Filtry
wszystkich: 2445
-
Katalog
- Publikacje 2114 wyników po odfiltrowaniu
- Czasopisma 38 wyników po odfiltrowaniu
- Konferencje 18 wyników po odfiltrowaniu
- Osoby 55 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 10 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 72 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 130 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREATS WIRELESS MONITORING
-
DRinK: A Defense Strategy of Cooperative Wireless Terminals in a Wireless Multihoming Environment
PublikacjaZ uwagi na brak kontroli administracyjnej nad terminalami bezprzewodowymi w środowisku dołączenia do wielu sieci lokalnych terminal egoistyczny może dążyć do maksymalizacji własnej funkcji użyteczności, związanej z długoterminową średnią wartością uzyskiwanej przepływności. Przyjmując podejście wzorca zachowań proponuje się wbudowanie w protokół terminala nieegoistycznego odpowiedniej strategii obronnej. Strategia taka, pod nazwą...
-
A heterogenous wireless system for maritime communication - the netBaltic system architecture
PublikacjaIn the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
2022 MICROSCOPY IN ENVIRONMENTAL MONITORING -lecture - Nowy
Kursy OnlineThe online repository will be used to teach students by presenting them lectures about variable aspects of microscopy techniques used in environmental monitoring.
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
PublikacjaA class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...
-
Flap Monitoring Techniques: A Review
PublikacjaPostoperative tissue flap vitality monitoring enables early detection of clinical complications, allowing for intervention. Timely re-operation can prevent the need for extensive correction procedures, thus reducing healthcare costs and hospitalisation time. Statistics show that monitoring can increase the success rate of flap survival to 95\% or higher. However, despite the significant progress in monitoring techniques, major...
-
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
Complex Corrosion Monitoring System for Crude Distillation Unit in Form of Neutral Network
PublikacjaComplex and successful corrosion monitoring of refinery processes can significantly reduce material losses and failure risk. The developed corrosion monitoring system is based on online ultrasonic sensors, ER (electrical resistance) probes, gravimetric method and multipoint analytical analysis of chemical composition of the fluids. Additional online LPR (linear polarization resistance) sensors controlling corrosiveness of sour...
-
Modified Inductive Multi-Coil Wireless Power Transfer Approach Based On Z-Source Network
PublikacjaThis article presents a non-conventional approach to a multi-coil wireless power transfer system based on a Z-source network. The novelty of the approach lies in the use of a Z-source as a voltage source for energy transmission through the wireless power transfer coils. The main advantage is in a reduced number of semiconductors. This paper provides the design approach, simulation and experimental study. Feasibility and possible...
-
Early detection of imminent threats in social relation graphs
PublikacjaWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Container monitoring system
PublikacjaW pracy przedstawiono koncepcję systemu monitorowania kontenerów przewożonych drogą morską. Scharakteryzowano główne cechy oraz przedstawiono modułowo-warstwowy schemat funkcjonalny. Ponadto opisano założenia funkcjonalno-użytkowe dotyczące Inteligentnego Modułu Kontenerowego (SCM), będącego podstawowym elementem składowym systemu. Przedstawiono również główne zadania projektowe związane z realizacją projektu
-
Environmental Monitoring
Kursy Online -
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublikacjaWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublikacjaIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
BLOOD PRESSURE MONITORING
Czasopisma -
Structural Monitoring and Maintenance
Czasopisma -
THERAPEUTIC DRUG MONITORING
Czasopisma -
Remote Monitoring of Environmental Pollutants
PublikacjaAtmospheric air quality is one of the key factors influencing human health. Air quality evaluation is not an easy task as the atmosphere is a complex system subjected to continuous changes in time. Observed progress in the development of measurement devices and technologies is fundamental for acquisition of more reliable information about condition and quality of atmospheric air. Unfortunately, this process leads to an increase...
-
25636 Geodezyjny Monitoring Budowli 2022/2023 (lato)
Kursy OnlineGeodezyjny Monitoring Budowli 2022/2023 (lato), kurs wspierający przedmiot Geodezyjny Monitoring Budowli A, PG_00044851 przeznaczony dla studentów: - Geodezja miejska i przemysłowa Geodezyjny Monitoring Budowli B, PG_00044858 przeznaczony dla studentów: - Geodezja drogowa i kolejowa Kierunek studiów: Geodezja i Kartografia Poziom kształcenia: I stopnia - inżynierskie Rok akademicki realizacji przedmiotu: 2022/2023Forma studiów:...
-
Wireless Body Area Network for Preventing Self-Inoculation Transmission of Respiratory Viral Diseases
PublikacjaThis paper proposes an idea of Wireless Body Area Networks (WBANs) based on Bluetooth Low-Energy (BLE) standards to recognize and alarm a gesture of touching the face, and in effect, to prevent self-inoculation of respiratory viral diseases, such as COVID-19 or influenza A, B, or C. The proposed network comprises wireless modules placed in bracelets and a necklace. It relies on the received signal strength indicator (RSSI) measurements...
-
34603 Geodezyjny Monitoring Budowli 2023/2024 (lato)
Kursy OnlineGeodezyjny Monitoring Budowli 2023/2024 (lato), kurs wspierający przedmiot:Geodezyjny Monitoring Budowli A, PG_00044851 przeznaczony dla studentów - Geodezja miejska i przemysłowa Geodezyjny Monitoring Budowli B, PG_00044858 przeznaczony dla studentów - Geodezja drogowa i kolejowaKierunek studiów: Geodezja i Kartografia Poziom kształcenia: I stopnia - inżynierskie Rok akademicki realizacji przedmiotu: 2023/2024Forma studiów:...
-
WIRELESS PERSONAL COMMUNICATIONS
Czasopisma -
IEEE WIRELESS COMMUNICATIONS
Czasopisma -
Wireless Power Transfer
Czasopisma -
Zasady projektowania bezprzewodowego dostępu do Internetu na przykładzie Wireless City Gdańsk
PublikacjaZapewnienie bezpłatnego, powszechnego dostępu do Internetu poprzez bezprzewodowe medium transmisyjne jest obecnie jednym za wyzwań stawianych projektantom sieci bezprzewodowych. W pracy przedstawiono koncepcje i doświadczenia z realizacji projektu ''Wireless City Gdansk'', którego celem jest umożliwienie bezpłatnego, powszechnego dostępu do Internetu poprzez bezprzewodowe medium transmisyjne.
-
Emotion monitoring system for drivers
PublikacjaThis article describes a new approach to the issue of building a driver monitoring system. Actual systems focus, for example, on tracking eyelid and eyebrow movements that result from fatigue. We propose a different approach based on monitoring the state of emotions. Such a system assumes that by using the emotion model based on our own concept, referred to as the reverse Plutchik’s paraboloid of emotions, the recognition of emotions...
-
Selecting wells for an optimal design of groundwater monitoring network based on monitoring priority map: A Kish Island case study
PublikacjaThis paper presents a novel approach, i.e. a combination of gamma test and monitoring priority map, for optimal design of groundwater monitoring network (GMN) by considering the cumulative effects of industries, human activities, and natural factors on the groundwater quality. The proposed method was successfully applied to design an optimal network for groundwater salinity monitoring on Kish Island, Persian Gulf. The priority...
-
Wireless and mobile networking (Foreword)
PublikacjaArtykuł zawiera omówienie prac z zakresu technologii sieci bezprzewodowych zamieszczonych na konferencji IFIP WMNC 2009.
-
Equilibria of wireless multihoming game
PublikacjaTerminale podłączone do wielu sieci bezprzewodowych modelowane są jako uczestnicy gry niekooperacyjnej, której symetryczny punkt równowagi Nasha w strategiach mieszanych wyznaczono dla przypadku sieci WLAN standardu IEEE 802.11. Udziały pasma w punkcie równowagi okazują się niższe w porównaniu ze środowiskiem terminali stosujących ustawienia standardowe.
-
The prototype of a wireless measurement card
Publikacja -
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublikacjaIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
Current air quality analytics and monitoring: A review
PublikacjaThis review summarizes the different tools and concepts that are commonly applied in air quality monitoring. The monitoring of atmosphere is extremely important as the air quality is an important problem for large communities. Main requirements for analytical devices used for monitoring include a long period of autonomic operation and portability. These instruments, however, are often characterized by poor analytical performance....
-
Imminent threats analysis and security level evaluation in social networks
PublikacjaRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Ad hoc routing protocols - security objectives, threats and solution
PublikacjaZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublikacjaThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Low-Power WSN System for Honey Bee Monitoring
PublikacjaThe paper presents a universal low-power system for biosensory data acquisition in scope of bees monitoring. We describe the architecture of the system, energy-saving components as well as we discuss the selection of used sensors. The work focuses on energy optimization in a scope of wireless communication. A custom protocol was implemented, which is the basis for presented energy-efficient devices. Data exchange process during...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublikacjaThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Karhunen-Loeve-based approach to tracking of rapidly fading wireless communication channels
PublikacjaWhen parameters of wireless communication channels vary at a fast rate, simple estimation algorithms, such as weighted least squares (WLS) or least mean squares (LMS) algorithms, cannot estimate them with the accuracy needed to secure the reliable operation of the underlying communication systems. In cases like this, the local basis function (LBF) estimation technique can be used instead, significantly increasing the achievable...
-
Monitoring of Explosive Nitroaromatic Tetryl
Dane BadawczeSource data used for the publication entitled "sp2-rich Dendrite-like Carbon Nanowalls as Effective Electrode for Environmental Monitoring of Explosive Nitroaromatic Tetryl".1. SEM files2. TEM files3. XPS files4. Electrochemical measurements5. Raman files
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles
PublikacjaAs the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublikacjaIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
The Role of Thermal Monitoring in Cardiosurgery Interventions
PublikacjaThe results of a research project devoted to the analysis of the value of IR-thermal imaging in monitoring the quality of cardiosurgery interventions are presented. The role of the ADT is underlined.
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublikacjaIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...