Filters
total: 11738
-
Catalog
- Publications 6398 available results
- Journals 756 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 292 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 273 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3520 available results
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Low Cost Method for Location Service in the WCDMA System
PublicationA new and low cost method for a location service (LCS) in the Wideband Code Division Multiple Access (WCDMA) system is outlined. This method, which is called TDOA + RTT, enables calculation of the geographical position of a mobile station (MS) without knowledge of relative time differences (RTDs) between base stations (BSs). The TDOA+RTT method is based on the measurement of round trip times (RTTs) between the MS and the serving...
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Emotions Embodied in the SVC of an Autonomous Driver System
PublicationA concept of embodied intelligence (EI) is considered. None of such implementations can be fully identified with artificial intelligence. Projects that dare to approach AI and EI should be based on both the AI concepts (symbolic and sub-symbolic), in solving real problems of perception and decision-making. Therefore, the EI, in this paper, is understood as a methodology that uses all available resources and algorithms from the...
-
Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems
PublicationEvents in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...
-
Data quality assurance - 2023
e-Learning CoursesData quality assurance / Zapewnianie jakości danych 2023 Prowadzący: Andrzej Wardziński Wykład: od 13 marca, poniedziałki 13:15 sala NE Audytorium 2 Projekt w drugiej połowie semestru Kod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu
-
Interference between Land and Sea Logistics Systems. Multifunctional Building System Design Towards Autonomous Integrated Transport Infrastructure
PublicationThe research is focused on developing design theory towards efficient multifunctional facilities for logistics supply chains in the contemporary urban city structures. The development of modern systems based on autonomous transport creates new conditions for their management and generates an emerging need to define dedicated functional service structures. An important element of consideration also taken into account is the scenario...
-
IEEE Industrial Electronics Society Students and Young Professionals Just After the Pandemic Time [Students and Young Professionals News]
PublicationReport on IEEE IES Society student activities in year 2022.
-
Near Field Coupled Wireless Microwave Sensor
PublicationThis paper presents a wireless planar microwave sensor operating at industrial scientific and medical (ISM) frequency for the detection of dielectric materials. The microwave sensor consists of a reader (ground defected microstrip coupled line) and a passive tag where a complementary split-ring resonator (CSRR) is made on the commercially available copper-foil. The CSRR is a peel-off type tag that is excited using the near field...
-
Analysis of IPv6 handovers in IEEE 802.16 environment
PublicationThe second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Efficiency of IEEE 802.15.4a UWB Impulse Radio Spectrum Shaping
PublicationThis paper presents results of impulse radio signal spectrum shaping efficiency investigations. Basic parameters of IEEE 802.15.4a UWB signal and outline of proposed spectrum shaping methods are briefly described. The main part of the paper presents influence of signal and algorithms parameters on the results of spectrum shaping.
-
A risk comparison framework for autonomous ships navigation
PublicationMaritime autonomous surface ships (MASS) may operate in three predefined operational modes (OM): manual, remote, or autonomous control. Determining the appropriate OM for MASS is important for operators and competent authorities that monitor and regulate maritime traffic in given areas. However, a science-based approach to this respect is currently unavailable. To assist the selection of the proper OM, this study presents a risk-based...
-
Security ontology construction and integration
PublicationThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
Quality Analysis of Audio-Video Transmission in an OFDM-Based Communication System
PublicationApplication of a reliable audio-video communication system, brings many advantages. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. With the availability of visual information one can monitor the surrounding, working environment, etc. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission. Currently, orthogonal frequency...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublicationIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
A proposal for a knowledge market based on quantity and quality of knowledge
PublicationThe paper proposes an autonomous market environment in which it is possible to trade knowledge based on its quantity and quality.
-
Multicast Traffic Throughput Maximization through Dynamic Modulation and Coding Scheme Assignment in Wireless Sensor Networks
Publication -
Can architecture be 11-dimensional? The nature of space in the architecture of the digital world era
PublicationThis research aims to explore the development of architectural theories about ‘architectural dimensions’ and look at architecture as a multidimensional space. It is important to understand that with today's development of virtual reality technology and through the combination of theories of physics and architecture, a new possibility of creating space has emerged. The arguments are made through inductive reasoning and grounded...
-
Criteria for evaluation and selection of the best offer for the Contract Engineer service
PublicationThe purpose of the legal regulations regarding public procurement in EU countries is to ensure effective funds' spending. When assessing and selecting the best offer, the contracting entities have at their disposal many different criteria, including non-price criteria. Their proper selection and application is necessary to ensure the high quality of the ordered product, delivery or service. Making an order for intellectual services,...
-
Fast service restoration under shared protection at lightpath level in survivable WDM mesh grooming networks
PublicationW artykule zaproponowano nowe podejście do optymalizacji rozdziału zasobów w przeżywalnych sieciach optycznych z agregacją strumieni ruchu. Zaproponowana metoda bazuje na wierzchołkowym kolorowaniu grafu konfliktów. Jest pierwszym podejściem, dedykowanym sieciom optycznym z agregację strumieni ruchu z pełną zdolnością do konwersji długości fal, która nie powoduje wydłużenia ściezek zabezpieczjących, a więc zapewnia szybkie odtwarzanie...
-
The Symmetry of GPS Orbit Ascending Nodes
Publication -
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Rafał Lech dr hab. inż.
PeopleIEEE Senior Member #92122578 Rafal Lech was born in Elblag, Poland, in 1977. He received the M.Sc.E.E. and Ph.D. degrees (with honors) from the Gdansk University of Technology, Gdansk, Poland, in 2001 and 2007, respectively. He is currently with the Faculty of Electronics, Department of Microwave and Antenna Engineering, Telecommunications and Informatics, Gdansk University of Technology. His main research interests are electromagnetic-wave...
-
Simulation Game 2024
e-Learning Courses -
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Wybrane metody szeregowania danych w sieci IEEE 802.16e
PublicationW pracy omówiono wybrane metody szeregowania danych stosowane w sieciach opartych na standardzie IEEE 802.16e (WiMAX Mobile) oraz wskazano ich mankamenty. Przedstawiono również najważniejsze mechanizmy odpowiedzialne za zarządzanie jakością usług oraz przydział zasobów poszczególnym terminalom. Znaczną uwagę skierowano na przyszłościowe kierunki badań w tym zakresie.
-
Low Cost Hexacopter Autonomous Platform for Testing and Developing Photogrammetry Technologies and Intelligent Navigation Systems
PublicationLow-cost solutions for autonomous aerial platforms are being intensively developed and used within geodetic community. Unmanned aerial vehicles are becoming very popular and widely used for photogrammetry and remote sensing applications. Today’s market offers an affordable price components for unmanned solution with significant quality and accuracy growth. Every year market offers a new solutions for autonomous platforms with better...
-
Enabling Deeper Linguistic-based Text Analytics – Construct Development for the Criticality of Negative Service Experience
PublicationSignificant progress has been made in linguistic-based text analytics particularly with the increasing availability of data and deep learning computational models for more accurate opinion analysis and domain-specific entity recognition. In understanding customer service experience from texts, analysis of sentiments associated with different stages of the service lifecycle is a useful starting point. However, when richer insights...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublicationThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Paweł Czarnul dr hab. inż.
PeoplePaweł Czarnul obtained a D.Sc. degree in computer science in 2015, a Ph.D. in computer science granted by a council at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology in 2003. His research interests include:parallel and distributed processing including clusters, accelerators, coprocessors; distributed information systems; architectures of distributed systems; programming mobile devices....
-
Postępy w rozwoju standardu IEEE 802.11 i jego zastosowań Część II: Nowe obszary zastosowań i nowe koncepcje pracy sieci WiFi
PublicationArtykuł stanowi kontynuację rozważań, podjętych w zeszycie nr 11 z 2016 r. PTiWT [1], na temat rozwoju standardu łEEE 802.11 , ukierunkowanego na zwiększanie szybkości przekazu i przekraczanie gigabitowej granicy przepływności łącza. Wskazano tam na modyfikacje i nowe mechanizmy implementowane w warstwie fizycznej i podwarstwie MAC standardów IEEE 802.11 n, IEEE 802.11 ac oraz IEEE 802.11 ad, mające istotny wpływ zarówno na wzrost...
-
Analysis of IPv6 Handovers in IEEE 802.16 environment
PublicationZaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
MAC contention in a wireless LAN with noncooperative anonymous stations
PublicationRozpatruje się model sieci bezprzewodowej wykorzystywanej przez wzajemnie nieprzenikalne grupy stacji anonimowych. Przy ustalonej regule wyłaniania zwycięzcy rywalizacji o dostęp do medium, stacje posiadają swobodę wyboru strategii selekcji szczeliny rywalizacyjnej. Dla szerokiego zbioru możliwych strategii proponuje się metodologię ich oceny i testowania wydajności opartą na pojęciu zbliżonym do ewolucyjnej stabilności.
-
Badania parametrów QoS dla usług transmisji danych w systemie RSMAD
PublicationW referacie przedstawiono analizę wymagań jakościowych, określonych poprzez atrybuty QoS, dla usług transmisji danych obrazowych zwykorzystaniem Radiowego Systemu Monitorowania i Akwizycji Danych z Urządzeń Fotoradarowych (RSMAD). Podano także wyniki pomiarów i badańprzeprowadzonych w celu określenia przydatności różnych systemów radiokomunikacyjnych do transmisji danych w tym systemie z wymaganą jakością.
-
IEEE Transactions on Information Forensics and Security
Journals -
Application of design-thinking models to improve the quality of tourism services
PublicationThe paper presents basic aspects of improvement activities for the quality of tourism industry service through its specific determinants of quality. The authors suggested an the application of design-thinking concept in the development of the service itself and an attempt to undertake improvement activities.
-
SERVICE ORIENTED SCENARIOS FOR SUPPORT ENTERPRISE PROJECT MANAGEMENT
PublicationIn the paper, a service oriented architecture is used to describe various scenarios of human-oriented enterprises. They can be modeled by BPMN to show basic information flow. We consider business scenarios to present another modeling solution called service orchestration or service mashup. That approach gives an opportunity for the right management through taking the best possible choice of services, or composition of services....
-
Performance Evaluation of a Multidomain IMS/NGN Network Including Service and Transport Stratum
PublicationThe Next Generation Network (NGN) architecture was proposed for delivering various multimedia services with guaranteed quality. For this reason, the elements of the IP Multimedia Subsystem (IMS) concept (an important part of 4G/5G/6G mobile networks) are used in its service stratum. This paper presents comprehensive research on how the parameters of an IMS/NGN network and traffic sources influence mean Call Set-up Delay (E(CSD))...
-
Impact of overloaded vehicles on load equivalency factors and service period of flexible pavements
PublicationOverloaded vehicles occur less frequently in comparison to properly loaded vehicles but due to their greater potential to cause damage they significantly contribute to the distress of pavement structure. As the studies show, the phenomena of vehicles overloading intensifies when the control of traffic is poor and the average percentage of overloaded vehicles on analyzed roads varies from 6% to 23%. The main goal of the ar-ticle...
-
Wybrane problemy ochrony żeglugi (Maritime Security)
Publicationprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublicationThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Game-based Sprint retrospectives: multiple action research
PublicationIn today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Theory of Elasticity and Plasticity 2023
e-Learning CoursesThis course discusses the general theory of elastic and plastic material behavior of solids.
-
Theory of Elasticity and Plasticity 2024
e-Learning CoursesThis course discusses the general theory of elastic and plastic material behavior of solids.
-
Theory of architectural design IV_ERASMUS
e-Learning CoursesThe Theory of architectural design IV ERASMUS is a course dedicated especially to Erasmus+ students and conducted on separate conditions.
-
Testowanie układów cyfrowych z wykorzystaniem magistrali IEEE 1149.7
PublicationPrzedstawiono opracowaną w grudniu 2009 r. cyfrową magistralę testującą IEEE 1149.7 przeznaczoną do testowania i debuggingu wielordzeniowych układów wbudowanych. W stosunku do magistrali IEEE1149.1, której jest rozszerzeniem, magistrala IEEE1149.7 zapewnia zredukowaną do dwóch liczbę wyprowadzeń, możliwość pracy w konfiguracji gwiazdowej, indywidualne adresowanie urządzeń, eliminację ze ścieżki brzegowej nieaktywnych układów, zarządzanie...
-
SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
PublicationThe paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...