Filters
total: 8265
-
Catalog
- Publications 6012 available results
- Journals 607 available results
- Conferences 406 available results
- Publishing Houses 1 available results
- People 384 available results
- Inventions 1 available results
- Projects 19 available results
- Research Teams 3 available results
- Research Equipment 1 available results
- e-Learning Courses 188 available results
- Events 18 available results
- Offers 1 available results
- Open Research Data 624 available results
displaying 1000 best results Help
Search results for: INTERNET OF THINGS MOBILE COMPUTING COMPUTER NETWORKS DISTRIBUTED COMPUTING QUALITY OF SERVICE CLOUD COMPUTING
-
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
Journals -
ACM Transactions on Embedded Computing Systems
Journals -
Visual Computing for Industry Biomedicine and Art
Journals -
Depth Images Filtering In Distributed Streaming
PublicationIn this paper, we propose a distributed system for point cloud processing and transferring them via computer network regarding to effectiveness-related requirements. We discuss the comparison of point cloud filters focusing on their usage for streaming optimization. For the filtering step of the stream pipeline processing we evaluate four filters: Voxel Grid, Radial Outliner Remover, Statistical Outlier Removal and Pass Through....
-
DEPTH IMAGES FILTERING IN DISTRIBUTED STREAMING
PublicationIn this paper we discuss the comparison of point cloud filters focusing on their applicability for streaming optimization. For the filtering stage within a stream pipeline processing we evaluate three filters: Voxel Grid, Pass Through and Statistical Outlier Removal. For the filters we perform series of the tests aiming at evaluation of changes of point cloud size and transmitting frequency (various fps ratio). We propose a distributed...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Managing Service Quality
Journals -
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
Journals -
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublicationMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Study of data scheduling methods in the WiMAX Mobile metropolitan area networks
PublicationThe paper discusses basic assumptions of the WiMAX Mobile system. It also presents and analyses the results of simulation tests run for selected data scheduling methods and subcarrier allocation. Based on the test results, the authors have prepared a comparative analysis of two popular data scheduling methods, i.e. WRR and PF, and their own method CDFQ which uses information about the current channel situation for the queuing processes...
-
Service time distribution influence on end-to-end call setup delay calculation in networks with Session Initiation Protocol
PublicationThe most important GoS parameter for networks with SIP protocol is end-to-end call setup delay. So far there were no coherent models allowing calculation of these parameters for networks with SIP protocol. Few models were developed but they are insufficient. In the paper we propose model which allows end-to-end call setup delay calculation for networks with SIP protocol. The model is using chain of M/G/1/K models and is applicable...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Reduced-cost optimization-based miniaturization of microwave passives by multi-resolution EM simulations for internet of things and space-limited applications
PublicationStringent performance specifications along with constraints imposed on physical dimensions, make the design of contemporary microwave components a truly onerous task. In recent years, the latter demand has been growing in importance, with the innovative application areas such as Internet of Things coming into play. The need to employ full-wave electromagnetic (EM) simu-lations for response evaluation, reliable yet CPU heavy, only...
-
Highly Integrable Planar-structured Printed Circularly Polarized Antenna for Emerging Wideband Internet of Things Applications in the Millimeter-Wave Band
PublicationThis paper proposes a numerically and experimentally validated printed wideband antenna with a planar geometry for Internet of Things (IoT) applications. This design tackles the challenges associated with deploying IoT sensors in remote areas or across extensive geographical regions. The proposed design exploits a coplanar-waveguide-fed modified microstrip line monopole for excitation of circularly polarized waves radiating in...
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublicationA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublicationThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Quality of Resilience in IP-based Future Internet Communications
PublicationInternet Przyszłości (zwany również Internetem 3.0 czy też NGN) jest następnym krokiem ewolucji Internetu. Prace badawcze związane z nową architekturą obejmują szerokie spektrum zagadnień, a zwłaszcza: architekturę sieci (protokoły), technologie sieciowe, aplikacje, itd. W tym artykule zakładamy wykorzystanie koncepcji Differentiated Services (DiffServ). W szczególności, proponujemy podejście ochrony zróżnicowanej ruchu. Jest ono...
-
Asynchronous time difference of arrival (ATDOA) method
PublicationA new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublicationWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
TensorHive: Management of Exclusive GPU Access for Distributed Machine Learning Workloads
PublicationTensorHive is a tool for organizing work of research and engineering teams that use servers with GPUs for machine learning workloads. In a comprehensive web interface, it supports reservation of GPUs for exclusive usage, hardware monitoring, as well as configuring, executing and queuing distributed computational jobs. Focusing on easy installation and simple configuration, the tool automatically detects the available computing...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
The methods of design reliable distributed networks
PublicationOpisano dwie metody projektowania niezawodnych sieci rozległych. W pierwszej metodzie przyjęto, że koszt konstrukcji każdego połączenia jest jednakowy, w drugiej koszty opisuje zadana macierz kosztów. Jako parametr niezawodnościowy przyjęto liczbę niezależnych dróg pomiędzy węzłami sieci. Pierwsza z metod jest metodą dokładną, druga heurystyczną. Zdefiniowano i oceniono błąd metody heurystycznej. Opublikowano wyniki otrzymane...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublicationWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Industrial computer networks and functional safety
PublicationW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
Krzysztof Goczyła prof. dr hab. inż.
PeopleKrzysztof Goczyła, full professor of Gdańsk University of Technology, computer scientist, a specialist in software engineering, knowledge engineering and databases. He graduated from the Faculty of Electronics Technical University of Gdansk in 1976 with a degree in electronic engineering, specializing in automation. Since then he has been working at Gdańsk University of Technology. In 1982 he obtained a doctorate in computer science...
-
On weak solutions of boundary value problems within the surface elasticity of Nth order
PublicationA study of existence and uniqueness of weak solutions to boundary value problems describing an elastic body with weakly nonlocal surface elasticity is presented. The chosen model incorporates the surface strain energy as a quadratic function of the surface strain tensor and the surface deformation gradients up to Nth order. The virtual work principle, extended for higher‐order strain gradient media, serves as a basis for defining...
-
Applications of Tensor Analysis in Continuum Mechanics
PublicationA tensor field is a tensor-valued function of position in space. The use of tensor fields allows us to present physical laws in a clear, compact form. A byproduct is a set of simple and clear rules for the representation of vector differential operators such as gradient, divergence, and Laplacian in curvilinear coordinate systems. The tensorial nature of a quantity permits us to formulate transformation rules for its components...
-
Tomasz Gierszewski dr inż.
People -
Distributed MIND - A New Processing Model Based on Mobile Interactive Documents
PublicationObliczenia w trybie zespołowym pozwalają na integrację działań ludzi i agentów systemowych w otwartym środowisku rozproszonym w celu rozwiązywania problemów formułowanych dynamicznie w trakcie pracy systemu. Problemy te najczęściej nie mają charakteru algorytmicznego, tzn. generowane rozwiązania nie mogłyby zostać wyliczone w skończonej liczbie kroków na podstawie danych charakteryzujących uczestników obliczeń. Autorzy proponują...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Advances in Architectures, Big Data, and Machine Learning Techniques for Complex Internet of Things Systems
PublicationTe feld of Big Data is rapidly developing with a lot of ongoing research, which will likely continue to expand in the future. A crucial part of this is Knowledge Discovery from Data (KDD), also known as the Knowledge Discovery Process (KDP). Tis process is a very complex procedure, and for that reason it is essential to divide it into several steps (Figure 1). Some authors use fve steps to describe this procedure, whereas others...
-
Multi-Aspect Quality Assessment Of Mobile Image Classifiers For Companion Applications In The Publishing Sector
PublicationThe paper presents the problem of quality assessment of image classifiers used in mobile phones for complimentary companion applications. The advantages of using this kind of applications have been described and a Narrator on Demand (NoD) functionality has been described as one of the examples, where the application plays an audio file related to a book page that is physically in front of the phone's camera. For such a NoD application,...
-
Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children
PublicationThis paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublicationMultimodal interfaces development history is reviewed briefly in the introduction. Some applications of multimodal interfaces to education software for disabled people are presented. One of them, the LipMouse is a novel, vision-based human-computer interface that tracks user’s lip movements and detect lips gestures. A new approach to diagnosing Parkinson’s disease is also shown. The progression of the disease can be measured employing...
-
Three levels of fail-safe mode in MPI I/O NVRAM distributed cache
PublicationThe paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...
-
Structural and Temporal Topic Models of Feedbacks on Service Quality – A Path to Theory Development?
PublicationThere is growing interest in applying computational methods in analysing large amount of data without sacrificing rigour in Information Systems research. In this paper, we demonstrate how the use of structural and temporal topic modelling can be employed to produce insights of both theoretical and practical importance from the analysis of textual comments on the quality of services in hospitals. As a first step, we revealed the...
-
Michał Hoeft dr inż.
PeopleMichał Hoeft graduated with distinction form Gdansk University of Technology (GUT), Gdansk, Poland in 2011. His main areas of research interest contain: effective mobility management and handover optimisation in 802.11 networks. Michał Hoeft has been involved in major communication-oriented projects including the EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 and netBaltic projects. He has served as a reviewer...
-
Video Cloud Services for Hospitals: Designing an End-to-End Cloud Service Platform for Medical Video Storage and Secure Access
Publication -
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Association for Computing Machinery (ACM)
Publishing Houses -
Cluster Computing-The Journal of Networks Software Tools and Applications
Journals -
Journal of Artificial Intelligence and Soft Computing Research
Journals -
IEEE Transactions on Multi-Scale Computing Systems
Journals -
International Journal of Trust Management in Computing and Communications
Journals -
World Research Journal of Biologically-Inspired Computing
Journals -
International Journal of Space-Based and Situated Computing
Journals -
International Journal of Modeling Simulation and Scientific Computing
Journals