Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS - Bridge of Knowledge

Search

Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS

Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS

  • Modelling of wastewater treatment plant for monitoring and control purposes by state - space wavelet networks

    Publication

    Most of industrial processes are nonlinear, not stationary, and dynamical with at least few different time scales in their internal dynamics and hardly measured states. A biological wastewater treatment plant falls into this category. The paper considers modelling such processes for monitorning and control purposes by using State - Space Wavelet Neural Networks (SSWN). The modelling method is illustrated based on bioreactors of...

    Full text to download in external service

  • Current mechanisms of IGP routing - expectations and possibilities in terms of QoS constraints

    Publication

    - Year 2005

    Od mechanizmów rutingu oczekuje się nowych możliwości z chwilą wprowadzenia wymagań QoS. W tym kontekście aktualne techniki rutingu IGP nie oferuja rozwiązań określających ścieżki gwarantujące QoS. W pracy przedstawiono propozycję rozszerzenia OSPF, które umożliwia uwzględnienie ograniczeń wynikających z QoS, gwarantując jednocześnie usługi na żądanym poziomie. To rozszerzenie zawiera zarówno liniowe jak i nieliniowe metryki. Wartości...

  • Concept description vectors and the 20 question game

    Publication

    - Year 2005

    Knowledge of properties that are applicable to a given object is a necessary prerequisite to formulate intelligent question. Concept description vectors provide simplest representation of this knowledge, storing for each object information about the values of its properties. Experiments with automatic creation of concept description vectors from various sources, including ontologies, dictionaries, encyclopedias and unstructured...

    Full text to download in external service

  • Advanced Bayesian study on inland navigational risk of remotely controlled autonomous ship

    Publication

    - ACCIDENT ANALYSIS AND PREVENTION - Year 2024

    The arise of autonomous ships has necessitated the development of new risk assessment techniques and methods. This study proposes a new framework for navigational risk assessment of remotely controlled Maritime Autonomous Surface Ships (MASS). This framework establishes a set of risk influencing factors affecting safety of navigation of a remotely-controlled MASS. Next, model parameters are defined based on the risk factors, and...

    Full text to download in external service

  • Traffic Type Influence on Performance of OSPF QoS Routing

    Feasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed On-Off model was used for self-similar traffic generation. Comparison of simulation results was presented using both relative and non-relative...

    Full text available to download

  • The Latest Advances in Wireless Communication in Aviation, Wind Turbines and Bridges

    Publication

    - Inventions - Year 2022

    Present-day technologies used in SHM (Structural Health Monitoring) systems in many implementations are based on wireless sensor networks (WSN). In the context of the continuous development of these systems, the costs of the elements that form the monitoring system are decreasing. In this situation, the challenge is to select the optimal number of sensors and the network architecture, depending on the wireless system’s other parameters...

    Full text available to download

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks

    Publication

    - Year 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Full text to download in external service

  • Comparison and Analysis of Service Selection Algorithms

    Publication

    - Year 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • Quality assessment of mobile host services in IP networks

    Publication

    W pracy opisano podstawowe protokoły wspierające komunikację stacji ruchomych w sieciach IP. Przedmiotem zainteresowania były w szczególności rozwiązania MIP oraz Calkular IP i HAWAII - wspierające mobilność w skali makro bądź mikro. Przeprowadzono badania symulacyjne wskazujące na przydatność powyższych protokołów w przypadku różnych konfiguracji sieci.

  • Digital Public Service Innovation: Framework Proposal

    Publication

    - Year 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Full text to download in external service

  • The reliability of tree and star networks

    This paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.

    Full text to download in external service

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • Annual Review of Control Robotics and Autonomous Systems

    Journals

    eISSN: 2573-5144

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Przeglad metod skanowania w bezprzewodowych sieciach likalnych standardu IEEE 802.11

    Procedura skanowania dostępnych sieci bezprzewodowych odgrywa istotną role w trakcie podłączania stacji roboczej do punktu dostępowego sieci IEEE 802.11. Ma ona także istotny wpływ na efektywność przełączania w przypadku zmiany punktu podłączenia do sieci WIFI dla węzłów mobilnych. Prace badawcze wskazują, że procedura ta, realizowana zgodnie ze standardowymi mechanizmami, może być krytycznym czynnikiem uniemożliwiającym spełnienie...

  • Energy Security of Polish Consumers in 2004-2021

    Open Research Data
    open access

    Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Full text available to download

  • Designing effective educational games - a case study of a project management game

    This paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...

    Full text available to download

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publication
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Year 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Full text to download in external service

  • Emergency Medical Service

    Journals

    ISSN: 2391-7822

  • A Biofeedback System that Uses the Game to Study Electrical Muscle Activity

    Publication

    The aim of this project was to design a system that will allow performing repetitive muscle exercises using a biofeedback device. It is supposed to enhance the motivation and attractiveness of the performed tasks thanks to an interactive game developed for mobile devices with the Android operating system. The built-in calibration mechanisms enable the users to play a game that is independent of their abilities which evens out the...

    Full text to download in external service

  • The Waiter Game: Structure and Development of an Hospitality Training Game

    Publication
    • L. Cantoni
    • N. Kalbaska

    - Year 2010

    Full text to download in external service

  • Badanie wybranych algorytmów rutingu QoS w sieciach MPLS

    W pracy dokonano przeglądu wybranych, opublikowanych algorytmów rutingu QoS dla sieci MPLS. Zrealizowano program "Ruting QoS" w środowisku MATLAB, w którym zaimplementowano trzy algorytmy: Profile-Based Routing, Kowalika-Colliera oraz Erbasa-Mathara. Przedstawiono i omówiono sieci, które zostały użyte do badań. Przebadano zaimplementowane algorytmy w przykładowych sieciach. Porównano badane algorytmy pod względem: procentu obsłużonych...

  • Multiple access in ad-hoc wireless LANs with noncooperative stations

    Publication

    - Year 2002

    A class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • Path Loss Modelling for Location Service Applications

    The aim of this paper is the path loss modeling for the radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the UMTS are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation of the distance between the mobile station (MS) and the base station (BS) is outlined. This...

  • The Maturity Level of Quality Management and Medical Service Improvement by Wielkopolska District Hospitals

    Full text to download in external service

  • How to provide fair service for V2I communications in VANETs?

    Publication

    In this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...

    Full text to download in external service

  • Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2009

    Rozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.

    Full text to download in external service

  • Safety assurance strategies for autonomous vehicles

    Publication

    - Year 2008

    Assuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...

    Full text to download in external service

  • Person Tracking in Ultra-Wide Band Hybrid Localization System Using Reduced Number of Reference Nodes

    In this article a novel method of positional data integration in an indoor hybrid localization system combining inertial navigation with radio distance measurements is presented. A point of interest is the situation when the positional data and the radio distance measurements are obtained from less than thee reference nodes and it is impossible to unambiguously localize the moving person due to undetermined set of positional equations....

    Full text available to download

  • Throughput vs. Resilience in Multi-hop Wireless Sensor Networks with Periodic Packet Traffic

    Publication

    - Year 2020

    Full text to download in external service

  • The impact of the temperament model on the behavior of an autonomous driver

    Because it is generally believed that the personality and temperament of a human driver influence his/her behavior on the road, the article presents a computational model of the temperament of an autonomous agent - a driver. First, a short review of the four ideas of Galen’s temperament in psychology is presented. Temperament traits are grouped into four other sets, one of which is chosen for implementation in the project of integration...

    Full text available to download

  • Moving object tracking algorithm evaluation in autonomous surveillance system

    Publication

    Results of evaluation of video object tracking algorithm being a part of an autonomous surveillance system are presented. The algorithm was investigated employing a set of benchmarks recorded locally. The precision of object detection, evaluated with such metrics as fragmentation, object area recall and object precision, is in focus. The experiments aimed at examining the detection quality using various object detection algorithm...

  • Marek Wójcikowski dr hab. inż.

    Marek Wójcikowski graduated in 1993 from the Department of Electronics at Gdansk University of Technology (GUT). In 2002 he obtained a doctoral degree in the field of electronics and in 2016 he obtained a habilitation at the Faculty of Electronics, Telecommunications and Informatics at GUT. From the beginning of his career he is associated with GUT: first as an assistant (years 1994-2002) and then as assistant professor (since...

  • Application of BAN Network to Increase Security in Transport Systems

    Publication

    - Year 2017

    In the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...

    Full text to download in external service

  • Architektura i mechanizmy Równoległego Internetu IPv6 QoS

    Publication
    • K. Gierłowski
    • H. Tarasiuk
    • W. Góralski
    • J. Granat
    • J. M. Batalla
    • W. Szymak
    • P. Świątek
    • S. Hanczewski
    • R. Szuman
    • M. Giertych... and 2 others

    - Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne - Year 2011

    Referat przedstawia propozycję architektury i mechanizmy Równoległego Internetu IPv6 QoS, który jest rozważany jako jeden z trzech Równoległych Internetów w Systemie IIP tworzonym w ramach projektu Inżynieria Internetu Przyszłości (IIP). Referat zawiera funkcje i mechanizmy, które umożliwią działanie sieci wirtualnych dla wybranych typów aplikacji, takich jak e-zdrowie, monitorowanie i bezpieczeństwo publiczne, zdalne nauczanie,...

  • Architektura i mechanizmy Równoległego Internetu Ipv6 QoS

    Publication
    • H. Tarasiuk
    • W. Góralski
    • J. Granat
    • M. B. Jordi
    • W. Szymak
    • S. Hanczewski
    • R. Szuman
    • M. Giertych
    • K. Gierłowski
    • M. Natkaniec
    • J. Gozdecki

    - Year 2012

    Artykuł przedstawia propozycje architektury i mechanizmy Równoległego Internetu IPv6 QoS, który jest rozważany jako jeden z trzech równoległych Internatów w systemie IIp tworzonym w ramach projektu Inzynieria Internetu Przyszłości (IIP). Artykuł zawiera funkcje i mechanizmy, które umożliwiają działanie sieci wirtualnych dla wybranych typów aplikacji, takich jak e-zdrowie, monitorowanie, bezpieczeństwo publiczne, zdalne nauczanie,...

  • Równoległy Internet IPv6 QoS: Realizacja systemu zarządzania i sygnalizacji

    Publication
    • H. Tarasiuk
    • P. Wiśniewski
    • J. Rogowski
    • J. Granat
    • W. Szymak
    • W. Latoszek
    • Ł. Ogrodowczyk
    • I. Olszewski
    • J. Gozdecki
    • K. Gierłowski

    - Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne - Year 2013

    W artykule przedstawiono realizację systemu zarządzania i sygnalizacji dla sieci IPv6 QoS. Sieć ta stanowi jeden z Równoległy Internetów w ramach Systemu IIP umożliwia-jącego wirtualizację infrastruktury sieci i zbudowanego w ramach projektu Inżynieria Internetu Przyszłości (IIP). System zarządzania siecią IPv6 QoS odpowiada za realiza-cję następujących procesów: proces tworzenia/usuwania Równoległego Internetu, wymiarowanie sieci,...

  • Embodying Intelligence in Autonomous Systems with the Use of Cognitive Psychology and Motivation Theories

    Publication

    The article discusses, on a certain level of abstraction and generalization, a coherent anthropological approach to the issue of controlling autonomous robots or agents. A contemporary idea can be based on appropriate modeling of the human mind using the available psychological knowledge. One of the main reasons for developing such projects is the lack of available and effective top-down approaches resulting from the known research...

    Full text to download in external service

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • NetBaltic System-Heterogenous Wireless Network for Maritime Communications

    In case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...

    Full text available to download

  • Prioritising national healthcare service issues from free text feedback – A computational text analysis & predictive modelling approach

    Publication

    - DECISION SUPPORT SYSTEMS - Year 2024

    Patient experience surveys have become a key source of evidence for supporting decision-making and continuous quality improvement within healthcare services. To harness free-text feedback collected as part of these surveys for additional insights, text analytics methods are increasingly employed when the data collected is not amenable to traditional qualitative analysis due to volume. However, while text analytics techniques offer...

    Full text available to download

  • Next generation ITS implementation aspects in 5G wireless communication network

    Publication

    - Year 2017

    In the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...

    Full text to download in external service

  • Security and Defence Quarterly

    Journals

    ISSN: 2300-8741 , eISSN: 2544-994X

  • Bogdan Pankiewicz dr hab. inż.

    Bogdan Pankiewicz graduated in 1993 from the Department of Electronics at Gdansk University of Technology (GUT) and in 2002 he obtained a doctoral degree in the field of electronics at the Faculty of Electronics, Telecommunications and Informatics at GUT. From the beginning of his career he is associated with GUT: first as an assistant (years 1994-2002) and then as assistant professor (since 2002) at the Faculty of Electronics,...

  • 11 Triennale Małych Form Malarskich

    Publication

    - Year 2019

    Triennale Małych Form Malarskich to cykliczny ogólnopolski konkurs zwieńczony wystawą, prezentujący poszukiwania artystów w dziedzinie kameralnej twórczości malarskiej we wszystkich jej odmianach. Organizatorzy pozostawiają malarzom pełną swobodę w wyborze techniki i tematu. Jedyne ograniczenie stanowią wymiary pracy – jej format nie może przekraczać 600 cm2. „Ograniczenie formatowe stawia przed artystami zadanie poszukania nowych...

  • Marine autonomous surface ship - control system configuration

    This paper addresses the problem of marine autonomous surface ship (MASS) control. The contribution of the paper is the development of a control system configuration, done assuming fully autonomous MASS operation under distinct operational conditions. The overview of hardware and software selection is included.

    Full text available to download

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Full text available to download