Filtry
wszystkich: 1062
wybranych: 525
-
Katalog
- Publikacje 525 wyników po odfiltrowaniu
- Czasopisma 79 wyników po odfiltrowaniu
- Konferencje 34 wyników po odfiltrowaniu
- Osoby 184 wyników po odfiltrowaniu
- Projekty 6 wyników po odfiltrowaniu
- Kursy Online 17 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 216 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: ict information and communication technology
-
End-to-end service survivability under attacks on networks
PublikacjaW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublikacjaZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
Propagation Path Loss Modeling in Container Terminal Environment
PublikacjaThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
A framework for detection of selfishness in multihop mobile ad hoc networks
PublikacjaThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Approximation of Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture Using Phase-Type Distributions
PublikacjaCurrently it is assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Traffic Type Influence on Performance of OSPF QoS Routing
PublikacjaFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed On-Off model was used for self-similar traffic generation. Comparison of simulation results was presented using both relative and non-relative...
-
Call and Connections Times in ASON/GMPLS Architecture
PublikacjaIt is assumed that demands of information soci- ety could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded by performance evaluation to guarantee society expectations. Call and connections times are in ASON/GMPLS architecture important for real-time applications. Practical...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Ubiquity of client access in heterogeneous access environment
PublikacjaWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Music Recommendation System
PublikacjaThe paper focuses on optimization vector content feature for the music recommendation system. For the purpose of experiments a database is created consisting of excerpts of music les. They are assigned to 22 classes corresponding to dierent music genres. Various feature vectors based on low-level signal descriptors are tested and then optimized using correlation analysis and Principal Component Analysis (PCA). Results of the experiments...
-
A detector of sleep disorders for using at home
PublikacjaObstructive sleep apnea usually requires all-ni ght examination in a specialized clinic, under the supervision of a medical staff. Because of those requirements it is an expensive and a non-widely utilized test. Moving the examination procedure to patients’ home with automatic analysis algorithms involved will decrease the costs and make it available for larger group of patients. The developed device allows all-night recordings...
-
New Tool for Examining QoS in the VToIP Service
PublikacjaThis paper is dedicated to the subject of measuring QoS in the Video Telephony over IP (VToIP) service. QoS measurement models in general and then models designed specifically for measuring QoS in the VToIP service are presented. A new numerical tool for examining the quality of VToIP video streams VToIP is described. The tool’s functionality is then put to the test in a number of analysis scenarios. The results and insights gained...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Quality Aspects in Digital Broadcasting and Webcasting Systems: Bitrate versus Loudness
PublikacjaIn this paper the quality aspects of bitrate and loudness in digital broadcasting and webcasting systems are examined. The authors discuss a survey concerning user preferences related with processing and managing audio content. The coding efficiency of a popular audio format is analyzed in the context of storing media. An objective study on a representative group of signal samples, as well as a subjective study of the perceived...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublikacjaAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Multi Queue Approach for Network Services Implemented for Multi Core CPUs
PublikacjaMultiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also computer networking. Since the key functionality of network core components is fast package servicing, multicore technology, due to multi tasking ability, seems useful to support packet processing. Dedicated...
-
A hybrid-mesh solution for coverage issues in WiMAX metropolitan area networks.
PublikacjaThe new WiMAX technology offers several advantages over the currently available (GSM or UMTS-based) solutions. It is a cost effective, evolving, and robust technology providing quality of service guarantees, high reliability, wide coverage and non-line-of-sight (NLOS) transmission capabilities. All these features make it particularly suitable for densely populated urban environments. In this paper we discuss the design and implementation...
-
Application of Graph Theory Algorithms in Non-disjoint Functional Decomposition of Specific Boolean Functions
Publikacja -
Development and Optimization of Deep Learning Systems for MRI Analysis in Alzheimer's Disease Monitoring
Publikacja -
The Microwave Sources for EPR Spectroscopy
Publikacja -
Automatic Image and Speech Recognition Based on Neural Network
Publikacja -
Digital Audio Broadcasting or Webcasting: A Network Quality Perspective
PublikacjaIn recent years, many alternative technologies of delivering audio content have emerged, with different advantages and disadvantages. In this paper pros and cons of digital audio broadcasting and webcasting transmission techniques in a network quality perspective are described. A case study of user expectations with respect to currently available services is analyzed, and the perceived quality of real digital broadcasted and webcasted...
-
Convolutional Neural Networks for C. Elegans Muscle Age Classification Using Only Self-Learned Features
PublikacjaNematodes Caenorhabditis elegans (C. elegans) have been used as model organisms in a wide variety of biological studies, especially those intended to obtain a better understanding of aging and age-associated diseases. This paper focuses on automating the analysis of C. elegans imagery to classify the muscle age of nematodes based on the known and well established IICBU dataset. Unlike many modern classification methods, the proposed...
-
New approach to computer aided design of coupled resonator filters
PublikacjaW niniejszej pracy zastosowane zostały gradientowa metoda optymalizacji oraz nowa definicja funkcji celu do projektowania filtrów mikrofalowych. Definicja funkcji celu została oparta na badaniu położenia zer i biegunów funkcji przenoszenia optymazlizownanych układów.
-
Theory of scattering by an array of lossy dielectric, ferrite and conducting cylinders.
PublikacjaOpisano metodę analizy umożliwiającą określenie zastępczego pola rozproszonego od dowolnej konfiguracji prętów dielektrycznych, ferrytowych lub metalowych na zewnętrznym obszarze cylindrycznym w celu połączenia go z wybranym pobudzeniem i znalezienia macierzy rozproszenia układu. Prezentowane podejście znajduje zastosowanie w analizie struktur zamkniętych i określanie macierzy rozpraszania złączy falowodowych jak i otwartych...
-
Multistage optical switching networks
PublikacjaEwolucja sieci szkieletowej w kierunku sieci DWDM o dużych szybkościach generuje nowe problemy dla kontynuacji. Ten element funkcjonalny musi także być oparty na technologii optycznej. Dla dużych pojemności nie może on być zrealizowany jako pojedynczy komutator, lecz jako wielosekcyjne pole komutacyjne. W artykule opisano trzy typy komutatorów: komutator światłowodów(FX), komutator długości fal (WSX) i komutator z konwersją długości...
-
Low order autoregressive (AR) models for FDTD analysis of microwave filters.
PublikacjaArtykuł opisuje zastosowanie modeli AR w celu poprawy efektywności analizy struktur filtrujących metodą różnic skończonych w dziedzinie czasu (FD-TD). Opisanych jest szereg kryteriów pozwalających na automatyczne tworzenie modeli AR sygnałów czasowych, w tym wybór fragmentu odpowiedzi układu stanowiący podstawę ekstrakcji współczynników modelu, współczynnika decymacji oraz rzędu modelu. Skuteczność wprowadzonych kryteriów...
-
Examination of 5G NR, LTE, and NB-IoT Radio Interfaces and Their Vulnerabilities to Interference
PublikacjaModern cellular wireless communication systems of the fourth (4G) and fifth generation (5G) face a problem of various types of interference or intentional jamming. Consequently, a degradation of the services provided and an incorrect network operation may occur. In this paper, configuration of the networks’ physical layer is investigated, with the said investigation preceded by the measurement of parameters of commercial networks...
-
Propagation in rectangular waveguides with a pseudochiral Ω slab
PublikacjaThe transfer matrix approach is applied for analysis of waveguides loaded with a uniaxial pseudochiral Ω slab. In particular a pseudochiral parallel plate and rectangular guides are investigated. Based on the numerical analysis the influence of the pseudochirality on propagation characteristics and field distribution are examined. Other feature such as a field displacement phenomenon appearing in the both considered structures...
-
Auditory Display Applied to Research in Music and Acoustics . Obrazowanie dźwiękowe w muzyce i akustyce.
PublikacjaThis paper presents a relationship between Auditory Display (AD) and the domains of music and acoustics. First, some basic notions of the Auditory Display area are shortly outlined. Then, the research trends and system solutions within the fields of music technology, music information retrieval and music recommendation and acoustics that are within the scope of AD are discussed. Finally, an example of AD solution based on gaze...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Subjective Quality Evaluation of Underground BPL-PLC Voice Communication System
PublikacjaDesigning a reliable voice transmission system is not a trivial task. Wired media, thanks to their resistance to mechanical damage, seem an ideal solution. The BPL-PLC (Broadband over Power Line – Power Line Communication) cable is resilient to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency situation, including paramedic rescue operations. These features...
-
Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine
PublikacjaIn order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
A system for Direction-Of-Arrival estimation in ISM 2.4 GHz frequency band based on ESPAR antenna and SDR technology
PublikacjaDetermination of the direction of the signal arrival (DOA) finds many applications in various areas of science and industry. Knowledge of DOA is used, among others to determine the position of a satellite with a low Earth orbit (LEO), localization of people and things as well as in research of wireless communication systems, for instance the determination of the number of...
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublikacjaIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Multi-Beam Antenna for Ka-Band CubeSat Connectivity Using 3-D Printed Lens and Antenna Array
PublikacjaIn this paper, the design of a passive multi-beam lens antenna is proposed for the CubeSat space communication system as an alternative application of a 2-D microstrip antenna array that has originally been designed for a 39 GHz 5 G MU-MIMO system. The half-ellipsoid lens is 3-D printed using stereolithography (SLA) technology. The antenna prototype is capable of selecting the main beam between 16 different directions with a gain...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Building Information Modelling as an opportunity and risk for stakeholders involved in construction investment process
PublikacjaThe requirements to apply Building Information Modelling (BIM) in public investments worldwide are currently very high. Significant interest (sometimes formulated also as a requirement) in BIM technology can be observed also among private investors. Design technology that applies BIM is supported by many private investors due to its numerous advantages. A growing group of construction designers (steel, concrete and reinforced concrete...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Towards an experience based collective computational intelligence for manufacturing
PublikacjaKnowledge based support can play a vital role not only in the new fast emerging information and communication technology based industry, but also in traditional manufacturing. In this regard, several domain specific research endeavors have taken place in the past with limited success. Thus, there is a need to develop a flexible domain independent mechanism to capture, store, reuse, and share manufacturing knowledge. Consequently,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Impact of information systems (IS) infusion on Open Government Data (OGD) adoption
PublikacjaPurpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...
-
Źródła informacji rynkowych przy kształtowaniu nowych produktów
PublikacjaCelem pracy jest przedstawienie stopnia korzystania z różnych źródeł informacji rynkowych przy kształtowaniu nowych produktów przez krajowe przedsiębiorstwa średnio-wysokiej i wysokiej techniki oraz powiązania między rodzajem źródła a wynikami nowych produktów.
-
Sposoby zbierania informacji rynkowych przy kształtowaniu nowych produktów
PublikacjaCelem pracy jest określenie, w jakim stopniu krajowe przedsiębiorstwa średnio-wysokiej i wysokiej techniki stosują różne sposoby zbierania informacji rynkowych przy wdrażaniu nowych produktów, oraz jak te sposoby wiążą się z osiąganiem sukcesu nowego produktu.
-
How can the work environment be redesigned to enhance the well-being of individuals with autism?
PublikacjaPurpose – This article examines the opportunities to create optimal conditions for individuals with autism, to work successfully within the contemporary workplace and improve their well-being. These opportunities arise from digital technology (DT) development, enabling the work environment to be remodeled by providing new possibilities and ways of working. The author discusses both technology-based as well as non-technological accommodations...