Filters
total: 4129
filtered: 1067
displaying 1000 best results Help
Search results for: SELFISH NODES
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublicationThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as a...
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublicationThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as...
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study
PublicationThis study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Average Redundancy of the Shannon Code for Markov Sources
PublicationIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring
PublicationOne of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Distributed Evacuation in Graphs with Multiple Exits
PublicationWe consider the problem of efficient evacuation using multiple exits. We formulate this problem as a discrete problem on graphs where mobile agents located in distinct nodes of a given graph must quickly reach one of multiple possible exit nodes, while avoiding congestion and bottlenecks. Each node of the graph has the capacity of holding at most one agent at each time step. Thus, the agents must choose their movements strategy...
-
Stationary underwater channel experiment: Acoustic measurements and characteristics in the Bornholm area for model validations
PublicationThe underwater acoustical channel is time-variant, and even on small time scales there is often existing no ‘acoustical frozen ocean’. Popular is the use of WSSUS-channel transmission modeling (Wide-Sense Stationary Uncorrelated Scattering) for the stochastic description of bandpass signals in GSM mobile phones with moving participants; since this results in a halved number of model parameters. For underwater sound applications...
-
Rendezvous of Distance-Aware Mobile Agents in Unknown Graphs
PublicationWe study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Bounds on the Cover Time of Parallel Rotor Walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublicationA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Runtime Visualization of Application Progress and Monitoring of a GPU-enabled Parallel Environment
PublicationThe paper presents design, implementation and real life uses of a visualization subsystem for a distributed framework for parallelization of workflow-based computations among clusters with nodes that feature both CPUs and GPUs. Firstly, the proposed system presents a graphical view of the infrastructure with clusters, nodes and compute devices along with parameters and runtime graphs of load, memory available, fan speeds etc. Secondly,...
-
Data Partitioning and Task Management in the Clustered Server Layer of the Volunteer-based Computation System
PublicationWhile the typical volunteer-based distributed computing system focus on the computing performance, the Comcute system was designed especially to keep alive in the emergency situations. This means that designers had to take into account not only performance, but the safety of calculations as well. Quadruple-layered architecture was proposed to separate the untrusted components from the core of the system. The main layer (W) consists...
-
Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios
PublicationDisjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...
-
Towards truly sustainable IoT systems: the SUPERIOT project
PublicationThis paper provides an overview of the SUPERIOT project, an EU SNS JU (Smart Networks and Services Joint Undertaking) initiative focused on developing truly sustainable IoT systems. The SUPERIOT concept is based on a unique holistic approach to sustainability, proactively developing sustainable solutions considering the design, implementation, usage and disposal/reuse stages. The concept exploits radio and optical technologies...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids
PublicationSmart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....
-
A Review of Antennas for Indoor Positioning Systems
PublicationThis paper provides a review of antennas applied for indoor positioning or localization systems. The desired requirements of thoseantennas when integrated in anchor nodes (reference nodes) are discussed, according to different localization techniques and theirperformance. The described antennas will be subdivided into the following sections according to the nature of measurements:received signal strength (RSS), time of flight (ToF),...
-
An additional ultrasonographic sign of Hashimoto’s lymphocytic thyroiditis in children
PublicationWe present an additional sonographic sign of Hashimoto’s thyroiditis (HLT), increasing the specifi city of this method in pediatric populations. Methods: A total of 98 children (mean age 12.7 years, range 7–17 years) were selected from the registry of the endocrinology outpatient department. All subjects met the diagnostic criteria for HLT. All children underwent a prospective thyroid ultrasound examination with special attention...
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublicationMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns
PublicationIn this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Experimental Testing of Innovative Cold-Formed "GEB" Section / Badania Eksperymentalne Innowacyjnego Kształtownika Giętego Na Zimno Typu „Geb“
PublicationOne of the major advantages of light gauge steel structures made of cold-formed steel sections is their low weight, so manufacturers are increasingly using the possibilities of those sections for the production of typical single-storey steel structures systems. Well known profiles, such as Z, C and the so called hat sections that have been studied and described in the literature, are used mainly as purlins or truss components....
-
Dedukcja zachowań węzłów sieci ad hoc na podstawie potwierdzeń końcowych: ocena dokładności
PublicationPrzebadano precyzję algorytmu dedukcji rzeczywistych spolegliwości węzłów sieci MANET w oparciu o potwierdzenia end-to-end i bez użycia mechanizmu watchdog. W przeprowadzonych eksperymentach numerycznych wskazano charakterystyki topologiczne wpływające na tę precyzję.
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublicationWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Standing Waves in One-Dimensional Resonator Contaning an Ideal Isothermal Gas Affected by the Constant Mass Force
PublicationThe study is devoted to standing acoustic waves in one-dimensional planar resonator which containing an ideal gas. A gas is affected by the constant mass force. Two types of physically justified boundary conditions are considered: zero velocity or zero excess pressure at both boundaries. The variety of nodal and antinodal points is determined. The conclusion is that the nodes of pressure and antinodes of velocity do not longer...
-
Te use of acoustic emission for assessment of the oil lubricity in a four-ball tester
Publicationin view of the increased dynamic and temperature load in the compression-ignition engine tribological systems, particular attention is drawn to the problem of such lubrication of the friction nodes that after breaking the boundary layer it could be restored without any wear occurring. therefore, an idea has been devised of introducing to friction nodes, with the lubrication oils, of new substances (operational preparations) modifying...
-
Dekodowanie kodów iterowanych z użyciem sieci neuronowej
PublicationNadmiarowe kody iterowane są jedną z prostych metod pozyskiwania długich kodów korekcyjnych zapewniających dużą ochronę przed błędami. Jednocześnie, chociaż ich podstawowy iteracyjny dekoder jest prosty koncepcyjnie oraz łatwy w implementacji, to nie jest on rozwiązaniem optymalnym. Poszukując alternatywnych rozwiązań zaproponowano, przedstawioną w pracy, strukturę dekodera tego typu kodów wspomaganą przez sieci neuronowe. Zaproponowane...
-
Interaction between acoustic and non-acoustic mode in bubbly liquid
PublicationThe nonlinear interaction of acoustic and entropy modes in a bubbly liquid is the subject of investigation. Thedynamic equation governing an excess density of the entropy mode is derived. Nonlinearity and dispersion are the reasons forexcitation of the entropy mode. The nonlinear interaction of modes as a reason for bubble to grow due to sound, is discovered.Some numerical examples of the modes interactions are made.
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Aplikacja demonstrująca działanie kodów fontannowych
PublicationIstotną cechą kodów fontannowych jest możliwość odtwarzania nadawanych danych niezależnie od jakości kanału. Wynika to z tego, że kody te nie mają z góry założonej zawartości informacyjnej, a kolejne symbole nadmiarowe są generowane, dopóki jest taka potrzeba. Jest to szczególnie przydatne w transmisjach broadcastowych, bo każdy z odbiorców może zdekodować dane tak wcześnie, na ile pozwala jakość łącza. Aby przybliżyć funkcjonowanie...
-
Reconstruction of 3D structure of positive corona streamer by local methods
PublicationThe computer algorithms were used for reconstruction of streamer 3D structure. We propose the 3D tree structure model of corona discharge streamer composed with nodes and edges between chosen couples of nodes, which enables easy computation of some important parameters ofstreamers. The 3D model can be derived directly from two projection images by global methods like evolutionary searching or particle simulations. In this paper...
-
Natural Deep Eutectic Solvents as Agents for Improving Solubility, Stability and Delivery of Curcumin
PublicationPurpose Study on curcumin dissolved in natural deep eutectic solvents (NADES) was aimed at exploiting their beneficial properties as drug carriers. Methods The concentration of dissolved curcumin in NADES was measured. Simulated gastrointestinal fluids were used to determine the concentration of curcumin and quantum chemistry computations were performed for clarifying the origin of curcumin solubility enhancement in NADES. Results NADES...
-
Civil liability for artificial intelligence products versus the sustainable development of CEECs: which institutions matter?
PublicationThe aim of this paper is to conduct a meta-analysis of the EU and CEECs civil liability institutions in order to find out if they are ready for the Artificial Intelligence (AI) race. Particular focus is placed on ascertaining whether civil liability institutions such as the Product Liability Directive (EU) or civil codes (CEECs) will protect consumers and entrepreneurs, as well as ensure undistorted competition. In line with the...
-
Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
PublicationThis document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled...
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublicationNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
Non-Wave Variations in Temperature Caused by Sound in a Chemically Reacting Gas
PublicationA weakly nonlinear generation of non-acoustic modes in the field of sound in a gas is considered. An exotericchemical reaction of A->B type, which takes place in a gas, may be reversible or not. Two types of sound areconsidered, low-frequency and high-frequency as compared with the characteristic time of a chemical reaction.For both these cases, the governing equations of non-acoustic modes are derived and conclusions of the efficiencyof...
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...