Filters
total: 3462
filtered: 286
Search results for: NADES
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Distinguishing views in symmetric networks: A tight lower bound
PublicationThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids
PublicationSmart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....
-
Reliability model of the crankshaft-piston assembly
PublicationThe laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...
-
Collaborative Delivery by Energy-Sharing Low-Power Mobile Robots
PublicationWe study two variants of delivery problems for mobile robots sharing energy. Each mobile robot can store at any given moment at most two units of energy, and whenever two robots are at the same location, they can transfer energy between each other, respecting the maximum capacity. The robots operate in a simple graph and initially each robot has two units of energy. A single edge traversal by an robot reduces its energy by one...
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublicationThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
A Review of Antennas for Indoor Positioning Systems
PublicationThis paper provides a review of antennas applied for indoor positioning or localization systems. The desired requirements of thoseantennas when integrated in anchor nodes (reference nodes) are discussed, according to different localization techniques and theirperformance. The described antennas will be subdivided into the following sections according to the nature of measurements:received signal strength (RSS), time of flight (ToF),...
-
An additional ultrasonographic sign of Hashimoto’s lymphocytic thyroiditis in children
PublicationWe present an additional sonographic sign of Hashimoto’s thyroiditis (HLT), increasing the specifi city of this method in pediatric populations. Methods: A total of 98 children (mean age 12.7 years, range 7–17 years) were selected from the registry of the endocrinology outpatient department. All subjects met the diagnostic criteria for HLT. All children underwent a prospective thyroid ultrasound examination with special attention...
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublicationMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns
PublicationIn this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Total restrained bondage in graphs
PublicationPodzbiór D zbioru wierzchołków grafu nazywamy zewnętrznie totalnym dominującym w grafie, jeśli każdy wierzchołek spoza D ma sąsiada zarówno w D jak i poza D. Moc najmniejszego zbioru o tej własności nazywamy liczbą dominowania zewnętrznie totalnego. W artykule badamy wpływ usuwania krawędzi na liczbę dominowania zewnętrznie totalnego, czyli liczbę zewnętrznego totalnego zniewolenie w grafach.
-
Asynchronous distributed state estimation for continuous-time stochastic processes
PublicationWe consider the problem of state estimation of a continuous-time stochastic process using an asynchronous distributed multi-sensor estimation system (ADES). In an ADES the state of a process of interest is estimated by a group of local estimators. Each local estimator based, for example, on a Kalman filter, performs single sensor filtration but also fusion of its local results and results from other (remote) processors to compute...
-
Modeling of truss with cold-formed section and positive eccentricity in the node
PublicationThis work is dedicated to establishing the load carrying capacity of tensed and compressed truss’ nodes made of cold-formed open cross sections. The occurrence of bending in the truss’ nodes is the result of a specific production technology for system lattice girders assumed by the designer and the producer. The aim of this research is to present the methodology of conduct for creation of computational models that best depict the...
-
Investigation of antifungal and antibacterial potential of green extracts of propolis
PublicationPropolis extracts have been used in traditional medicines since ages due to its advantageous complex chemical composition. However, the antibacterial and antifungal activity of poplar propolis extracts prepared in Natural Deep Eutectic Solvent (NADES) are seldom studied. This study investigates suitable alternate for ethanol as a solvent for extraction for Polish poplar propolis. It also attempts to identify suitable extraction...
-
Standing Waves in One-Dimensional Resonator Contaning an Ideal Isothermal Gas Affected by the Constant Mass Force
PublicationThe study is devoted to standing acoustic waves in one-dimensional planar resonator which containing an ideal gas. A gas is affected by the constant mass force. Two types of physically justified boundary conditions are considered: zero velocity or zero excess pressure at both boundaries. The variety of nodal and antinodal points is determined. The conclusion is that the nodes of pressure and antinodes of velocity do not longer...
-
Te use of acoustic emission for assessment of the oil lubricity in a four-ball tester
Publicationin view of the increased dynamic and temperature load in the compression-ignition engine tribological systems, particular attention is drawn to the problem of such lubrication of the friction nodes that after breaking the boundary layer it could be restored without any wear occurring. therefore, an idea has been devised of introducing to friction nodes, with the lubrication oils, of new substances (operational preparations) modifying...
-
Drawing maps with advice
PublicationW pracy podejmujemy temat konstrukcji algorytmu dla agenta, który zostaje umieszczony w dowolnym wierzchołku grafu (wierzchołki są nierozróżnialne, krawędzie mają etykiety portów), po czym realizuje algorytm zmierzający do znalezienia drzewa spinającego grafu lub izomorficznej kopii grafu. Dla obu problemów podajemy asymptotycznie dokładne lub prawie dokładne oszacowania na ilość bitów dodatkowej informacji, którą agent musi otrzymać...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Reconstruction of 3D structure of positive corona streamer by local methods
PublicationThe computer algorithms were used for reconstruction of streamer 3D structure. We propose the 3D tree structure model of corona discharge streamer composed with nodes and edges between chosen couples of nodes, which enables easy computation of some important parameters ofstreamers. The 3D model can be derived directly from two projection images by global methods like evolutionary searching or particle simulations. In this paper...
-
A ROLE PLAYING GAME NAME GENERATOR LEARNING ITS CREATIVITY FROM ARKADIA MUD PLAYERS
PublicationThe paper proposes an approach to creative generation of new names for the purposes of Role Playing Games in fantasy realms. The generator based on an existing database of na mes is able to propose a set of new names with regard to demanded attributes, such as: length of the name, sex and race of the character, a given p hrase as the origin for the generated name as well as subjective evaluations from former users. The software...
-
Dedukcja zachowań węzłów sieci ad hoc na podstawie potwierdzeń końcowych: ocena dokładności
PublicationPrzebadano precyzję algorytmu dedukcji rzeczywistych spolegliwości węzłów sieci MANET w oparciu o potwierdzenia end-to-end i bez użycia mechanizmu watchdog. W przeprowadzonych eksperymentach numerycznych wskazano charakterystyki topologiczne wpływające na tę precyzję.
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
On-line Search in Two-Dimensional Environment
PublicationWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...
-
The reliability of tree and star networks
PublicationThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
Wireless Systems of Threats Monitoring
PublicationConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
New Method for Increasing Precision of Position Estimation of a Moving Person in Hybrid Inertial Navigation System
PublicationIn this article a new method for increasing precision of position estimation of inertial navigation in hybrid localization system with reduced number of reference nodes for radio distance measurements is presented. Measuring tests were carried out to verify precision of position estimation of moving person in indoor environment.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Kantowska filozofia moralnosci a współczesnie etyka zawodowa
PublicationZmiana dokonuwujaca sie w obrebie etyki zawodowej i organizacyjnej, a mianowicie fakt przekształcania się jej w etykę dyskursu, odsyła, poprzez operację uniwersalizacji do kantowskiej filozofii moralności: kantowski model legitymizacji moralności jest wskutek tego nader aktualny.
-
Synchronous black hole search in directed graphs
PublicationThe paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...
-
Localization in wireless sensor networks using switched parasitic antennas
PublicationA switched parasitic monopole antenna for 2.4 GHz ISM applications is design and investigated in this paper. One of the most promising applications for such switched-beam antennas is localization in wireless sensor networks (WSN). It is demonstrated that the use of this antenna improves accuracy of localization algorithms and allows for reduction of the number of reference nodes in localization system.
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublicationWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
New Method for Increasing Precision of Position Estimation in Hybrid Inertial Navigation System
PublicationIn article new method for increasing precision of position estimation by using inertial navigation in hybrid localization system with reduced number of reference nodes for radio distance measurements was presented. Measuring campaign using developed measuring stand were carried out to verify precision of position estimation of moving person in indoor environment.
-
Błędy w przedstawianiu wyników pomiarów i wartości wielkości fizycznych popełniane w pracach studenckich
PublicationArtykuł powstał na bazie doświadczeń zdobytych podczas pracy dydaktycznej autora jako wykładowcy i nauczyciela akademickiego prowadzącego zajęcia w Laboratorium Podstaw Metrologii. Przytoczono przykłady nieprawidłowości w przedsta-wianiu wyników pomiarów i wartości wielkości fizycznych pochodzące z prac pisemnych studentów i skonfrontowano je z zaleceniami Międzynarodowego Układu Jednostek Miar (SI), oraz polskimi aktami prawnymi.
-
Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces
PublicationIndustry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular massive multiple-input multiple-output (MIMO), and its future evolution Large Intelligent Surfaces (LIS), which provide more reliable channel quality than previous technologies. As such, there arises the need to perform efficient scheduling of industrial control traffic...
-
Three levels of fail-safe mode in MPI I/O NVRAM distributed cache
PublicationThe paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...
-
Calibration-Free Single-Anchor Indoor Localization Using an ESPAR Antenna
PublicationIn this paper, we present a novel, low-cost approach to indoor localization that is capable of performing localization processes in real indoor environments and does not require calibration or recalibration procedures. To this end, we propose a single-anchor architecture and design based on an electronically steerable parasitic array radiator (ESPAR) antenna and Nordic Semiconductor nRF52840 utilizing Bluetooth Low Energy (BLE)...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublicationNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
A concept of measurement system based on the Z-Wave standard
PublicationIn the paper a new concept of measurement system based on the Z-Wave standard is presented. This standard is dedicated to use mainly in home automation systems, but its properties enable to use it in dispersed measurement systems and support wireless communication between measurement nodes in a mesh-type network. In the paper basic metrological aspects of the Z-Wave standard and an example of impedance measurement system are discussed.
-
The Methodology of identifying the place to install shunt compensators in the transmission network
PublicationThis methodology of selection and localization of static com- paper presents pensators in wide network. Proposed method is based on analysis of voltage area power profiles in the nodes of the power grid, and designating locations, In Which Voltages ex- cessively tend to change in time. Practical way of modeling the SVC device in PLANS program you Presented, as well as some example results of research.
-
Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations
PublicationNowadays Internet of Things is gaining more and more focus all over the world. As a concept it gives many opportunities for applications for society and it is expected that the number of software services deployed in this area will still grow fast. Especially important in this context are properties connected with deployment such as portability, scalability and balance between software requirements and hardware capabilities. In...