Wyniki wyszukiwania dla: CLOUD COMPUTING, FAKE VIP ATTACK, REPUTATION, TRUST, STACKELBERG GAME
-
International Conference on Cloud Computing and Services Science
Konferencje -
Category-Based Workload Modeling for Hardware Load Prediction in Heterogeneous IaaS Cloud
PublikacjaThe paper presents a method of hardware load prediction using workload models based on application categories and high-level characteristics. Application of the method to the problem of optimization of virtual machine scheduling in a heterogeneous Infrastructure as a Service (IaaS) computing cloud is described.
-
Zastosowanie technologii holonowych w środowisku chmurowym przedsiębiorstwa
PublikacjaCelem artykułu jest wskazanie możliwości stosowania technologii holonowych dla implementacji chmurowego przetwarzania danych (cloud computing, CC) oraz chmurowego wytwarzania (cloud manufacturing, CM) w przedsiębiorstwie wirtualnym. Przyjęto następujący schemat wywodu: wyszczególnienie cech wspólnych oraz wyróżniających, występujących pomiędzy chmurą obliczeniową a wytwarzaniem chmurowym przedsiębiorstwa wirtualnego, a następnie...
-
Zaufanie do siebie jako jeden z aspektów zaufania w aktywności przedsiębiorczej
PublikacjaArtykuł prezentuje znaczenie zaufania do samego siebie na tle zaufania w relacjach budowanych przez przedsiębiorcę w jego otoczeniu społecznym i biznesowym. Wyjaśniono koncepcję zaufania do samego siebie, odnosząc się do zróżnicowanych typów zaufania, na przykład: kalkulacyjnego, opartego na wiedzy i identyfikacyjnego. Wskazano jego potencjalne źródła i konsekwencje w kontekście budowania własnego wizerunku, podejmowania decyzji...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublikacjaMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublikacjaIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
Wykorzystanie klasyfikacji funkcjonalnej usług do efektywnego zarządzania zasobami chmurowymi
PublikacjaWykazano jak istotnym problemem jest zarzadzanie chmurą obliczeniową, w tym alokacja zasobów do wykonania usług (workloadów) zgłoszonych przez użytkownika. Przeanalizowano problem podziału usług wdrażanych w środowiskach chmurowych na klasy określające ich funkcjonalność. Zaproponowano oryginalną metodę alokacji workloadów wykorzystującą wprowadzoną klasyfikację funkcjonalną oraz identyfikację tych klas na podstawie wielkości generowanego...
-
IEEE International Symposium on Cluster, Cloud and Grid Computing
Konferencje -
IEEE International Conference on Cloud Computing in Emerging Markets
Konferencje -
DECISION - MAKING IN VIRTUAL SOFTWARE TEAMS USING CLOUD PLATFORMS
PublikacjaSoftware development projects are usually realized by traditional or virtual IT teams using computing clouds. Team collaboration requires decision - making regarding essential aspects of a project progress. The article concerns methods of decision – making process in the case of traditional and virtual teams’ work. The research results conducted in a group of IT specialists are presented, and to analyze their preferences in decision-making...
-
Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi podejście dynamiczne
PublikacjaAbstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...
-
Protection in elastic optical networks
PublikacjaIn this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublikacjaRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Integration of cloud-based services into distributed workflow systems: challenges and solutions
PublikacjaThe paper introduces the challenges in modern workflow management in distributed environments spanning multiplecluster, grid and cloud systems. Recent developments in cloud computing infrastructures are presented and are referring howclouds can be incorporated into distributed workflow management, aside from local and grid systems considered so far. Severalchallenges concerning workflow definition, optimisation and execution are...
-
KASKADA Platform in Cloud Environment
PublikacjaKASKADA is a computing platform for developing and running services and applications oriented to multimedia processing and data streaming. A solution for serving the platform in the PaaS model is presented. The paper briefly describes the software for creating the private cloud environment based on the OpenStack software. The coud has been deployed to a supercomputer working in C2 NIWA at the Gdansk University of technology. This...
-
SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
PublikacjaThe paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...
-
C2 Niwa - The Centre of Competence for Novel Infrastructure of Workable Applications
PublikacjaScientific and cloud computing are discussed in the paper . The paradigm of EaaS (Everything as a Service) is presented and the design methodology of service oriented applications is proposed. Implementation of the SOSE (Software Oriented Software Engineering) approach is analyzed and the roles of developing teams to obtain software products satisfying business requirements are also shown. The above listed activities create a basic...
-
Calibration of precipitation estimation algorithm with particular emphasis on the Pomeranian region using high performance computing
PublikacjaFast and accurate precipitation estimation is an important element of remote atmosphere monitoring, as it allows, for example, to correct short-term weather forecasts and the prediction of several types of meteorological threats. The paper presents methodology for calibrating precipitation estimation algorithm based on MSG SEVIRI sensor data, and Optimal Cloud Analysis product available via EumetCast transmission. Calibration is...
-
Comparative conformance cases for monitoring multiple implementations of critical requirements
PublikacjaThe paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...
-
International Conference on Green, Pervasive and Cloud Computing (International Conference on Grid and Pervasive Computing)
Konferencje -
A Survey of Vehicular Network Systems for Road Traffic Management
PublikacjaIn this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublikacjaWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
Magdalena Szuflita-Żurawska
OsobyMagdalena Szuflita-Żurawska jest kierownikiem Sekcji Informacji Naukowo-Technicznej na Politechnice Gdańskiej oraz Liderem Centrum Kompetencji Otwartej Nauki przy Bibliotece Politechniki Gdańskiej. Jej główne zainteresowania badawcze koncentrują się w obszarze komunikacji naukowej oraz otwartych danych badawczych, a także motywacji i produktywności naukowej. Jest odpowiedzialna między innymi za prowadzenie szkoleń dla pracowników...
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublikacjaWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
3D Model Preparing Patterns for Interactive Urban Visualization - Guidelines for Graphic Designers Preparing 3D Models for Virtual Reality Applications
PublikacjaWhile working on architectural visualizations, the software developer often has to work with graphic designers who create models in a different environment what can cause many complications. For this reason, it is very important to have some guidelines which can protect both the developer and the designer from commixing mistakes. The paper presents a list of such guidelines based on the authors’ experience. The reader can treat...
-
Suitability of LoRaWAN Technology for the Development of Maritime Applications
PublikacjaThe LoRaWAN Technology opens new possibilities for gathering and analysis of distributed data. In the paper we concentrate on its maritime usability which was tested by us in the period from June to August 2018. Measurements of the LoRaWAN network coverage in the Bay of Gdansk area were carried out. Various conditions and places were tested. The research was planned in such a way as to gradually increase the range and control the...
-
Deep learning in the fog
PublikacjaIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Syntactic modular decomposition of large ontologies with relational database
PublikacjaSupport for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...
-
Zapewnianie wiarygodnosci przetwarzania przy integracji komponentów usług
PublikacjaPrzedstawiono problematykę Service Oriented Architecture(SOA) oraz nowoczesne metodologie integracji gotowych komponentów programistycznych.Omówiono Service Component Architecture (SCA), Cloud computing, oraz modelowanie procesów biznesowych jako metodologie zbliżone koncepcyjne do SOA. Opisano główne atrybuty wiarygodności i zestawionokonkretne techniki poprawy wiarygodno±ci. Modelowanie procesów biznesowychzaprezentowano na przykładzie...
-
International Conference on Trust, Security and Privacy in Computing and Communications (IEEE/IFIP International Symposium on Trusted Computing and Communications)
Konferencje -
System wykrywania i przeciwdziałania spoofingowi GPS
PublikacjaSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Future research directions in design of reliable communication systems
PublikacjaIn this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...
-
Effective Decision-Making in Supply Chain Management
PublikacjaProper decision-making in Supply Chain Management (SCM) is crucial for an appropriately functioning mechanisms. The paper presents how IT technologies can impact on an organization and process realization. Especially Service Oriented Architecture (SOA) standard and the Cloud Computing (CC) paradigms are taken into account. A general model of decision-making is proposed and based on a specific practical example is analyzed using...
-
Limitations of Emotion Recognition in Software User Experience Evaluation Context
PublikacjaThis paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...
-
A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors
PublikacjaIn recent years, emotion recognition algorithms have achieved high efficiency, allowing the development of various affective and affect-aware applications. This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels. However, the increase in computing and communication capabilities of smartphones,...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublikacjaWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
ZARZADZANIE ORGANIZACJĄ TYPU SMART
PublikacjaZaprezentowano organizacji, w której charakterystykę wpisano następujące cechy: strategiczne uwarunkowanie, maksymalną innowacyjność, atrakcyjność dla interesariuszy, rozwijanie osobowości pracowników oraz twórczość w działaniu. Te atrybuty, tworzą koncepcję organizacji SMART (akronim od pierwszych liter powyższych cech), która wyróżnia się dodatkowo strukturą opartą o dynamicznie kreowane zespoły oraz skutecznym wspomaganiem...
-
Project-Based Collaborative Research and Training Roadmap for Manufacturing Based on Industry 4.0
PublikacjaThe importance of the economy being up to date with the latest developments, such as Industry 4.0, is more evident than ever before. Successful implementation of Industry 4.0 principles requires close cooperation of industry and state authorities with universities. A paradigm of such cooperation is described in this paper stemming from university partners with partly overlapping and partly complementary areas of expertise in manufacturing....
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Uczenie maszynowe do samoorganizacji systemów rozproszonych w zastosowaniach gospodarczych
PublikacjaW pracy omówiono uczenie maszynowe do samoorganizacji systemów rozproszonych w zastosowaniach gospodarczych ze szczególnym uwzględnieniem sieci neuronowych do predykcji finansowych oraz szacowania ratingu przedsiębiorstw. Oprócz sieci neuronowych, istotną rolę w przygotowaniu i testowaniu informatycznych systemów finansowych może pełnić programowanie genetyczne. Z tego powodu omówiono uczenie maszynowe w aplikacjach konstruowanych...
-
The impact of shipping 4.0 on controlling shipping accidents: A systematic literature review
PublikacjaMaritime shipping, with a significant role in global trade, confronts various accidents leading to loss of lives, properties, and the environment. Shipping 4.0 technologies are scaling up to address this problem by employing real-time data-driven technologies, including cyber-physical systems, advanced tracking and tracing, intelligent systems, and big data analytics. Despite growing attention, there is a general lack of clarity...
-
The IPV6 Deployment - Best practices
PublikacjaThe new Internet Protocol IPv6 has been regarded for quite a long time as the only option to ensure uninterrupted operation for the Internet service providers andend-users in the current Internet. The article presents important faets about the IPv6, including current statistics of the IPv4 usage, the IPv6 statistics for Poland comparing to the whole Internet. Moreover, this paper shows important aspeets of migration from IPv4 towards...
-
Developing Methods for Building Intelligent Systems of Information Resources Processing Using an Ontological Approach
PublikacjaThe problem of developing methods of information resource processing is investigated. A formal procedure description of processing text content is developed. A new ontological approach to the implementation of business processes is proposed. Consider that the aim of our work is to develop methods and tools for building intelligent systems of information resource processing, the core of knowledge bases of which are ontology’s, and...
-
Digital Transformation and Its Influence on Sustainable Manufacturing and Business Practices
PublikacjaThe paper focuses on the relationship between businesses and digital transformation, and how digital transformation has changed manufacturing in several ways. Aspects like Cloud Computing, vertical and horizontal integration, data communication, and the internet have contributed to sustainable manufacturing by decentralizing supply chains. In addition, digital transformation inventions such as predictive analysis and big data analytics...
-
Smartphones as tools for equitable food quality assessment
PublikacjaBackground: The ubiquity of smartphones equipped with an array of sophisticated sensors, ample processing power, network connectivity and a convenient interface makes them a promising tool for non-invasive, portable food quality assessment. Combined with the recent developments in the areas of IoT, deep learning algorithms and cloud computing, they present an opportunity for advancing wide-spread, equitable and sustainable food...
-
ARTIFICIAL MODEL IN THE ASSESSMENT OF THE ALGORITHM OF OBJECTS RECORDED BY LASER SCANNING SHAPE DETECTION (ALS/TLS)
PublikacjaBrief description of the study and used methods. Brief description of the study and used As part of the preparatory work aimed to create the application solution allowing for the automation of searching objects in data, obtained in the scanning process using ALS (Airborne Laser Scanning) or TLS (Terrestrial Laser Scanning), the authors prepared a artificial (synthetic, theoretical) model of space, used for the verification of operation...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...