Search results for: its service
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Asynchronous Wide Area Multilateration System
PublicationA new method for a location service in the wide area multilateration (WAM) system is outlined. This method, which is called asynchronous WAM (AWAM), enables calculation of the geographical position of an aircraft without knowledge of relative time differences (RTDs) between measuring ground stations (sensors). The AWAM method is based on the measurement of round trip times (RTTs) between the aircraft and the serving ground station,...
-
New approach for determining the QoS of MP3-coded voice signals in IP networks
PublicationPresent-day IP transport platforms being what they are, it will never be possible to rule out conflicts between the available services. The logical consequence of this assertion is the inevitable conclusion that the quality of service (QoS) must always be quantifiable no matter what. This paper focuses on one method to determine QoS. It defines an innovative, simple model that can evaluate the QoS of MP3-coded voice data transported...
-
HOW TO ASSESS THE MATURITY OF SMALL AND MEDIUM-SIZED ENTERPRISES TO LEAN SIX SIGMA PROJECTS
PublicationThis article describes the considerations for the implementation of the Lean Six Sigma (LSS) methodology in small and medium-sized enterprises. Pilot research was conducted in Polish and French SMEs (nine Polish and nine French enterprises from the service and production sectors) referring to the context of the implementation and application of the Lean Six Sigma concept. The studies led to the identification of the motives, needs,...
-
Design of a Distributed System using Mobile Devices and Workflow Management for Measurement and Control of a Smart Home and Health
PublicationThe paper presents design of a distributed system for measurements and control of a smart home including temper- atures, light, fire danger, health problems of inhabitants such as increased body temperature, a person falling etc. This is done by integration of mobile devices and standards, distributed service based middleware BeesyCluster and a workflow management system. Mobile devices are used to measure the parameters and are...
-
Ubiquity of client access in heterogeneous access environment
PublicationWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Energy efficient beam control for 5G antennas
PublicationThe rapid development of 5G and beyond systems demands improvement in communication speed, latency and safety to maintain the required quality of service. This paper presents an overview of different concepts of energy-efficient antenna systems, which offer beam-shaping and beam-steering functionalities, that enhance connectivity performance and can be used in 5G applications. Different designs for 5.9 GHz, 39 GHz and 60 GHz frequency...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Influence of Toll Collection Method on Motorways on Traffic Safety and Efficiency
PublicationThe paper presents the results of the effectiveness analysis for various forms of toll collection on motorway gates and their impact on safety and efficiency of traffic. The results from field tests that were performed on the A1 motorway in Rusocin were used for the analysis. The research included the analysis of the video image of driver behaviour on the way to the toll booths and at toll booths. The PTV VISSIM tool was used to...
-
Cargo ships heat demand - operational experiment
PublicationThe paper presents the results of an experiment conducted on two cargo ships – a 5300 TEU container with a steam heating system and a 7500 dwt general cargo ship with a thermal oil system. On both ships research has been carried out using specially designed measuring equipment. After gathering data about flow velocity and temperatures (steam/ cooling water/ thermal oil/ seawater/ outside air), calculations have been done, resulting...
-
Modeling of Accidental Bunker Oil Spills as a Result of Ship's Bunker Tanks Rupture - a Case Study
PublicationAIS (Automatic Identification System) data analysis is used to define ship domain for grounding scenarios. The domain has been divided into two areas as inner and outer domains. Inner domain has clear border, which is based on ship dynamic characteristics. Violation of inner domain makes the grounding accident unavoidable. Outer domain area is defined with AIS data analyzing. Outer domain shows the situation of own ship in compare...
-
Long-term hindcast simulation of sea ice in the Baltic Sea
Open Research DataThe data set contains the results of numerical modeling of sea ice over a period of 50 years (1958-2007) in the Baltic Sea. A long-term hindcast simulation was performed using a three-dimensional hydrodynamic model PM3D (Kowalewski and Kowalewska-Kalkowska, 2017), a new version of the M3D model (Kowalewski, 1997). A numerical dynamic-thermodynamic model...
-
Rozproszony system akwizycji, prezentacji i analizy informacji przestrzennej
PublicationW artykule przedstawiono skalowalny system prezentacji danych przestrzennych pochodzących z różnych źródeł, ze szczególnym uwzględnieniem specyfikacji Open Geospatial Consortium (OGC). System został zaimplementowany w technologii .NET i pracuje w środowisku rozproszonym w oparciu o Web Service. Aplikacja zrealizowana jest w formie apletu .NET, dzięki czemu można ją w prosty sposób osadzić w dokumencie HTML i umieścić na serwerze...
-
Application tool for IP QoS network design
PublicationDespite the fact that differentiated-service-aware network implementation has been a widely discussed topic for quite some time, network design still proofs nontrivial. Well developed software could put an end to network designer's problems. This chapter describes work, which has been aimed at creating a comprehensive network design tool, offering a fair range of functionality and high reliability. The presented tool is able to...
-
Evaluation of ASON/GMPLS Connection Control Servers Performance
PublicationPerformance aspects have always been very important in telecommunications, especially in control elements. That problem also regards ASON/GMLPS network, which is one of the propositions for Next Generation Network (NGN) transport stratum. In this paper we investigate performance of ASON/GMPLS Connection Control Servers (CCSs) in laboratory testbed, which architecture and operation are also described. In order to evaluate the performance...
-
Semantic Integration of Heterogeneous Recognition Systems
PublicationComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Implementacja płaszczyzny danych i płaszczyzny sterowania dla Równoległego Internetu IPv6 QoS
PublicationW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. Zgodnie z architekturą DiffServ, w sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakie¬tów w sieci. Implementacja węzłów IPv6...
-
Simulation model for assessment of IMS-based NGN call processing performance
PublicationIn current telecommunications it is assumed that demands of information society for quickly delivered services will be satisfied by Next Generation Network (NGN) architecture, which includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS), proper design and dimensioning of NGN is absolutely necessary, for which appropriate models have to be proposed. As NGN architecture is very complicated, the most...
-
Simulation model of IMS/NGN call processing performance
PublicationIn current telecommunications it is assumed that demands of the information society for quickly delivered services will be satisfied by the Next Generation Network (NGN) architecture, which includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS), proper design and dimensioning of NGN is absolutely necessary, for which appropriate models have to be proposed. As the NGN architecture is very complicated,...
-
Call processing performance in multidomain IMS/NGN architecture
PublicationThe Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...
-
Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture
PublicationCurrently is it assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Probabilistic Methods in Reliability Assessment of Engineering Lightweight Structures
PublicationThe paper considers the probability-based analysis of structural safety measures. Two different numerical examples of representative lightweight structures are considered – a submerged truss tower supporting an offshore platform, and an overhead power line support truss tower. On the basis of these examples, the importance of a motivated selection of analysis method and a proper choice of the number of important variables is shown....
-
The Influence of the Aircraft Operating Fluids on the Mechanical Parameters of the Airport Surface Concrete
PublicationThe authors of the article assessed the impact of operating fluids used to service aircraft on changing mechanical parameters of cement concrete intended for airport pavement. The research concerned concrete designed with the use of CEM I 42.5N LH NA low-alkali cement, broken granite aggregate, fine washed aggregate, and admixtures. The analysis included the assessment of changes in dierences in endurance parameters over various...
-
Attempt to a Video-Transmission Capability in MV Mine Cable Network Using BPL-PLC Technology
PublicationThis article presents and discusses the attempt to transmit video content using the BPL-PLC (Broadband over Power Line - Power Line Communication) technology. It includes simulation results of a specially developed digital transmitter and receiver, dedicated to a given predefined 6 kV mining power cable. The effect of two different transmission modes (2-7 MHz and 3-7.5 MHz) and two types of coupling (capacitive-inductive and induction-inductive),...
-
Unified and flexible way to the organizations resources
PublicationZaprezentowano porównanie różnych zasobów organizacji. zasoby podzielono na cztery grupy: informacyjne, finansowe, techniczne i ludzkie, dla których przedstawiono cechy wspólne i różnice. na podstawie tego zestawienia zaproponowano taką organizację danych, aby różne zasoby opisać w jednolity sposób. dzieki takiej organizacji danych mozliwe jest stworzenie konfigurowalnych, elastycznych komponentów, które umożliwią obsługę dowolnych...
-
A Model-Driven Solution for Development of Multimedia Stream Processing Applications
PublicationThis paper presents results of action research related to model-driven solutions in the area of multimedia stream processing. The practical problem to be solved was the need to support application developers who make their multimedia stream processing applications in a supercomputer environment. The solution consists of a domain-specific visual language for composing complex services from simple services called Multimedia Stream...
-
Energy savings by application of supercapacitor storage in trolleybus supplying station - analysis of experimental results
PublicationStorage devices can be divided into two groups: on-board energy storage devices, which are placed in the vehicles and off-board energy storage devices situated in traction substations or between them. Current research is focused mainly on two objectives. The first is to reduce the energy demand by introducing on-board energy storages in light electric vehicles like trams, trolleybuses or electrobuses. The latter is to provide a...
-
Approximation of Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture Using Phase-Type Distributions
PublicationCurrently it is assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Smart Services supporting Drivers in Effective Cars Parking
PublicationThe paper shows how to design and implement intelligent, service oriented systems for management of free places in distributed car parks. The idea of SOA technology is widely used. It is assumed that a state of every car park is automatically determined by a special electronic infrastructure including IoT solutions. The information received from such an infrastructure is sent to the main management system, which processes it and,...
-
A Developer's View of Application Servers Interoperability
PublicationThe paper describes analysis of application servers interoperability that considers both the available level of integration and the required level of development complexity. Development complexity ranges from simple GUI operations to changes of undocumented features in configuration files. We verify if an integration can be established on a given level of development complexity, rather than verify if it is objectively feasible....
-
Automation of the Road Gate Operations Process at the Container Terminal—A Case Study of DCT Gdańsk SA
PublicationThe future increased terminal capacity will result in more container movement through the road complex and rail siding, which are one of the most critical areas (potential bottlenecks) in the container terminal. Truck turnaround time is one of the major factors that customers take into account while deciding how many container volumes they will handle through the container terminal. To enable to optimize increased traffic with...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Using LSTM networks to predict engine condition on large scale data processing framework
PublicationAs the Internet of Things technology is developing rapidly, companies have an ability to observe the health of engine components and constructed systems through collecting signals from sensors. According to output of IoT sensors, companies can build systems to predict the conditions of components. Practically the components are required to be maintained or replaced before the end of life in performing their assigned task. Predicting...
-
Nowa metoda diagnostyki stanu technicznego nakładek stykowych
PublicationThe current collection system, which consists of the overhead contact line and a current collector, is particularly important in electric rail vehicles, where their reliability is concerned. Faultless current collection is conditioned not only by suitable construction of these elements but also by their proper maintenance. Retaining permanent electrical contact is essential in DC systems, where current demand is relatively high. In...
-
TDOA versus ATDOA for wide area multilateration system
PublicationThis paper outlines a new method of a location service (LCS) in the asynchronous wireless networks (AWNs) where the nodes (base stations) operate asynchronously in relation to one another. This method, called asynchronous time difference of arrival (ATDOA), enables the calculation of the position of the mobile object (MO) through the measurements taken by a set of non-synchronized fixed nodes and is based on the measurement of...
-
Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty
PublicationThis paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...
-
Traffic Model of IMS/NGN Architecture with Transport Stratum Based on MPLS Technology
PublicationGrowing expectations for a fast access to information create strong demands for a universal telecommunication network architecture, which provides various services with strictly determined quality. Currently it is assumed that these requirements will be satisfied by Next Generation Network (NGN), which consists of two stratums and includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS) all NGN stratums...
-
The model of end-to-end call setup time calculation for Session Initiation Protocol
PublicationEnd-to-end call setup delay is one of the most important grade of service (GoS) parameters for VoIP networks with Session Initiation Protocol (SIP). A typical subscriber wants to have a connection established as soon as possible. From the operator's perspective call setup time is also crucial because he needs to know how probability of successful packet transmission on SIP links is related to a call setup delay. Then he can make...
-
Video Semantic Analysis Framework based on Run-time Production Rules - Towards Cognitive Vision
PublicationThis paper proposes a service-oriented architecture for video analysis which separates object detection from event recognition. Our aim is to introduce new tools to be considered in the pathway towards Cognitive Vision as a support for classical Computer Vision techniques that have been broadly used by the scientific community. In the article, we particularly focus in solving some of the reported scalability issues found in current...
-
Assessing historical church tower asymmetry using point cloud spatial expansion
PublicationChurch towers are key cultural heritage. In theory, towers are vertical, while facade elements are symmetrically positioned around the tower axis. However, during service of a structure, building and lifetime conditions cause deviations, with associated risks. Laser scanning point clouds can be used to assess the structural state but a universal approach was missing. The proposed algorithm first estimates the tower inclination,...
-
User-oriented GIS tools in higher education of urban design and planning
PublicationGeographic information systems (GIS) have emerged as indispensable tools for decision-making, planning and problem-solving tasks across various domains in today’s evolving world. However, there exists a pressing need to augment the utilisation of GIS tools in higher education of urban design and planning to foster a user-oriented approach. This article explores the imperative of integrating GIS tools more comprehensively into higher...
-
Video Classification Technology in a Knowledge-Vision-Integration Platform for Personal Protective Equipment Detection: An Evaluation
PublicationThis work is part of an effort for the development of a Knowledge-Vision Integration Platform for Hazard Control (KVIP-HC) in industrial workplaces, adaptable to a wide range of industrial environments. This paper focuses on hazards resulted from the non-use of personal protective equipment (PPE), and examines a few supervised learning techniques to compose the proposed system for the purpose of recognition of three protective...
-
Traffic model for evaluation of call processing performance parameters in IMS-based NGN
PublicationIn the modern world requirements for accurate and fast information distribution are becoming more and more important, which creates a strong necessity for appropriate telecommunication network architecture. Proposition of such an architecture is the Next Generation Network (NGN) concept, which in order to guarantee Quality of Service (QoS), should be correctly designed and dimensioned. For this reason proper traffic models must...
-
Discovery of Stylistic Patterns in Business Process Textual Descriptions: IT Ticket Case
PublicationGrowing IT complexity and related problems, which are reflected in IT tickets,create a need for new qualitative approaches. The goal isto automate the extraction of main topics described in tickets in order to provide high quality support for the IT process workers and enablea smooth service delivery to the end user. Present paper proposes a method of knowledge extraction in a form of stylistic patterns in business...
-
AFM-assisted investigation of conformal coatings in electronics
PublicationPurpose – This paper aims to presents a new method of investigation of local properties of conformal coatings utilized in microelectronics. Design/methodology/approach – It is based on atomic force microscopy (AFM) technique supplemented with the ability of local electrical measurements, which apart from topography acquisition allows recording of local impedance spectra, impedance imaging and dc current mapping. Potentialities...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
A multi-criteria decision model for the introduction of electric storage multiple units on the partially electrified Gdynia-Hel railway
Publication: In this article a multi-criteria study of the use of independently powered electric multiple units on the partially electrified Gdynia Główna - Hel line was carried out. The use of (currently used) diesel and, as an alternative, electric and electric multiple units with an electric energy storage was considered. The analysis was carried out on the basis of three criteria for assessing the route service options, i.e. environmental,...
-
Ensuring the QoE-Related Fairness to Reduce the User Abandonment Ratio
PublicationThese days, it is quite a challenge for app owners to keep users engaged with an app. Currently, the level of user abandonment is one of the key parameters that application owners are interested in. To meet these challenges, we are conducting an extended study of a previously proposed solution that significantly reduces the abandonment rate of a given application. The investigated solution is based on the methods of fairness using...
-
Comparison of low-temperature cracks intensity on pavements with high modulus asphalt concrete and conventional asphalt concrete bases
PublicationHigh modulus asphalt concrete (HMAC) base courses provide very good resistance to rutting and fatigue but they can increase the risk of low-temperature cracking as compared with conventional asphalt concrete (AC). The article presents the comparison of these two road materials in terms of low-temperature cracking. The statistical method based on the ordered logistic regression model was used. The analysis was based on results of...