Search results for: distributed systems
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublicationNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Comparative study on the effectiveness of various types of road traffic intensity detectors
PublicationVehicle detection and speed measurements are crucial tasks in traffic monitoring systems. In this work, we focus on several types of electronic sensors, operating on different physical principles in order to compare their effectiveness in real traffic conditions. Commercial solutions are based on road tubes, microwave sensors, LiDARs, and video cameras. Distributed traffic monitoring systems require a high number of monitoring...
-
The particle method for simulation of self-organization phenomena
PublicationThe aim of the work was to design, implement, and use, in a number of experiments, an abstract software environment (an artificial world)suitable for modelling systems consisting of many moving and interactingobjects distributed in space. The environment, named DigiHive, is directed towards modeling of complex systems manifested by processes of self-organization, self-reproduction and self modifications. The environment is mainly...
-
Risks associated with the transportation of hazardous materials on public roads
PublicationA significant proportion of the transport of hazardous materials is carried out on public roads. Therefore, the safety of such transport is becoming increasingly important. Every catastrophe involving hazardous materials has a negative impact on direct road users and the surrounding environment, becauses its range is mostly not local. It follows that in the event of such catastrophe, its effects should be minimized. This is possible...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Towards solving heterogeneous fleet vehicle routing problem with time windows and additional constraints: real use case study
PublicationIn advanced logistic systems, there is a need for a comprehensive optimization of the transport of goods, which would reduce costs. During past decades, several theoretical and practical approaches to solve vehicle routing problems (VRP) were proposed. The problem of optimal fleet management is often transformed to discrete optimization problem that relies on determining the most economical transport routes for a number of vehicles...
-
Algorytmy samostabilizujące w sieciach o wybranych topologiach
PublicationIdea algorytmów samostabilizujących została zapoczątkowana przez E. Dijkstrę artykułem pt. „Self-stabilizing systems in spite of distributed control” (Communications of the ACM, 1974). W rozprawie został położony nacisk na algorytmy samostabilizujące działające w sieciach o pewnych specyficznych topologiach, jak na przykład w grafach maksymalnych zewnętrznie planarnych, iloczynach kartezjańskich tych grafów ze ścieżkami i w drzewach. Wykorzystując...
-
Jerzy Proficz dr hab. inż.
PeopleJerzy Proficz, Ph.D. is the director of the Centre of Informatics – Tricity Academic Supercomputer & networK (CI TASK) at Gdansk University of Technology, Poland. He earned his Ph.D. (2012) in HPC (High Performance Computing) in the subject of supercomputer resource provisioning and management for on-line data processing D.Sc. (2022) in the discipline: Information and Communication Technology. Author and co-author of over 50...
-
Relevance of the EU Structural Funds’ Allocation to the Needs of Combating Air Pollution in Poland. Analysis of the Operational Programmes of Regions Threatened With Critical Air Pollution from Distributed Energy Sources
PublicationRecent years, the European Environmental Agency, has been reporting air quality parameters in Poland, as the poorest among all the EU countries. Despite of adoption of the EU legislation on energy efficiency and energy performance of buildings, existing legal solutions occur insufficient in reducing air pollution in Polish regions. Lack of an effective schemes supporting complex thermal renovation of buildings, exchange of inefficient...
-
Evaluation of multimedia applications in a cluster oriented environment
PublicationIn the age of Information and Communication Technology (ICT), Web and the Internet have changed significantly the way applications are developed, deployed and used. One of recent trends is modern design of web-applications based on SOA. This process is based on the composition of existing web services into a single scenario from the point of view of a particular user or client. This allows IT companies to shorten product time-to-market....
-
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublicationAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
Determination of Mechanical Energy Loss in Steady Flow by Means of Dissipation Power
PublicationWhen systems of simple geometry like pipes or regular channels are considered, the mechan- ical energy loss of the fluid flow can be expressed by local and longitudinal empirical energy loss coefficients. However, in the case of large spatially distributed objects, there are no simple approaches to this task. In practice, general recommendations addressing different types of objects are used, but they usually provide very coarse...
-
Optimization of parallel implementation of UNRES package for coarse‐grained simulations to treat large proteins
PublicationWe report major algorithmic improvements of the UNRES package for physics-based coarse-grained simulations of proteins. These include (i) introduction of interaction lists to optimize computations, (ii) transforming the inertia matrix to a pentadiagonal form to reduce computing and memory requirements, (iii) removing explicit angles and dihedral angles from energy expressions and recoding the most time-consuming energy/force terms...
-
Deep learning in the fog
PublicationIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Oprogramowanie Systemów Elektronicznych 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Oprogramowanie Systemów Elektronicznych 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Infosystemy Elektroniczne 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Infosystemy Elektroniczne 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublicationThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Distortion of speech signals in the listening area: its mechanism and measurements
PublicationThe paper deals with a problem of the influence of the number and distribution of loudspeakers in speech reinforcement systems on the quality of publicly addressed voice messages, namely on speech intelligibility in the listening area. Linear superposition of time-shifted broadband waves of a same form and slightly different magnitudes that reach a listener from numerous coherent sources, is accompanied by interference effects...
-
Modelling and simulation of GPU processing in the MERPSYS environment
PublicationIn this work, we evaluate an analytical GPU performance model based on Little's law, that expresses the kernel execution time in terms of latency bound, throughput bound, and achieved occupancy. We then combine it with the results of several research papers, introduce equations for data transfer time estimation, and finally incorporate it into the MERPSYS framework, which is a general-purpose simulator for parallel and distributed...
-
Axial-Flux Permanent-Magnet Dual-Rotor Generator for a Counter-Rotating Wind Turbine
PublicationCoaxial counter-rotating propellers have been widely applied in ships and helicopters for improving the propulsion efficiency and offsetting system reactive torques. Lately, the counter-rotating concept has been introduced into the wind turbine design. Distributed wind power generation systems often require a novel approach in generator design. In this paper, prototype development of axial-flux generator with a counter-rotating...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublicationWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
Zero-range potentials for Dirac particles: Bound-state problems
PublicationA model in which a massive Dirac particle in $\mathbb{R}^{3}$ is bound by $N\geqslant1$ spatially distributed zero-range potentials is presented. Interactions between the particle and the potentials are modeled by subjecting a particle's bispinor wave function to certain limiting conditions at the potential centers. Each of these conditions is parametrized by a $2\times2$ Hermitian matrix (or, equivalently, a real scalar and a...
-
Dyskretno-ciągła metoda modelowania układów dynamicznych
PublicationW artykule przedstawiono oryginalną metodę modelowania układów dyskretno-ciągłych. Metoda polega na dyskretyzowaniu układu trójwymiarowego jedynie w dwóch wybranych kierunkach. W trzecim z kierunków układ pozostaje ciągły. Otrzymany w ten sposób model jest modelem dyskretno-ciągłym. Opisany jest za pomocą równań różniczkowych cząstkowych. Ogólne równania różnicowe układu dyskretnego otrzymano, wykorzystując metodę sztywnych elementów...
-
Rapid Multi-Criterial Antenna Optimization by Means of Pareto Front Triangulation and Interpolative Design Predictors
PublicationModern antenna systems are designed to meet stringent performance requirements pertinent to both their electrical and field properties. The objectives typically stay in conflict with each other. As the simultaneous improvement of all performance parameters is rarely possible, compromise solutions have to be sought. The most comprehensive information about available design trade-offs can be obtained through multi-objective optimization...
-
Audio Content and Crowdsourcing: A Subjective Quality Evaluation of Radio Programs Streamed Online
PublicationRadio broadcasting has been present in our lives for over 100 years. The transmission of speech and music signals accompanies us from an early age. Broadcasts provide the latest information from home and abroad. They also shape musical tastes and allow many artists to share their creativity. Modern distribution involves transmission over a number of terrestrial systems. The most popular are analog FM (Frequency Modulation) and...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublicationWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationProblem rendezvous został dogłębnie zbadany, zarówno dla agendów anonimowych jak i poetykietowanych. zbadano też problem eksploracji grafu za pomocą agentów mobilnych.
-
Time versus space trade-offs for randezvous in trees
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
A family of new generation miniaturized impedance analyzers for technical object diagnostics
PublicationThe paper presents the family of three analyzers allowing to measure impedance in range of 10 ohm<|Zx|<10 Gohm in a wide frequency range from 10 mHz up to 100 kHz. The most important features of the analyzers family are: miniaturization, low power consumption, low production cost, telemetric controlling and the use of impedance measurement method based on digital signal processing DSP. The miniaturization and other above mentioned...
-
Force transfer and stress distribution in short cantilever deep beams loaded throughout the depth with a various reinforcement
PublicationDeep beams used as the main reinforced concrete structural elements which taking over the load and stiffening construction are often found in high-rise buildings. The architecture of these buildings is sometimes sophisticated and varied, arouse the admiration of the majority of recipients, and thus causing an engineering challenge to correctly design the structural system and force transfer. In such structures is important to shape...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublicationWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Inline Microwave Filters With N+1 Transmission Zeros Generated by Frequency-Variant Couplings: Coupling-Matrix-Based Synthesis and Design
PublicationA general coupling-matrix-based synthesis methodology for inline Nth-order microwave bandpass filters (BPFs) with frequency-variant reactive-type couplings that generate N+1 transmission zeros (TZs) is presented in this brief. The proposed approach exploits the formulation of the synthesis problem as three inverse nonlinear eigenvalue problems (INEVPs) so that the coupling matrix is built from their sets of eigenvalues. For this...
-
Using LSTM networks to predict engine condition on large scale data processing framework
PublicationAs the Internet of Things technology is developing rapidly, companies have an ability to observe the health of engine components and constructed systems through collecting signals from sensors. According to output of IoT sensors, companies can build systems to predict the conditions of components. Practically the components are required to be maintained or replaced before the end of life in performing their assigned task. Predicting...
-
Człowiek zanurzony w rzeczywistości wirtualnej na przykładzie Laboratorium Zanurzonej Wizualizacji Przestrzennej
PublicationArtykuł opisuje Laboratorium Zanurzonej Wizualizacji Przestrzennej (LZWP), które umożliwia swobodną podróż w czasie i przestrzeni. Jego podstawowym wyposażeniem jest jaskinia rzeczywistości wirtualnej, czyli pomieszczenie o ścianach, suficie i podłodze stanowiących ekrany projekcyjne, wyświetlające generowane komputerowo obrazy 3D, tworzące spójny widok jednej sceny. Człowiek znajdujący się w takiej jaskini jest zatem zanurzony...
-
Andrzej Chybicki dr inż.
PeopleA graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...
-
The Suzuki model of the multipath fading channel
Open Research DataThe dataset contains the results of simulations that are part of the research on modelling the multipath fading in the communication channel. The Suzuki fading envelope is generated using the Monte-Carlo simulation (MCS) in the LabVIEW programming environment.
-
Visualization of events using various kinds of synchronized data for the Border Guard
PublicationSTRADAR project is dedicated to streaming real-time data in a distributed dispatcher and teleinfor-mation system of the Border Guard. The Events Visualization Post is a software designed for simultaneous visualization of data of different types in BG headquarters. The software allows the operator to visualize files, images, SMS, SDS, video, audio, and current or archival data on naval situation on digital maps. All the visualized...
-
Dariusz Mikielewicz prof. dr hab. inż.
PeopleProfessor Dariusz Mikielewicz – born on February 6, 1967. in Gdansk. Here in 1974 he enrolled first to the Elementary School No. 17, and then in the Grammar School No. 5, named after Stefan Żeromski in Gdansk-Oliwa. After graduating from the Secondary School, with honors, in 1985 he successfully passed the entrance exams to the Faculty of Mechanical Engineering of Technical University of Gdansk, where he graduated with a very good...
-
On the Possibilities of Decreasing Power Loss in Large Tilting Pad Thrust Bearings
PublicationJournal Menu About this Journal Abstracting and Indexing Aims and Scope Article Processing Charges Articles in Press Author Guidelines Bibliographic Information Citations to this Journal Contact Information Editorial Board Editorial Workflow Free eTOC Alerts Publication Ethics Submit a Manuscript Table of Contents Abstract Full-Text PDF Full-Text HTML...
-
Marek Czachor prof. dr hab.
People -
Fibroadenoma, NOS - Female, 24 - Tissue image [6070730010412791]
Open Research DataThis is the histopathological image of BREAST tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
The photocatalytic activity of MoS2 electrodes under sunlight illumination
Open Research DataThis dataset contains the results of the photocatalytic activities of the MoS2 and MoS2 modified by SnO2 were assessed through the photocatalytic reduction of Cr6+ under the sunlight illumination. In the experiment, 20 mg of the catalyst was distributed in the K2Cr2O7 aqueous solution (50 mL, 100 mg•L-1). The mixed solution was stirred for 30 min to...
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublicationProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Drawing maps with advice
PublicationRozważamy następujący problem obliczeniowy. Agent zostaje umieszczony w wierzchołku nieznanego mu grafu. Wierzchołki grafu są nierozróżnialne, natomiast krawędzie posiadają numery portów. Zadaniem agenta jest wyznaczenie mapy, tzn. obliczenie izomorficznej kopii grafu, lub obliczenie dowolnego drzewa spinającego grafu. Bez dodatkowej informacji zadań tych nie można wykonać. W artykule wyznaczamy oszacowania na minimalną liczbę...
-
A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints
PublicationThe paper proposes a model, design, and implementation of an efficient multithreaded engine for execution of distributed service-based workflows with data streaming defined on a per task basis. The implementation takes into account capacity constraints of the servers on which services are installed and the workflow data footprint if needed. Furthermore, it also considers storage space of the workflow execution engine and its cost....