Filtry
wszystkich: 11738
wybranych: 6398
-
Katalog
- Publikacje 6398 wyników po odfiltrowaniu
- Czasopisma 756 wyników po odfiltrowaniu
- Konferencje 412 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 292 wyników po odfiltrowaniu
- Wynalazki 2 wyników po odfiltrowaniu
- Projekty 18 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Aparatura Badawcza 4 wyników po odfiltrowaniu
- Kursy Online 273 wyników po odfiltrowaniu
- Wydarzenia 59 wyników po odfiltrowaniu
- Oferty 1 wyników po odfiltrowaniu
- Dane Badawcze 3520 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Narrowband Transmission Quality in Presence of Modified IEEE 802.15.4a Impulse Radio Interference
PublikacjaThis paper presents results of measurement of narrowband transmission quality in presence of impulse radio UWB interference. IEEE 802.15.4a UWB signal is being used as interferer, also with frame structure modifications which lead to change spectrum of the interference. Equations and coefficients which allow to calculate ratio between power of useful and interference signal are also presented.
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublikacjaIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Game about space or game in the space?
PublikacjaThe article analyzes various aspects of the actions taken by participants involved in the process of a spatial change. Such a process is described as a game about space or a game in the space. Different terminology is presented, in particular the meaning of: spatial order, regional studies, eco-development, sustainable development. Different forms of the game are analyzed: space as a theater, as a casino, as an area of conflict....
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublikacjaThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Neural Networks, Support Vector Machine and Genetic Algorithms for Autonomous Underwater Robot Support
PublikacjaIn this paper, artificial neural networks, a classification technique called support vector machine and meta-heuristics genetic algorithm have been considered for development in autonomous underwater robots. Artificial neural networks have been used for seabed modelling as well as support vector machine has been applied for the obstacles classification to avoid some collision problems. Moreover, genetic algorithm has been applied...
-
Cost minimization in wireless networks with a bounded and unbounded number of interfaces
PublikacjaPraca dotyczy problemu minimalizacji energii poprzez selektywne odłączanie urządzeń komunikacyjnych w wielointerfejsowych sieciach bezprzewodowych w taki sposób, by zapewnić realizację wymaganego grafu połączeń. Sformułowano problem optymalizacyjny, podano wyniki dotyczące jego trudności i zaproponowano algorytmy optymalizacyjne. Rozważono zarówno wariant, w którym liczba interfejsów komunikacyjnych jest parametrem stałym (narzuconym...
-
Efficiency of service recovery in scale-free optical networks under multiple node failures
PublikacjaIn this paper we examine the properties of scale-free networks in case of simultaneous failures of two networknodes. Survivability assumptions are as follows: end-to-end path protection with two node-disjoint backup pathsfor each working path. We investigate three models of scale-free networks generation: IG, PFP and BA.Simulations were to measure the lengths of active and backup paths and the values of service recovery time.We...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Specyfikacja Systemu IP QoS opartego na architekturze DiffServ
PublikacjaArtykuł przedstawia ogólną specyfikację systemu IP QoS (ang. Internet Protocol Quality of Service), który to system jest obecnie implementowany w ramach projektu krajowego "Zarządzanie ruchemw sieciach IP". System ten jest zgodny z architekturą DiffServ (ang. Differentiated Services) i architekturą NGN (Next Generation Networks). W szczególności, artykuł pokrótce omawia architekturęsystemu, oferowane klasy usług w systemie oraz...
-
Standard IEEE 802.21 - mechanizmy wspierania mobilności
PublikacjaRosnąca liczba dostępnych technik bezprzewodowych o zróżnicowanych funkcjonalnościach tworzy naturalną potrzebę opracowania metody koegzystencji i współpracy tych rozwiązań. Przedmiotem artykułu są mechanizmy wspierania mobilności w szerokopasmowych sieciach heterogenicznych serii IEEE 802.x w szczególności IEEE 802.11 (Wi-Fi) i Ieee 802.16 (WiMAX), a takze UMTS, oferowane praez standard Ieee 802.21. zawarte w pracy opisy 802.21...
-
A novel genetic approach to provide differentiated levels of service resilience in IP-MPLS/WDM networks
PublikacjaThis paper introduces a novel class-based method of survivable routing for connection-oriented IP-MPLS/WDM networks, called MLS-GEN-H. The algorithm is designed to provide differentiated levels of service survivability in order to respond to varying requirements of end-users. It divides the complex problem of survivable routing in IP-MPLS/WDM networks into two subproblems, one for each network layer, which enables finding the...
-
Narrowband interference suppression in IEEE 802.15.4a ultrawideband receiver
PublikacjaW referacie przedstawiono metodę redukcji wpływu silnych sygnałów wąskopasmowych na jakość transmisji ultraszerokopasmowej w standardzie IEEE 802.15.4a poprzez modyfikację sekwencji impulsów w odbiorniku korelacyjnym. Opisano strukturę rozpatrywanego odbiornika i sposób tworzenia zmodyfikowanych sekwencji wzorcowych, a także przedstawiono wyniki symulacji komputerowych jakości pracy łącza UWB w obecności zakłóceń o charakterze...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
PublikacjaIn this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...
-
Game theory, as a way for integrating of ship control systems
PublikacjaReferat przedstawia koncepcję wykorzystania algorytmów zastosowanych w teorii gier do zintegrowania układów sterowania statków, takich jak układ sterowania kursu i trajektorii statku, układ sterowania napędu statku, układ sterowania stabilizacji kołysań bocznych statku, itp. Jest to koncepcja oryginalna.
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublikacjaWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Survivability of unicast and anycast flows under attacks on networks
PublikacjaW artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...
-
Modeling of Wireless Traffic Load in Next Generation Wireless Networks
Publikacja -
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Service time distribution influence on end-to-end call setup delay calculation in networks with Session Initiation Protocol
PublikacjaThe most important GoS parameter for networks with SIP protocol is end-to-end call setup delay. So far there were no coherent models allowing calculation of these parameters for networks with SIP protocol. Few models were developed but they are insufficient. In the paper we propose model which allows end-to-end call setup delay calculation for networks with SIP protocol. The model is using chain of M/G/1/K models and is applicable...
-
Measurements of OF QoS/QoE parameters for media streaming in a PMIPv6 TESTBED WITH 802.11 b/g/n WLANs
PublikacjaA growing number of mobile devices and the increasing popularity of multimedia services result in a new challenge of providing mobility in access networks. The paper describes experimental research on media (audio and video) streaming in a mobile IEEE 802.11 b/g/n environment realizing network-based mobility. It is an approach to mobility that requires little or no modification of the mobile terminal. Assessment of relevant parameters...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublikacjaApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublikacjaThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublikacjaA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Interoperability Constraints in Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...
-
Network lifetime maximization in wireless mesh networks for machine-to-machine communication
Publikacja -
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublikacjaDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Study on Speech Transmission under Varying QoS Parameters in a OFDM Communication System
PublikacjaAlthough there has been an outbreak of multiple multimedia platforms worldwide, speech communication is still the most essential and important type of service. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission, based most often on multi-valued modulations, multiple...
-
Chapter 11 – Application of Chemical Sensors and Sensor Matrixes to Air Quality Evaluation
PublikacjaIndoor and outdoor air quality is one of the key factors influencing human health. However, air quality evaluation is not easy task. Air is a complex system, which is subjected to changes even within short period of time. Progress in analytical methods and analytical tools provides increasingly more reliable information on the condition and quality of indoor and outdoor air. This progress, however, generates an increase in the...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublikacjaProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Integration of brood units in game universe
PublikacjaAn access to a great number of various services allows for decomposition of complex problems Developing a game universe usually involves creation of various units which can be encountered by a player. Those can be lonely or organized in broods animals and monsters wandering around the game world. In order to provide natural gaming experience those units should behave variously depending on the world situation. Those behaviours...
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Implementacja warstwy danych i sterowania dla Równoległego Internetu IPv6 QoS
PublikacjaW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. W sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakietów w sieci. Implementacja węzłów IPv6 QoS w środowisku umożliwiającym...
-
Design, Realization and Measurements of Enhanced Performance 2.4 GHz ESPAR Antenna for Localization in Wireless Sensor Networks
PublikacjaThis paper presents the design, realization and measurements of an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna with enhanced performance of estimating the incoming signal direction. Designed antenna is dedicated for 2.4 GHz ISM applications with emphasis on Wireless Sensor Networks (WSN). Proposed antenna provides different radiation patterns by proper configuration of the parasitic elements. Thus, several...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublikacjaZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
Research on Quality Requirements of Data Transmission Services in RSMAD
PublikacjaThe paper presents a results and analysis of research of the quality of service requirements (defined by the QoS attributes) for imaging data transmission services using Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents and discusses results of test on the impact of the size of photos from traffic enforcement cameras on the average transmission time. These...
-
Cellular network quality evaluation at a university campus on the eve of 5G
PublikacjaThanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublikacjaIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Evaluation of Workflow Runtime Platforms in Service Composition
PublikacjaTypically, workflow applications are constructed from basic functionalities that may be realized by alternative services deployed in heterogeneous runtime platforms. Depending on workflow structure and selection of services, the applications differ in attributes such as price, Quality of Service (QoS) and others. In the paper, we propose a method of evaluation of workflow runtime platforms using Data Envelopment Analysis. We present...
-
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publikacja -
Analiza algorytmów rutingu wspierających QoS w DiffServ.
PublikacjaW artykule podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość...