCSN) in GUT. From 2005 to 2009, he worked as an assistant professor in the National Institute...
-
Information Systems Security 2023
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublicationThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
Mobility Oriented Development (MOD): Public-Private Partnership in Urban Parking & Traffic Management with the Use of Autonomous Automobiles, Car-Sharing, Ridesharing Modes of Transport & Mobility as a Service (MaaS)
PublicationThe focus of the following research are relations between mobility technologies and metropolitan (urban and suburban) spatial structures. In this paper the author discusses various urban modes of transport (automobile, mass transit) in the context of emerging technical (autonomous vehicles, self-driving cars and driverless shuttles) and organizational (carpooling, ridesharing, car-sharing, on-demand mobility) solutions for " mobility...
-
The Poland-United States Security Relations in the light of Asymmetry Theory
Publication -
Ad Hoc & Sensor Wireless Networks
Journals -
International Journal of Wireless Information Networks
Journals -
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publication -
Traffic Type Influence on QoS Network Performance of Streaming Traffic Class
PublicationFeasibility study on QoS routing proved that the traffic type influence the network performance. The performance is defined here as a number of packets serviced by the network. In the paper additional element - buffers lengths used in service system was verified in terms of dependencies with routing performance. We present results obtained by simulation for many simulation scenarios. Analysis was done for two different network...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Cross-layer integration of network mechanisms for increasing efficiency of multimedia session support in IEEE 802.11s environment
PublicationWith an IEEE 802.11 wireless networks operating in Point-to-Multipoint mode being the most popular WLAN access technology employed today, it can be expected that a Wireless Mesh Network (WMN) based on the technology can provide significant advantages for such network systems. The IEEE 802.11s standard amendment provides the comprehensive set of mechanisms required to implement and deploy a WMN utilizing this widely popular technology....
-
Two- and three-dimensional elastic networks with rigid junctions: modeling within the theory of micropolar shells and solids
PublicationFor two- and three-dimensional elastic structures made of families of flexible elastic fibers undergoing finite deformations, we propose homogenized models within the micropolar elasticity. Here we restrict ourselves to networks with rigid connections between fibers. In other words, we assume that the fibers keep their orthogonality during deformation. Starting from a fiber as the basic structured element modeled by the Cosserat...
-
Distributed infrastructure of self-organizing service servers
PublicationThis paper presents an idea of creating distributed system consisting of autonomous self-organizing service providers. It shows a real implemented system allowing for dynamic service search without interaction with client based on the inter-servers communication. Moreover presented system can be easily enriched with new elements without the need for restarting already existing servers.
-
Inverse Nonlinear Eigenvalue Problem Framework for the Synthesis of Coupled-Resonator Filters With Nonresonant Nodes and Arbitrary Frequency-Variant Reactive Couplings
PublicationA novel, general circuit-level description of coupledresonator microwave filters is introduced in this article. Unlike well-established coupling-matrix models based on frequency-invariant couplings or linear frequency-variant couplings (LFVCs), a model with arbitrary reactive frequencyvariant coupling (AFVC) networks is proposed. The engineered formulation is more general than prior-art ones—with the only restriction that the coupling...
-
International Journal of Security and Networks
Journals -
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Simulation model for evaluation of QOS dynamic routing
PublicationCurrent informational networks use a large variety of technologies to support data exchange. Most of them are focused on IP protocol and include mechanisms which by definition should supply demanded QoS. One of those mechanisms is efficient path calculation - routing. Traffic offered to the network can change very rapidly in short term. Routing should support such traffic changes and all the time calculate valid paths in terms...
-
Performance evaluation of IEEE 802.11 fast BSS transition algorithms
PublicationSimultation experiments are conducted to answer the questions if multimedia services can be properly supported in IEEE 802.11r networks. The authors prove that handover delay can be reduced to 22 ms in the average case.
-
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublicationPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
Protecting Wireless Mesh Networks Against Adverse Weather Conditions
Publication -
Automatic singing quality recognition employing artificial neural networks
PublicationCelem artykułu jest udowodnienie możliwości automatycznej oceny jakości technicznej głosów śpiewaczych. Pokrótce zaprezentowano w nim stworzoną bazę danych głosów śpiewaczych oraz zaimplementowane parametry. Przy pomocy sztucznych sieci neuronowych zaprojektowano system decyzyjny, który oceniono w pięciostopniowej skali jakość techniczną głosu. Przy pomocy metod statystycznych udowodniono, że wyniki generowane przez ten system...
-
Ruting QOS w sieciach NGN
PublicationZnaczna różnorodność usług dostępnych w dzisiejszych sieciach pakietowych wymaga architektur wspierających różnicowanie tych usług, przy jednoczesnym gwarantowaniu jakości usług (QoS). Zapewnienie QoS osiągnąć można jedynie poprzez zastosowanie efektywnych mechanizmów zarówno na poziomie obsługi pakietów jak i strumieni. Jednym z bardzo istotnych mechanizmów na poziomie pakietów jest wyznaczanie dróg połączeniowych. Jest to proces...
-
Efficient methods for radio location service in cellular communication networks
PublicationW artykule przedstawiono dwie oryginalne metody lokalizowania terminala ruchomego w sieciach komórkowych trzeciej generacji. Metody te podczas estymacji położenia terminala nie wymagają znajomości różnicy czasów w synchronizacji poszczególnych stacji bazowych, przez co są tanie w implementacji. Przedstawiono wyniki badań symulacyjnych zaproponowanych metod.
-
Fast Service Recovery under Shared Protection in WDM Networks
PublicationNiniejszy artykuł dotyczy zagadnienia doboru tras przeżywalnych dla ruchu statycznego w zorientowanych połączeniowo sieciach WDM, przy wykorzystaniu idei współdzielonych ścieżek zabezpieczających. Pierwsza część jest poświęcona warunkom koniecznym oraz charakterystykom typowej metody współdzielenia zasobów ścieżek zabezpieczających, ze szczególnym uwzględnieniem uzyskiwanej średniej długości ścieżek zabezpieczających oraz wartości...
-
Performance Analysis of Multicast Video Streaming in IEEE 802.11 b/g/n Testbed Environment
PublicationThe aim of the work is to analyse capabilities and limitations of different IEEE 802.11 technologies (IEEE 802.11 b/g/n), utilized for both multicast and unicast video streaming transmissions directed to mobile devices. Our preliminary research showed that results obtained with currently popular simulation tools can be drastically different than these possible in real-world environment, so, in order to correctly evaluate performance...
-
Computer Networks EN 2022
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
Computer Networks EN 2023
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS
PublicationCelem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Bringing Common Sense to WordNet with a Word Game
PublicationWe present a tool for common sense knowledge acquisition in form of a twenty questions game. The described approach uses WordNet dictionary, which rich taxonomy allows to keep cognitive economy and accelerate knowledge propagation, although sometimes inferences made on hierarchical relations result in noise. We extend the dictionary with common sense assertions acquired during the games played with humans. The facts added to the...
-
Information Systems Security 2023/2024
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublicationThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...