Filtry
wszystkich: 1918
wybranych: 412
Wyniki wyszukiwania dla: NODE-TARGETED ATTACKS
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublikacjaArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublikacjaW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublikacjaTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Wpływ smarowności na działania układu tribologicznego (impact of lubricity on the tribological system action)
Publikacjathe paper presents analysis and evaluation, based on tests results, of the impact of lubricity of the used lubricating oils (shell argina t 40) on the action of boundary layer of sulzer 6zl40/48 engines aboard the ''włocławek'' sea-going ship. for comparison purposes, the same oils were tested with the ceramizer four-stroke engine (all types of the vidar four-stroke engines) regeneration agent added. so understood boundary layer...
-
A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPI Applications
PublikacjaThe paper presents a fail-safe NVRAM based mechanism for creation and recovery of data copies during parallel MPI application runtime. Specifically, we target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload...
-
Novel Adaptive Method for Data Streams Allocation Based on the Estimate of Radio Channel Parameters in Heterogeneous WBAN Network
PublikacjaThe new adaptive method for data streams allocation in heterogeneous Wireless Body Area Networks and meas-urement equipment is presented. The results obtained using the developed method compared with the selected algorithms likely to be used in those networks. The pro-posed adaptive data streams allocation method based on radio channel parameters makes it even twice as efficient to use in terms of resources usage in a WBAN heterogeneous...
-
Structural response of existing spatial truss roof construction based on Cosserat rod theory
PublikacjaPaper presents the application of the Cosserat rod theory and newly developed associated finite elements code as the tools that support in the expert-designing engineering practice. Mechanical principles of the 3D spatially curved rods, dynamics (statics) laws, principle of virtual work are discussed. Corresponding FEM approach with interpolation and accumulation techniques of state variables are shown that enable the formulation...
-
Timber Frame Houses with Different Insulation Materials - Seismic Analysis
PublikacjaThe aim of this article is to present results of a dynamic numerical analysis focused on the response of two timber frame building structures exposed to seismic excitations. The first structure was insulated with mineral wool, while the second one with polyurethane foam. Specifications and technology involved in the models' construction are based on the previously conducted experimental study, upon which numerical structural models...
-
Reliability model of slide bearings with particular attention given to lubricating oil
PublikacjaThe paper presents the slide bearing with circulating lubrication as a system of series three-element structure, where lubricating oil is the weakest link. In accordance with the Pierce statement that ''strength of chain is the strength of its weakest link'', a bearing reliability model has been developed. It allows to use the lubricating oil to evaluate the probability of correct working of the whole slide bearing, i.e. the reliability....
-
Bacteriophages as potential tools for use in antimicrobial therapy and vaccine development
PublikacjaThe constantly growing number of people suffering from bacterial, viral, or fungal infections, parasitic diseases, and cancers prompts the search for innovative methods of disease prevention and treatment, especially based on vaccines and targeted therapy. An additional problem is the global threat to humanity resulting from the increasing resistance of bacteria to commonly used antibiotics. Conventional vaccines based on bacteria...
-
A Mesh Deformation Technique Based on Solid Mechanics for Parametric Analysis of High-Frequency Devices With 3-D FEM
PublikacjaIn this paper, a versatile technique for mesh defor- mation is discussed, targeted at the electromagnetic (EM) field simulation of high-frequency devices using the 3-D finite element method (FEM). The approach proposed applies a linear elasticity model to compute the displacements of the internal mesh nodes in 3-D when the structure geometry is changed. The technique is compared with an alternative approach...
-
Direct brain stimulation modulates encoding states and memory performance in humans
PublikacjaPeople often forget information because they fail to effectively encode it. Here, we test the hypothesis that targeted electrical stimulation can modulate neural encoding states and subsequent memory outcomes. Using recordings from neurosurgical epilepsy patients with intracranially implanted electrodes, we trained multivariate classifiers to discriminate spectral activity during learning that predicted remembering from forgetting,...
-
Nanotubular oxide layers and hydroxyapatite coatings on porous titanium alloy Ti13Nb13Zr
PublikacjaThe surface condition of an implant has a significant impact on response occurring at the implant-biosystem border. The knowledge of physical-chemical and biological processes allows for targeted modification of biomaterials to induce a specified response of a tissue. The present research was aimed at development of technology composing of obtaining the nanotube oxide layers on a porous titanium alloy Ti13Nb13Zr, followed by the...
-
Development of chromatographic and mass spectrometry conditions for untargeted lipidomic analysis of human breast milk
PublikacjaHuman breast milk (HBM) is a complex biofluid containing components which are essential for the proper growth of the newborn (for example nutrients such as carbohydrates, proteins, lipids) and also bioactive substances. According to the literature, most of studies involving HBM nutrients investigations focused essentially on the determination of proteins. The molecular composition of lipids in HBM is not well known as the protein...
-
HDAC Inhibitors: Innovative Strategies for Their Design and Applications
PublikacjaHistone deacetylases (HDACs) are a large family of epigenetic metalloenzymes that are involved in gene transcription and regulation, cell proliferation, differentiation, migration, and death, as well as angiogenesis. Particularly, disorders of the HDACs expression are linked to the development of many types of cancer and neurodegenerative diseases, making them interesting molecular targets for the design of new efficient drugs...
-
Analytical Strategies and Applications in Lipidomics
PublikacjaLipidomics is a field of study aiming at a comprehensive analysis of a set of lipids in biological systems. This includes both quantitative and qualitative characterization of lipid profiles, comparative studies of lipidomes, and analysis of lipid-protein interactions. Lipids are structurally diversified that make their analysis a challenging task. The constant advances in analytical technologies, especially in the field of high-performance...
-
What is the future of digital education in the higher education sector? An overview of trends with example applications at Gdańsk Tech, Poland
PublikacjaUniversities worldwide recognise the need to adapt to changes in society, the economy and the way young people prefer to learn. Additionally, the impetus to improve the digital approach in higher education intensifies as educational institutions have to remain competitive with commercial providers of education. Following the latest technological trends and implementing strategies to develop new digital solutions helps to improve...
-
Impact of low temperature on bacterial community dynamics and process efficiency in anaerobic ammonia removal: A network analysis of metagenomic data
PublikacjaThe implementation of anaerobic ammonia removal has potential for reducing the operating costs in wastewater treatment plants. However, the application of this process in mainstream treatment presents various challenges, particularly due to the sensitivity of anammox bacteria to low temperatures. To address these challenges, changes in the bacterial community were investigated under decreasing temperatures (from 30 to 12 °C) within...
-
Quality Modeling in Grid and Volunteer-Computing Systems
PublikacjaA model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Cops, a fast robber and defensive domination on interval graphs
PublikacjaThe game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublikacjaA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublikacjaIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
QoS Extensions for Flow-Awareness Networks
PublikacjaThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublikacjaW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
Ochrona odbiorników GNSS przed zakłóceniami celowymi
PublikacjaArtykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...
-
An Efficient Framework For Fast Computer Aided Design of Microwave Circuits Based on the Higher-Order 3D Finite-Element Method
PublikacjaIn this paper, an efficient computational framework for the full-wave design by optimization of complex microwave passive devices, such as antennas, filters, and multiplexers, is described. The framework consists of a computational engine, a 3D object modeler, and a graphical user interface. The computational engine, which is based on a finite element method with curvilinear higher-order tetrahedral elements, is coupled with built-in...
-
Molecular Targets for Anticandidal Chemotherapy
PublikacjaA relatively small number of anticandidal chemotherapeutics used in clinical practice is at least in part consequence of a limited number of their molecular targets: ergosterol in the membrane, lanosterol demethylase, b(1!3) glucan synthase, and DNA/RNA biosynthesis. Much more potential novel targets have been revealed by the comparative genomic studies identifying essential genes unique for Candida albicans or resulted from recognition...
-
Rhamnolipid CMC Prediction
PublikacjaRelationships between the purity, pH, hydrophobicity (log Kow) of the carbon substrate, and the critical micelle concentration (CMC) of rhamnolipid type biosurfactants (RL) were investigated using a quantitative structure–property relationship (QSPR) approach and are presented here for the first time. Measured and literature CMC values of 97 RLs, representing biosurfactants at different stages of purification, were considered....
-
Extended investigation of performance-energy trade-offs under power capping in HPC environments
Publikacja—In the paper we present investigation of performance-energy trade-offs under power capping using modern processors. The results are presented for systems targeted at both server and client markets and were collected from Intel Xeon E5 and Intel Xeon Phi server processors as well as from desktop and mobile Intel Core i7 processors. The results, when using power capping, show that we can find various interesting combinations of...
-
Development of Strategies for AOB and NOB Competition Supported by Mathematical Modeling in Terms of Successful Deammonification Implementation for Energy-Efficient WWTPs
PublikacjaNovel technologies such as partial nitritation (PN) and partial denitritation (PDN) could be combined with the anammox-based process in order to alleviate energy input. The former combination, also noted as deammonification, has been intensively studied in a frame of lab and full-scale wastewater treatment in order to optimize operational costs and process efficiency. For the deammonification process, key functional microbes include...
-
Synchronous black hole search in directed graphs
PublikacjaThe paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...
-
Numerical study on seismic response of a base-isolated building modelled with shell elements
PublikacjaSeismic isolation is counted among the most popular and effective means of protecting structures against earthquake forces. Base isolators, like Lead-Rubber Bearings (LRB), High-Damping Rubber Bearings (HDB) or Friction Pendulum Systems (FPS) are extensively used in practice in many earthquake-prone regions of the world. The present paper reports the results obtained from the numerical study on seismic response of a base-isolated...
-
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix
PublikacjaIn this paper we build on our previously proposed MPI I/O NVRAM distributed cache for high performance computing. In each cluster node it incorporates NVRAMs which are used as an intermediate cache layer between an application and a file for fast read/write operations supported through wrappers of MPI I/O functions. In this paper we propose optimizations of the solution including handling of write requests with a synchronous mode,...
-
Radio Channel Measurements in 868 MHz Off-Body Communications in a Ferry Environment
PublikacjaIn this paper, a characterization of the 868 MHz off-body radio channel in BANs is presented. Measurements were carried out in a ferry environment using a specific set-up. A method for path loss using radio distance measurements (RDMs) was developed. It allows to automate the measurements process and make it independent from the variable speed of a moving person. Based on the observed path loss as a function of distance, the obtained...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Towards truly sustainable IoT systems: the SUPERIOT project
PublikacjaThis paper provides an overview of the SUPERIOT project, an EU SNS JU (Smart Networks and Services Joint Undertaking) initiative focused on developing truly sustainable IoT systems. The SUPERIOT concept is based on a unique holistic approach to sustainability, proactively developing sustainable solutions considering the design, implementation, usage and disposal/reuse stages. The concept exploits radio and optical technologies...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Stress-driven nonlocal elasticity for nonlinear vibration characteristics of carbon/boron-nitride hetero-nanotube subject to magneto-thermal environment
PublikacjaStress-driven nonlocal theory of elasticity, in its differential form, is applied to investigate the nonlinear vibrational characteristics of a hetero-nanotube in magneto-thermal environment with the help of finite element method. In order to more precisely deal with the dynamic behavior of size-dependent nanotubes, a two-node beam element with six degrees-of freedom including the nodal values of the deflection, slope and curvature...
-
Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios
PublikacjaDisjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...
-
A 0.5 V Nanowatt Biquadratic Low-Pass Filter with Tunable Quality Factor for Electronic Cochlea Applications
PublikacjaA novel implementation of an analogue low-power, second-order, low-pass filter with tunable quality factor (Q) is presented and discussed. The filter feature is a relatively simple, buffer-based, circuit network consisting of eleven transistors operating in a subthreshold region. Q tuning is accomplished by injecting direct current into a network node, which changes the output resistance of the transistors and, as a result, modifies...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublikacjaIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
Portable Electronic Nose Based on Electrochemical Sensors for Food Quality Assessment
PublikacjaThe steady increase in global consumption puts a strain on agriculture and might lead to a decrease in food quality. Currently used techniques of food analysis are often labour-intensive and time-consuming and require extensive sample preparation. For that reason, there is a demand for novel methods that could be used for rapid food quality assessment. A technique based on the use of an array of chemical sensors for holistic analysis...
-
Uncertainty of antioxidant profiling in complex mixtures using liquid chromatography involving post-column derivatisation
PublikacjaThe main goal of this paper is to discuss the problems associated with antioxidant profiling in complex samples using a high-throughput HPLC system coupled with post-column derivatisation reactor. Based on the experimental data reported in the literature, we demonstrated that improper optimisation of temperature and/or pH assay conditions performed using an on-line derivatisation reactor may substantially change the antioxidant...
-
Electronic structure of intertwined kagome, honeycomb, and triangular sublattices of the intermetallics MCo2Al9 ( M = Sr, Ba)
PublikacjaIntermetallics are an important playground to stabilize a large variety of physical phenomena, arising from their complex crystal structure. The ease of their chemical tunabilty makes them suitable platforms to realize targeted electronic properties starting from the symmetries hidden in their unit cell. Here, we investigate the family of the recently discovered intermetallics MCo2Al9 (M=Sr, Ba) and we unveil their electronic structure....
-
Toward a unified model of mobile Business Intelligence (m-BI) acceptance and use
PublikacjaFactors affecting mobile business intelligence (m-BI) acceptance and use have become an increasingly important topic in practice due to the growing complexity of organizations, and their underlying information systems (IS). Since, one can notice considerable interest in m-BI, however, to the best of our knowledge few studies (if any) aim to synthesize the existing body of knowledge with regards to the factors affecting m-BI acceptance...
-
Active Learning on Ensemble Machine-Learning Model to Retrofit Buildings Under Seismic Mainshock-Aftershock Sequence
PublikacjaThis research presents an efficient computational method for retrofitting of buildings by employing an active learning-based ensemble machine learning (AL-Ensemble ML) approach developed in OpenSees, Python and MATLAB. The results of the study shows that the AL-Ensemble ML model provides the most accurate estimations of interstory drift (ID) and residual interstory drift (RID) for steel structures using a dataset of 2-, to 9-story...