Filters
total: 1344
displaying 1000 best results Help
Search results for: DIFFSERV PACKETS NETWORKS
-
Enhanced uniform data sampling for constrained data‐driven modeling of antenna input characteristics
PublicationData-driven surrogates are the most popular replacement models utilized in many fields of engineering and science, including design of microwave and antenna structures. The primary practical issue is a curse of dimensionality which limits the number of independent parameters that can be accounted for in the modelling process. Recently, a performance-driven modelling technique has been proposed where the constrained domain of the...
-
A Novel Trust-Region-Based Algorithm with Flexible Jacobian Updates for Expedited Optimization of High-Frequency Structures
PublicationSimulation-driven design closure is mandatory in the design of contemporary high-frequency components. It aims at improving the selected performance figures through adjustment of the structure’s geometry (and/or material) parameters. The computational cost of this process when employing numerical optimization is often prohibitively high, which is a strong motivation for the development of more efficient methods. This is especially...
-
Kriging metamodels and design re‐utilization for fast parameter tuning of antenna structures
PublicationThe paper addresses the problem of computationally efficient electromagnetic (EM)‐driven design closure of antenna structures. The foundations of the presented approach are fast kriging interpolation metamodels, utilized for two purposes: (a) producing a good starting point for further parameter tuning, and (b) yielding a reasonable Jacobian matrix estimate to jump‐start the optimization procedure. The models are rendered using...
-
Editorial for the special issue on advances in forward and inverse surrogate modeling for high-frequency design
PublicationThe design of modern‐day high‐frequency devices and circuits, including microwave/RF, antenna and photonic components, historically has relied on full‐wave electromagnetic (EM) simulation tools. Initially used for design verification, EM simulations are nowadays used in the design process itself, for example, for finding optimum values of geometry and/or material parameters of the structures of interest. In a growing number of...
-
Recent Advances in Performance-Driven Surrogate Modeling of High-Frequency Structures
PublicationDesign of high‐frequency structures, including microwave and antenna components, heavily relies on full‐wave electromagnetic (EM) simulation models. Their reliability comes at a price of a considerable computational cost. This may lead to practical issues whenever numerous EM analyses are to be executed, e.g., in the case of parametric optimization. The difficulties entailed by massive simulations may be mitigated by the use of...
-
Cost‐efficient performance‐driven modelling of multi‐band antennas by variable‐fidelity electromagnetic simulations and customized space mapping
PublicationElectromagnetic (EM) simulations have become an indispensable tool in the design of contemporary antennas. EM‐driven tasks, for example, parametric optimization, entail considerable computational efforts, which may be reduced by employing surrogate models. Yet, data‐driven modelling of antenna characteristics is largely hindered by the curse of dimensionality. This may be addressed using the recently reported domain‐confinement...
-
Rapid tolerance‐aware design of miniaturized microwave passives by means of confined‐domain surrogates
PublicationThe effects of uncertainties, primarily manufacturing tolerances but also incomplete information about operating conditions or material parameters, can be detrimental to the performance of microwave components. Quantification of such effects is essential to ensure a meaningful evaluation of the structure, in particular, its reliability under imperfect fabrication procedures. The improvement of the circuit robustness can be achieved...
-
Variable‐fidelity modeling of antenna input characteristics using domain confinement and two‐stage Gaussian process regression surrogates
PublicationThe major bottleneck of electromagnetic (EM)-driven antenna design is the high CPU cost of massive simulations required by parametric optimization, uncertainty quantification, or robust design procedures. Fast surrogate models may be employed to mitigate this issue to a certain extent. Unfortunately, the curse of dimensionality is a serious limiting factor, hindering the construction of conventional data-driven models valid over...
-
ZAPEWNIENIE SYNCHORNIZACJI CZASU PRZY CZĘŚCIOWYM WSPARCIU SIECI
PublicationCelem badań zaprezentowanych w artykule było sprawdzenie czy możliwe jest zapewnienie dużej dokładności synchronizacji czasu przy częściowym wsparciu sieci w oparciu o model HRM-1 składający się z 12 szeregowo podłączonych urządzeń sieciowych wraz z wygenerowanym ruchem sieciowym. Badania wykazały, że dla obecnie stosowanych technologii mobilnych takich jak LTE TDD możliwe jest zapewnienie odpowiedniej jakości synchronizacji czasu....
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublicationThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublicationIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
Low Cost Method for Location Service in the WCDMA System
PublicationA new and low cost method for a location service (LCS) in the Wideband Code Division Multiple Access (WCDMA) system is outlined. This method, which is called TDOA + RTT, enables calculation of the geographical position of a mobile station (MS) without knowledge of relative time differences (RTDs) between base stations (BSs). The TDOA+RTT method is based on the measurement of round trip times (RTTs) between the MS and the serving...
-
Operation, Administration, Maintenance in Carrier Grade Ethernet
PublicationOAM (Operation, Administration and Maintenance) plays a crucial role in carrier networks. OAM functionality ensures that network operators and service providers can maintain the quality of the services they offer. One of its major tasks is the detection of anomalies in the network before they become a problem. This enables network operators and service providers to deliver services that come up to a predetermined level of quality...
-
Design and implementation of GEPON architecture in laboratory testbed
PublicationThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
Selfie and Personal Branding Phenomena in the Context of the Network Economy. A Literature Review
PublicationSelf-taken pictures called “selfies” shared in social media have become a worldwide phenomenon. This is due to the increased need of human being to share to other people their daily lives and to build their own personal brand in the networked world. Despite that, the subject of personal branding has not been sufficiently discussed in academic marketing literature over the past decade. The objective of the study is to present the...
-
Different Ways to Apply a Measurement Instrument of E-Nose Type to Evaluate Ambient Air Quality with Respect to Odour Nuisance in a Vicinity of Municipal Processing Plants
PublicationThis review paper presents different ways to apply a measurement instrument of e-nose type to evaluate ambient air with respect to detection of the odorants characterized by unpleasant odour in a vicinity of municipal processing plants. An emphasis was put on the following applications of the electronic nose instruments: monitoring networks, remote controlled robots and drones as well as portable devices. Moreover, this paper presents...
-
Vision-based parking lot occupancy evaluation system using 2D separable discrete wavelet transform
PublicationA simple system for rough estimation of the occupancy of an ad-hoc organized parking lot is presented. A reasonably simple microprocessor hardware with a low resolution monochrome video camera observing the parking lot from the location high above the parking surface is capable of running the proposed 2-D separable discrete wavelet transform (DWT)-based algorithm, reporting the percentage of the observed parking area occupied by...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublicationThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Fractional Calculus Evaluation of Hyaluronic Acid Crosslinking in a Nanoscopic Part of Articular Cartilage Model System
PublicationThis work presents a study of the mechanism of physical crosslinking of hyaluronic acid in the presence of common phospholipids in synovial joint organ systems. Molecular dynamic simulations have been executed to understand the formation of hyaluronan networks at various phospholipid concentrations. The results of the simulations suggest that the mechanisms exhibit subdiffusion characteristics. Transportation quantities derive...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublicationThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublicationVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Influence of a Radio Frequency on RF Fingerprinting Accuracy Based on Ray Tracing Simulation
PublicationIn this paper the influence of a radio signal frequency on performance of Indoor Positioning System based on fingerprinting has been examined using ray-tracing simulations. It has been simulated how spatial distribution of an RF signal strength change with the signal’s frequency. The results were used to show its’ impact on the behavior of localization algorithms that are employing RSS measurements to determine node’s position...
-
Velocity measurement using the fdoa method in ground-based radio navigation system
PublicationVelocity is one of the main navigation parameters of the moving objects. However some systems of position estimation using radio wave measurements cannot provide velocity data due to limitation of their performance. In this paper a velocity measurement method for DS-CDMA radio navigation system is proposed, which doesn’t require full synchronization of reference stations carrier frequencies. The article presents basics of FDOA...
-
Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models
PublicationDeep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...
-
Advanced sensitivity analysis of the impact of the temporal distribution and intensity of rainfall on hydrograph parameters in urban catchments
PublicationKnowledge of the variability of the hydrograph of outflow from urban catchments is highly important for measurements and evaluation of the operation of sewer networks. Currently, hydrodynamic models are most frequently used for hydrograph modeling. Since a large number of their parameters have to be identified, there may be problems at the calibration stage. Hence, sensitivity analysis is used to limit the number of parameters....
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Działalność w obszarze grantów realizowana przez Katedrę Sieci Teleinformacyjnych
PublicationPrzedstawiono działalność Katedry Sieci Teleinformacyjnych PG WETI w obszarze grantów finansowanych przez instytucje centralne, przy czym główny nacisk położono na scharakteryzowanie aktualnie realizowanych projektów. Opisano dwa projekty finansowane przez NCBiR. Pierwszy dotyczy koncepcji oraz implementacji integracji informacji w rozproszonych elementach systemu wymiany danych Straży Granicznej, natomiast drugi strumieniowej...
-
Inteligentne systemy agentowe w systemach zdalnego nauczania
PublicationW pracy omówiono inteligentne systemy agentowe w systemach zdalnego nauczania. Po krótkim przedstawieniu ewolucji systemów zdalnego nauczania i ich wybranych zastosowań, scharakteryzowano inteligentne agenty edukacyjne. Omówiono wykorzystanie programowania genetycznego oraz algorytmów neuro-ewolucyjnych do implementacji oprogramowania tej klasy. Ponadto, nawiązano do modelu Map-Reduce, który efektywnie wspiera architekturę nowoczesnego...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublicationOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Projektowanie i eksploatacja dróg szynowych z wykorzystaniem mobilnych pomiarów satelitarnych
PublicationNiniejsza monografia zawiera szczegółowy opis aktywnych sieci geodezyjnych GNSS oraz modelowania dokładności określania pozycji w pomiarach satelitarnych. Omówiono również opracowaną technikę mobilnych pomiarów satelitarnych toru kolejowego oraz aplikacje związane z jej zastosowaniem w projektowaniu i eksploatacji dróg szynowych. Autorzy zawarli w pracy wyniki swoich badań, wykonywanych na przestrzeni lat 2009–2015. Badania przeprowadzono...
-
Jakość usług w optycznej sieci wielodomenowej z hierarchiczną strukturą płaszczyzn sterowania
PublicationW rozprawie przedstawiono przegląd architektur sieci z gwarancją jakości klas usług oraz stan prac w zakresie realizacji optycznych sieci ASON, GMPLS oraz ASON/GMPLS. Opisano wymagania i zaawansowanie prac w realizacji sieci ASON/GMPLS z hierarchiczną strukturą płaszczyzn sterowania oraz problemy związane z zagadnieniem jakości klas usług w tej sieci. Zaprezentowano założenia, koncepcję oraz realizację modelu symulacyjnego optycznej...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Disciplines and measures of information resilience
PublicationCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Dynamic Signal Strength Mapping and Analysis by Means of Mobile Geographic Information System
PublicationBluetooth beacons are becoming increasingly popular for various applications such as marketing or indoor navigation. However, designing a proper beacon installation requires knowledge of the possible sources of interference in the target environment. While theoretically beacon signal strength should decay linearly with log distance, on-site measurements usually reveal that noise from objects such as Wi-Fi networks operating in...
-
Fragmentation of Hydrographic Big Data Into Subsets During Reduction Process
PublicationThe article presented problems of fragmentation of hydrographic big data into smaller subsets during reduction process. Data reduction is a processing of reduce the value of the data set, in order to make them easier and more effective for the goals of the analysis. The main aim of authors is to create new reduction method. The article presented the first stage of this method – fragmentation of bathymetric data into subsets. It...
-
Fading Modelling in Dynamic Off-Body Channels
PublicationThis paper presents an off-body fading channel model for Body Area Networks. The proposed model, based on both simulations and measurements at 2.45 GHz in a realistic indoor environment, consists of three components: mean path loss, body shadowing, and multipath fading. The first is modelled as a log function of distance, the path loss exponent being in between 0.4 and 1.6. A statistical perspective is taken for the other two components,...
-
Applying Decisional DNA to Internet of Things: The Concept and Initial Case Study
PublicationIn this article, we present a novel approach utilizing Decisional DNA to help the Internet of Things capture decisional events and reuse them for decision making in future operations. The Decisional DNA is a domain-independent, standard and flexible knowledge representation structure that allows its domains to acquire, store, and share experiential knowledge and formal decision events in an explicit way. We apply this approach...
-
Risk Diagnosis and Management with BBN for Civil Engineering Projects during Construction and Operation
PublicationThe authors demonstrate how expert knowledge about the construction and operation phases combined with monitoring data can be utilized for the diagnosis and management of risks typical to large civil engineering projects. The methodology chosen for estimating the probabilities of risk elements is known as Bayesian Belief Networks (BBN). Using a BBN model one can keep on updating the risk event probabilities as the new evidence...
-
Residual MobileNets
PublicationAs modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...
-
Analysing and processing of geotagged social media
PublicationThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Evolution of artificial single-cell organisms foraging for resources in a 3-dimensional environment
PublicationForaging for resources is a simple cognitive task that even one-celled biological organisms can ac- complish. We present an Artificial Life system in which artificial unicellular organisms (animats) forage for food in a 3-dimensional simulated liquid environment. The movement of animats is controlled by evolving artificial gene regulatory networks encoded in linear genomes. When an animat consumes enough food, it produces offspring...
-
Energy recovery effectiveness in trolleybus transport
PublicationNowadays the issue of electric energy saving in public transport is becoming a key area of interest whichis connected both with a growth in environmental awareness of the society and an increase in the pricesof fuel and electricity. One of the possibilities to reduce energy consumption in urban public transport isto increase the extent of regenerative braking energy utilization. This can be achieved by its accumulationin the supercapacitors...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublicationProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Experimental Testbed of ASON/GMPLS architecture
PublicationThe paper presents the ASON/GMPLS architecture realized in the Department of Teleinformation Networks at Gdansk University of Technology based on the FSP 3000R7 ADVA Optical Networking platform. The FSP 3000R7 is a high-performance WDM networking system with GMPLS control plane for bidirectional transmission of optical signals. The system uses a modular structure which enables a flexible upgrade of capacity and functionality. The...
-
Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles
PublicationAs the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...
-
Damage detection in plates based on Lamb wavefront shape reconstruction
PublicationMany of the current studies in the area of damage detection using elastic wave propagation are based on deploying sensor networks with a large number of piezoelectric transducers to detect small-size cracks. A major limitation of these studies is that cracks are usually larger and have different shapes in real cases. Moreover, using a large number of sensing nodes for damage detection is both costly and computationally intensive....