Filters
total: 11738
-
Catalog
- Publications 6398 available results
- Journals 756 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 292 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 273 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3520 available results
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Dynamic risk assessment in autonomous vehicles motion planning
PublicationArguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
An integrated framework for security protocol analysis
PublicationAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
AUTONOMOUS ROBOTS
Journals -
Game Studies
Journals -
Design of a Multidomain IMS/NGN Service Stratum
PublicationThe paper continues our research concerning the Next Generation Network (NGN), which is standardized for delivering multimedia services with strict quality and includes elements of the IP Multimedia Subsystem (IMS). A design algorithm for a multidomain IMS/NGN service stratum is proposed, which calculates the necessary CSCF servers CPU message processing times and link bandwidths with respect to the given maximum values of mean...
-
Identification of Public Service Logic (PSL) and Public Service Motivation (PSM) elements in Open Government Data (OGD) initiatives
PublicationWhile previous research on Open Government Data (OGD) has primarily focused on reuse and adoption, this study aims to explore the implications of the Public Service Logic (PSL) and Public Service Motivation (PSM) dimensions in the context of OGD initiatives. This study is contextualized in Tanzania wherein the OGD initiatives are at an evolving stage. For the present study, the perspectives of the 15 public officials involved in...
-
Radio Link Measurement Methodology for Location Service Applications
PublicationThe aim of this paper is the methodology of measurements executed in a radio link for the realization of radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the universal mobile telecommunications system (UMTS) are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation...
-
Standardy IEEE wspierające koncepcje Ethernet End-to-End
PublicationW pracy wykazano, że ostatnie prace komitetów IEEE 802.1 i 802.3 znacznie przybliżyły realizację koncepcji Ethernet End-to-End. Wskazano, że o ile problemy skalowalności zostały w dużej mierze rozwiązane, o tyle inne zagadnienia związane m.in. z niezawodnością i zarządzaniem wymagają jeszcze dużego wysiłku standaryzacyjnego. Jednakże niektóre przedstawione w pracy propozycje IEEE są już na ukończeniu i możliwość realizacji sieci...
-
Wyznaczanie wytrzymałości betonu na podstawie funkcji dojrzałości wg amerykańskiej normy ASTM C1074-11
PublicationArtykuł poświęcono wyznaczaniu wytrzymałości betonu na podstawie funkcji dojrzałości wg normy ASTM C1074-11 (ang. Maturity Method). Metoda bazuje na rejestracji zmian tem - peratury w trakcie hydratacji dojrzewającego betonu. Wartykule zaprezentowano procedurę badawczą służącą wyznaczeniu funk - cji dojrzałości dla wybranej mieszanki betonowej oraz zależności wytrzymałość-dojrzałość. Celem badań jest wyznaczanie zmian w czasie...
-
Postępy w rozwoju standardu IEEE 802.11 i jego zastosowań Część III: Mechanizmy zarządzania w systemach IEEE 802.11
PublicationPrzedstawiony we wczesniejszych częściach cyklu rozwój mechanizmów transmisji danych wykorzystujących w standardzie IEEE 802.11 przyczynił się do ogromnej popularyzacji opartej na nim technik WiFi. Wobec coraz większego zainteresowania praktycznym wykorzystaniem tej techniki w systemach dostępowych, początkowo powolny rozwój mechanizmów zarządzania przeznaczonych do obsługi sieci standardu IEEE 802.11, uległ gwałtownemu przyspieszeniu...
-
Adjusting Game Difficulty by Recreating Behavioral Trees of Human Player Actions
PublicationThis paper presents a proposition of a method for adjusting game difficulty to the current level of player's skills in one-on-one games. The method is based on recognition of human player's actions and recording of those actions in the form of behavioral trees. Such trees are later used to drive behaviors of computer-controlled opponents so that human player has beat hit own strategy and improve on it, to win subsequent games....
-
New challenges for Internet IP QoS architectures supporting multimedia transfer.
PublicationZaprezentowano zarówno ''ograniczenia'' wprowadzone przez współczesny Internet, jak też wymagania jakościowe związane z przekazami multimedialnymi. Opisano nowe propozycje architektur QoS obejmujące modele tzw. usług zintegrowanych (IntServ) oraz zróżnicowanych (DiffServ).
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Embodying Intelligence in Autonomous and Robotic Systems with the Use of Cognitive Psychology and Motivation Theories
PublicationThe article discusses, on a certain level of abstraction and generalization, a coherent anthropological approach to the issue of controlling autonomous robots or agents. A contemporary idea can be based on appropriate modeling of the human mind using the available psychological knowledge. One of the main reasons for developing such projects is the lack of available and effective top-down approaches resulting from the known research...
-
Reliable Anycast and Unicast Routing: Protection against Attacks
PublicationObecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...
-
Ad Hoc WLAN with Selfish, Secretive, and Short-Sighted Stations
PublicationPrzy pomocy aparatu matematycznego tzw. gier na wyniszczenie przeanalizowano równowagowe strategie żądań transferu sesji danych w sieciach lokalnych z dostępem do medium metodą aukcji. Zwrócono uwagę na zjawisko dołączania do sesji ruchu pojawiającego się już po procedurze aukcji i pokazano, w jaki sposób wpływa to na strategie stacji.
-
Analysis of network infrastructure and QoS requirements for modern remote learning systems.
PublicationW referacie przedstawiono różne modele zdalnego nauczania. Podjęto próbę oceny wymagań nakładanych na infrastrukturę sieci. Ponadto przedstawiono mechanizmy QoS spotykane w sieciach teleinformatycznych oraz dokonano oceny możliwości ich współpracy w systemach edukacji zdalnej
-
A novel class-based protection algorithm providing fast service recovery in IP/WDM networks
PublicationW artykule rozważa się warstwową strukturę sieci IP-MPLS/WDM. Węzły sieci mają funkcjonalność zarówno optycznych krotnic transferowych (OXC), jak i routerów IP. Dowolne dwa routery IP mogą być ze sobą połączone poprzez logiczne łącze IP realizowane przez ścieżkę optyczną WDM. Zaproponowano metodę klasową doboru tras przeżywalnych zapewniającą szybkie odtwarzanie uszkodzonych strumieni ruchu zarówno w warstwie WDM jak i IP-MPLS....
-
Simulation of the IT Service and Project Management Environment
PublicationThe authors of this paper present a simulation of the socio-technical system in which teams of students – regarded as low-maturity organizations – were given a task to utilize the (relatively) mature technologies that support IT project and service management. The experiment consisted of the following phases: teams formation, introduction to technologies used during the simulation, performing a set of reactive and proactive service...
-
The concept of anti-collision system of autonomous surface vehicle
PublicationThe use of unmanned vehicles in various fields of science and the economy is becoming more common. An extremely important aspect of creating this type of solution is to provide autonomous vehicle navigation, which does not require interference of the human factor or in which it is limited to a minimum. This article discusses the concept of autonomous anti-collision system of unmanned surface vehicle. It proposed a sensor system...
-
Accurate PPCC-Based DoA Estimation Using Multiple Calibration Planes for WSN Nodes Equipped with ESPAR Antennas
PublicationIn this paper, we have introduced a new direction-of-arrival (DoA) estimation method, which relies on received signal strength (RSS) values measured at the output port of electronically steerable parasitic array radiator (ESPAR) antenna and uses the power pattern cross-correlation (PPCC) estimator. In the method, we have successfully incorporated measurements of ESPAR antenna's radiation patterns performed at multiple calibration...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublicationProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Security aspects in functional safety analysis
PublicationA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Krzysztof Gierłowski dr inż.
PeopleKrzysztof Gierłowski received his Ph.D. degree in telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 2018. He is author or co-author of more than 80 scientific papers and reviewer for a number of conferences and journals. Krzysztof Gierłowski took part in major IT-oriented projects, including: EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 Infrastructural...
-
A Method for Underwater Wireless Data Transmission in a Hydroacoustic Channel under NLOS Conditions
PublicationWireless data transmission in the hydroacoustic channel under non-line-of-sight (NLOS) propagation conditions, for example, during a wreck penetration, is difficult to implement reliably. This is mostly due to the multipath propagation, which causes a reduction in the quality of data reception. Therefore, in this work an attempt has been made to develop a reliable method of wireless underwater communication test it under the NLOS...
-
Resilience and Security in Software Defined Networking
PublicationThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Problems of varistor quality assessment during exploitation
PublicationVaristors are commonly used elements which protect power supply networks against high-voltage surges or lightning. Therefore, quality and endurance of these elements is important to avoid losses when an expensive laboratory equipment would not be protected from random overvoltages. Additionally, excessive leakage currents generate serious costs due to high energy consumption. The paper presents shortly properties of varistors that...
-
Theory of Organisation and Management and Systems Theory
e-Learning CoursesDear Students, Our classes on Theory of Orgnisation and Management (15 h lecture, 15 hours excercises) and Systems Theory (15 hours lecture) will take place in MSTeams each Wednesday since 21st of February 2024 at 9:15-12:00 am at link https://teams.microsoft.com/l/meetup-join/19%3ameeting_YzY1NTRiOGEtYTQ3Yi00ZmFlLWI3YTYtYjhiNjBhZjZjOGI5%40thread.v2/0?context=%7b%22Tid%22%3a%22b2b950ec-1ee3-4d9d-ac5e-4dd9db5e0b73%22%2c%22Oid%22%3a%2233f97504-8676-4b87-96ad-a9394d16b3b2%22%7d Join...
-
Spectroscopic and wireless sensor of hematocrit level
PublicationAn optical method for hematocrit measurement has been presented. the sensor, designed and developed by authors, consists of spectroscopic set-up controlled by a microcontroller. measurement results are sent via wireless module. experiment has confirmed the ability of the sensor to determine the hematocrit with appropriate measurementaccuracy.
-
Students and Young Professionals of the IEEE IES in the Time of Information, Automation, and Energy Transformation [Students and Young Professionals News]
PublicationReports on IEEE IES Society student activities in year 2021.
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publication -
Theory of Elasticity and Plasticity
e-Learning CoursesThis course discusses the general theory of elastic and plastic material behavior of solids.
-
Realizacja łącza sygnalizacyjnego SS7 w sieci IP QoS
PublicationWykorzystanie technologii IP dla realizacji połączeń między sieciami PSTN/ISDN wymaga obsługi sygnalizacji SS7 ISUP. Jednym z rozwiązań tego problemu jest utworzenie łącza sygnalizacyjnego na platformie IP dla połączenia punktów sygnalizacyjnych łączonych sieci. W niniejszej pracy opisano pojęcie łącza sygnalizacyjnego SS7, jego ekwiwalent w sieci IP oraz propozycję rozwiązania programowego realizującego takie łącze w sieci IP...
-
Energy Security of Polish Consumers in 2004-2021
PublicationTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Protection in elastic optical networks
PublicationIn this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Data Quality Assurance 2024
e-Learning CoursesData quality assurance / Zapewnianie jakości danych 2023 Prowadzący: Paweł Weichbroth Wykład: odbywają się zdalnie. Projekt w drugiej połowie semestru Kod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu
-
Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine
PublicationIn order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...
-
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Theory of Organisation and Management and System's Theory
e-Learning CoursesWe will have our lectures and classes in Theory of Organisation and Management and System's Theory on Wednesday Since 9:15 till 12:00. We will meet on MsTeams and here is the link: https://teams.microsoft.com/dl/launcher/launcher.html?url=%2F_%23%2Fl%2Fmeetup-join%2F19%3Ameeting_MTBjMTg4ZWYtY2Q2NS00YjlkLWFmZTItMWUzYTcwM2ZmNzU0%40thread.v2%2F0%3Fcontext%3D%257b%2522Tid%2522%253a%2522b2b950ec-1ee3-4d9d-ac5e-4dd9db5e0b73%2522%252c%2522Oid%2522%253a%252233f97504-8676-4b87-96ad-a9394d16b3b2%2522%257d%26anon%3Dtrue&type=meetup-join&deeplinkId=ce188d79-726a-418e-ab34-eb9f59172f62&directDl=true&msLaunch=true&enableMobilePage=true&suppressPrompt=true
-
Modeling the Networks - ed. 2021/2022
e-Learning CoursesThe goal of this course is to present optimization problems for road networks, where the road network is a set of n distinct lines, or n distinct (open or closed) line segments, in the plane, such that their union is a connected region.
-
Szkolenie z bazy IEEE
EventsSzkolenie przedstawi najważniejsze zagadnienia związane z publikowaniem i przeszukiwaniem bazy IEEE Xplore
-
International Journal of Communication Networks and Information Security
Journals -
Providing Differentiated Levels of Service Availability in VANET Communications
PublicationInter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...
-
Spectroscopic wireless sensor of hematocrit level
PublicationAn optical method for hematocrit measurement is presented. The sensor, designed and developed by authors, consists of a spectroscopic set-up and a microcontroller. The work of the sensor is based on measurement of intensity of two selected spectral bands. Tests confirmed the ability of the sensor to determine the hematocrit level with appropriate measurement accuracy. Measurement results can be transmitted via wireless module to...