Search results for: LOCAL COMMUNICATION
-
Exploring ontological approach for user requirements elicitation in design of online virtual agents
PublicationEffective user requirements elicitation is a key factor for the success of software development projects. There are many qualitative and quantitative research studies that promulgate particular methods and show the application of user requirements elicitation in particular domains. However, few try to eliminate the burden of ambiguity in gathered data, naturally occurring in different groups of stakeholders. This paper deals with...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublicationIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Decentralized control of a different rated parallel UPS systems
PublicationThe paper presents the single phase uninterruptible power supply (UPS) system with galvanic separated DC-AC-DC-AC converters operating in parallel. The CAN physical layer based system of communication between converters has been developed and applied, which allow to utilize a decentralized master-slave control providing high availability factor of the whole UPS system. The control system of particular converters has been developed...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublicationIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych
PublicationIn the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...
-
Application of multi-criteria method to assess the usefulness of a hydrotechnical object for floating housing
PublicationThis publication presents the analysis of three hydrotechnical objects located in the Municipality of Gdańsk with a view of mooring Floating Houses. The assessment of the adaptation of a hydrotechnical object has been carried out by a multi- criteria method AHP and using the main criteria such as: mooring system, communication with the mainland, availability of the utility networks, waste disposal and location of the parking spaces....
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
ADAPTIVE IDENTIFICATION OF TIME-VARYING IMPULSE RESPONSE OF UNDERWATER ACOUSTIC COMMUNICATION CHANNEL
PublicationThe transmission properties of underwater acoustic communication channel can change dynamically due to the movement of acoustic system transmitter and receiver or underwater objects reflecting transmitted signal. The time-varying impulse response measurement and estimation are necessary to match the physical layer of data transmission to instantaneous channel propagation conditions. Using the correlative measurement method, impulse...
-
Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0
PublicationThis paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs
PublicationIn this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublicationIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Web-based real-time simulation system
PublicationThe paper presents the development of a simulation system composed of a real-time plant simulator with real-time controller included in the software-in-the-loop structure using web-based communication. The client-server architecture build in a TCP/IP network environment was introduced, where the server is a computing unit for real-time high temporal resolution plant simulation (and optionally also as controllers' platform) and...
-
Design and Implementation of Multi-Band Reflectarray Metasurface for 5G Millimeter Wave Coverage Enhancement
PublicationA compact low-profile multi-band millimeter-wave (mm-wave) reflectarray metasurface design is presented for coverage enhancement in 5G and beyond cellular communication. The proposed single-layer metasurface exhibits a stable reflection response under oblique incidence angles of up to 60o at 24 and 38 GHz, and transmission response at 30 GHz, effectively covering the desired 5G mm-wave frequency bands. The proposed reflectarray...
-
On symmetric extendibility of quantum states and its applications
PublicationThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Distributed Architectures for Intensive Urban Computing: A Case Study on Smart Lighting for Sustainable Cities
PublicationNew information and communication technologies have contributed to the development of the smart city concept. On a physical level, this paradigm is characterised by deploying a substantial number of different devices that can sense their surroundings and generate a large amount of data. The most typical case is image and video acquisition sensors. Recently, these types of sensors are found in abundance in urban spaces and are responsible...
-
Establishing the allosteric mechanism in CRISPR‐Cas9
PublicationAllostery is a fundamental property of proteins, which regulates biochemical information transfer between spatially distant sites. Here, we report on the critical role of molecular dynamics (MD) simulations in discovering the mechanism of allosteric communication within CRISPR‐Cas9, a leading genome editing machinery with enormous promises for medicine and biotechnology. MD revealed how allostery intervenes during at least three...
-
LLA : A New Anypath Routing Scheme Providing Long Path Lifetime in VANETs
PublicationVehicular ad-hoc networks (VANETs) are a promising solution to improve the road traffic safety, reduce the environmental pollution, or simply provide the on-board infotainment services. However, these actions are often not possible due to high mobility of vehicles causing frequent failures of VANET links. In this paper, we focus on anypath routing to improve the reliability of multihop VANET communications. In particular, the paper...
-
Visual Management as the support in building the concept of continuous improvement in the enterprise
PublicationThe following article presents one of the selected tools of the Lean Management concept – visual management. This method enables enterprises to strengthen their process of continuous improvement. Due to the support of visual management, it is possible to manage information more effectively by the managerial board and to improve communication process within in the particular company. In the first part, the author describes the concept...
-
Identification of Emotions Based on Human Facial Expressions Using a Color-Space Approach
PublicationHCI technology improves human-computer interaction. Such communication can be carried out with the use of emotions that are visible on the human face since birth. In this paper the Emotion system for detecting and recognizing facial expressions, developed in the MSc work, is presented. The system recognizes emotion from webcam video in real time. It is based on color segmentation and morphological operations. The system uses a...
-
Next generation ITS implementation aspects in 5G wireless communication network
PublicationIn the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...
-
Smart Modeling of Maritime Vessels
PublicationCurrently, the market offers many visualization tools available to graphic designers, engineers, managers and academics working on maritime environments. The practice of visualization involves making and manipulating images that convey novel phenomena and ideas. Visual communication, together with virtual reality environments, is an emerging and rapidly evolving discipline. It brings great advantage over written word or voice alone,...
-
Knowledge work and knowledge workers in knowledge-based economy - theoretical considerations
PublicationIt is often claimed that an organization is as good as people working in it and that talented workers are the driving force of an organization. To cope with the growing requirements of knowledge-based economy, organizations need a special type of workers - knowledge workers. This is especially important in organizations building their competitive advantage on innovations and the application of information and communication technologies...
-
Linking Fashion and Tourism: From Body to Clothing and Lifestyle
PublicationThere are many profound links between fashion and tourism. This chapter provides a critical reflection, mainly from a philosophical, historical, and linguistic perspective, on the dynamic relationship and parallel evolution between these two sectors. It explains how their intercon nectedness form and mirror contemporary society. This chapter classifies the connections between the two, starting with the person, her body, and the...
-
Quantum strategies for rendezvous and domination tasks on graphs with mobile agents
PublicationThis paper explores the application of quantum nonlocality, a renowned and unique phenomenon acknowledged as a valuable resource. Focusing on an alternative application, we demonstrate its quantum advantage for mobile agents engaged in specific distributed tasks without communication. The research addresses the significant challenge of rendezvous on graphs and introduces a distributed task for mobile agents grounded in the graph...
-
Wake-Up Receiver for Underwater Acoustic Communication Using in Shallow Water
PublicationA data frame transmitted over the underwater acoustic channel usually begins with a preamble. Therefore, underwater communication systems have a dedicated receiver that constantly listens to the preamble signals. A receiver that is to work effectively in shallow waters must have solutions that effectively reduce the impact of the permanently occurring multipath propagation. The article presents a solution based on complementary...
-
Application of Maximum-Length Sequences to impulse response measurement of hydroacoustic communications systems
PublicationThere is a growing interest in digital transmission of telemetry data on ultrasonic waves. The dependence of signal attenuation on squared frequency, specific to the hy-droacoustic systems, induces problems that do not exist in monochromatic, narrowband radio communications systems. For adapting the transmission parameters to current propagation conditions, a precise knowledge of instantaneous changes of channel performances is...
-
The Realization of NGN Architecture for ASON/GMPLS Network
PublicationFor the last decades huge efforts of telecommunication,Internet and media organizations have been focusingon creating standards and implementing one common networkdelivering multimedia services - Next Generation Network.One of the technologies which are very likely to beused in NGN transport layer is ASON/GMPLS optical network.The implementation of ASON/GMPLS technology usingopen source software and its results are the subject...
-
Application of wireless communication to small WECS with induction generator
PublicationWind energy conversion systems (WECS) seem to be self-evident elements of the future smart grids. Among many generator types the squirrel cage induction generator (SCIG) characterizes robustness and low cost. A full-scale power converter can perform smooth grid connection over wide speed range of multiple-stage geared SCIG. Increasing number of sensors can improve the WECS control and diagnostics but increasing number of thin wires...
-
Speech synthesis controlled by eye gazing
PublicationA method of communication based on eye gaze controlling is presented. Investigations of using gaze tracking have been carried out in various context applications. The solution proposed in the paper could be referred to as ''talking by eyes'' providing an innovative approach in the domain of speech synthesis. The application proposed is dedicated to disabled people, especially to persons in a so-called locked-in syndrome who cannot...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublicationMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublicationIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Remote command and control capabilities for data acquisition systems provided by delay-tolerant network mechanisms
PublicationThe paper presents an assessment of a remote device reconfiguration service employing a Delay Tolerant Network (DTN) mechanisms. This service has been implemented as a part of a communication appliance dedicated to marine data transfer in off-shore and open sea areas. The service has been successfully deployed and validation test have been completed. The practical use-case has been defined as remote access to the equipment operating...
-
The Crisis of Marketing Communication in the Era of Social Media
PublicationThe articles examines the widely discussed in literature the problem of marketing communication crisis resulting from the changes of the environment. These changes generate both new problems and also new solutions, e.g. social media. The practicioners are pursuing both effective and efficient solutions, in relation to the difficulties encountered while achieving market objectives via traditional methods and channels. In accordance...
-
Automatic road traffic safety management system in urban areas
PublicationTraffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce...
-
RNDM 2016 Workshop and 2nd Meeting of COST CA15127-RECODIS: Highlights from the Resilience Week in Halmstad, Sweden
PublicationLeading network resilience researchers took part in the Resilience Week on Sept. 12-15, 2016 at Halmstad University, SE by Prof. Magnus Jonsson from the Centre for Research on Embedded Systems (CERES), Halmstad University, SE, and Prof. Jacek Rak from Gdansk University of Technology, PL. It included two major events: - The 2nd Meeting of COST CA15127–RECODIS Action (Resilient Communication Services Protecting End-user Applications...
-
Utilizing online collaborative games to facilitate Agile Software Development
PublicationEffective collaboration and interaction among the development team and between the team and the customer as well as proactive attitude in initiating and implementing improvements play vital roles in the success of agile projects. The challenge is how to address these social aspects since neither the Agile Manifesto nor the Scrum Guide specify techniques that aid the human side of software development. To fill this gap, we developed...
-
Critical perspectives on media architecture: is it still possible to design projects without negatively affecting urban nighttime environments and will the future remain dynamic, bright and multi-colored?
PublicationNowadays, due to advances in electrical devices, new digital media, lighting, information and communication technologies, cities are being used 24/7. The paper discusses critical aspects of Media Architecture in the context of public spaces as well as urban nighttime environments from the perspective of a practising lighting architect. The author examines recent issues of negative design approaches and presents proposals for improving...
-
Radar data fusion in the STRADAR system
PublicationThe main task of the Polish Border Guard is protection of the country’s border which requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project and the problem of fusion of radar data in this system. The system, apart from providing communication means,...
-
COMPREHENSIVE MODELLING OF THE COST EFFECTIVNESS OF RAILWAY LINE ELECTRIFICATION
PublicationSubject of this paper is the mathematical model estimating the Economical threshold between usage of combustion engine traction and electrical traction for new and modernized railway passenger communication lines. Currently available models do not coincide with the whole complexity of the problem. The proposed model was implemented into Matlab and then validated on “Pomorska Kolej Metropolitalna” investment time-frame and its cost...
-
The role of ergonomics in architectonic and marketing operations
PublicationThe 20th century, along with the development of mass culture, brought a rapid increase of marketing communications significance. At first, this branch of art had an informational function associated with advertising operations. Nowadays, an increase of marketing specialists’ interest in influencing a human being by the space they stay in may be observed. Ergonomics plays an important role in such operations. The aim of this article...
-
On the Importance of Resilience Engineering for Networked Systems in a Changing World
PublicationResilience is featured increasingly often in the media, usually applied to society when faced, for example, with disasters such as flooding and the enormous challenges that the Covid-19 pandemic posed. There are now many resilience-related discussion groups worldwide, and some standards initiatives devoted in particular to city resilience. However, there is relatively little explicit interest in resilience engineering for communication...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
Foundations of Grid Processing Architecture for the Comcute System
PublicationFundamental system algorithms and structures implemented in the Comcute system are described and analysed in detail. Layered architecture of the system model is highlighted. System tasks of the layers are elaborated, presented and described. Operational details of communication interfaces among layers are worked out and examined. The focus is put onto implemented system components with regard to their operability and efficiency....
-
Communication Networks in the Service of the Environmental Monitoring
PublicationIn the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...
-
Square Root Raised Cosine Fractionally Delaying Nyquist Filter - Design and Performance Evaluation
PublicationIn this paper we propose a discrete-time FIR (Finite Impulse Response) filter which is applied as a square root Nyquist filter and fractional delay filter simultaneously. The filter enables to substitute for a cascade of square root Nyquist filter and fractional delay filter in one device/algorithm. The aim is to compensate for transmission delay in digital communication system. Performance of the filter as a matched filter is...
-
Device for spoofing in global positioning system
PublicationThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Inner-shell fragmentation of molecules into neutral fragments in high-Rydberg states induced by soft X-ray excitation with pulsed-field ionization
PublicationIn the present communication, we will show the results of measurements probing the production of neutral high-Rydberg fragments at the K edges of the molecules containing oxygen and nitrogen atoms. The experiments were performed at the Gas Phase beamline of the Elettra synchrotron radiation laboratory (Trieste, Italy), exploiting a combined soft X-ray excitation with pulsed-field ionization and ion time-of-flight (TOF) spectrometry...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....