Filtry
wszystkich: 11738
-
Katalog
- Publikacje 6398 wyników po odfiltrowaniu
- Czasopisma 756 wyników po odfiltrowaniu
- Konferencje 412 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 292 wyników po odfiltrowaniu
- Wynalazki 2 wyników po odfiltrowaniu
- Projekty 18 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Aparatura Badawcza 4 wyników po odfiltrowaniu
- Kursy Online 273 wyników po odfiltrowaniu
- Wydarzenia 59 wyników po odfiltrowaniu
- Oferty 1 wyników po odfiltrowaniu
- Dane Badawcze 3520 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Study on Speech Transmission under Varying QoS Parameters in a OFDM Communication System
PublikacjaAlthough there has been an outbreak of multiple multimedia platforms worldwide, speech communication is still the most essential and important type of service. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission, based most often on multi-valued modulations, multiple...
-
Security and Communication Networks
Czasopisma -
Chapter 11 – Application of Chemical Sensors and Sensor Matrixes to Air Quality Evaluation
PublikacjaIndoor and outdoor air quality is one of the key factors influencing human health. However, air quality evaluation is not easy task. Air is a complex system, which is subjected to changes even within short period of time. Progress in analytical methods and analytical tools provides increasingly more reliable information on the condition and quality of indoor and outdoor air. This progress, however, generates an increase in the...
-
Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms
PublikacjaProviding a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...
-
Integration of brood units in game universe
PublikacjaAn access to a great number of various services allows for decomposition of complex problems Developing a game universe usually involves creation of various units which can be encountered by a player. Those can be lonely or organized in broods animals and monsters wandering around the game world. In order to provide natural gaming experience those units should behave variously depending on the world situation. Those behaviours...
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Implementacja warstwy danych i sterowania dla Równoległego Internetu IPv6 QoS
PublikacjaW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. W sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakietów w sieci. Implementacja węzłów IPv6 QoS w środowisku umożliwiającym...
-
Design, Realization and Measurements of Enhanced Performance 2.4 GHz ESPAR Antenna for Localization in Wireless Sensor Networks
PublikacjaThis paper presents the design, realization and measurements of an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna with enhanced performance of estimating the incoming signal direction. Designed antenna is dedicated for 2.4 GHz ISM applications with emphasis on Wireless Sensor Networks (WSN). Proposed antenna provides different radiation patterns by proper configuration of the parasitic elements. Thus, several...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Modified monopole ring antennas as a solution for HiperLAN1/2 and IEEE 802.11b/g standard devices
PublikacjaZaprojektowano, wykonano i przebadano pierścieniową antenę planarną przeznaczona do aplikacji multisystemowych. Zastosowano system zasilania poprzez linie mikropaskową oraz dobrano wymiary i kształty pierścieni (promienników) w taki sposób, aby odpowiednio ''ulokować'' podzakresy pracy anteny. Zrealizowany prototyp anteny pracuje w zakresie standardów IEEE 802.11b/g oraz HiperLAN1/2.
-
Research on Quality Requirements of Data Transmission Services in RSMAD
PublikacjaThe paper presents a results and analysis of research of the quality of service requirements (defined by the QoS attributes) for imaging data transmission services using Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents and discusses results of test on the impact of the size of photos from traffic enforcement cameras on the average transmission time. These...
-
Cellular network quality evaluation at a university campus on the eve of 5G
PublikacjaThanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublikacjaIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Evaluation of Workflow Runtime Platforms in Service Composition
PublikacjaTypically, workflow applications are constructed from basic functionalities that may be realized by alternative services deployed in heterogeneous runtime platforms. Depending on workflow structure and selection of services, the applications differ in attributes such as price, Quality of Service (QoS) and others. In the paper, we propose a method of evaluation of workflow runtime platforms using Data Envelopment Analysis. We present...
-
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publikacja -
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
Analiza algorytmów rutingu wspierających QoS w DiffServ.
PublikacjaW artykule podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość...
-
Analiza algorytmów rutingu wspierających QoS w DiffServ
PublikacjaW pracy podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość (QoS...
-
Optymalizacja zasad koegzystencji sieci standardów Bluetooth i IEEE 802.11 = Optimization of Bluetooth and IEEE 802.11 networks co-existence
PublikacjaZ uwagi na rosnącą popularność standardów Bluetooth (BT) i IEEE 802.11b (Wi-Fi ) można się z nimi spotkać praktycznie wszędzie. Gwałtowny wzrost liczby urządzeń różnych technologii ma także swoje negatywne strony. Stosowanie coraz większej liczby urządzeń różnych systemów radiokomunikacyjnych powoduje wzrost poziomu zaburzeń elektromagnetycznych. W konsekwencji działanie różnych sieci bezprzewodowych pracujących w bliskim zasięgu...
-
Resilient Routing in Communication Networks
PublikacjaThis important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...
-
Network design for surface water quality monitoring in a road construction project using Gamma Test theory
PublikacjaRoad construction has a negative environmental impact on the surrounding aquatic environment, requiring the continuous monitoring of surface water quality. Here, optimization of the water quality monitoring network (WQMN) is an essential step in supporting the sustainable development of road construction projects. This study introduces Gamma Test theory (GTT) as a practical method for optimizing the WQMN of surface waters during...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
REAL-TIME VOICE QUALITY MONITORING TOOL FOR VOIP OVER IPV6 NETWORKS
PublikacjaThe primary aim of this paper is to present a new application which is at this moment the only open source real-time VoIP quality monitoring tool that supports IPv6 networks. The application can keep VoIP system administrators provided at any time with up-to-date voice quality information. Multiple quality scores that are automatically obtained throughout each call reflect influence of variable packet losses and delays on voice...
-
IEEE TRANSACTIONS ON INFORMATION THEORY
Czasopisma -
Application of Game Theory against Nature in Supporting Bid Pricing in Construction
Publikacja -
Modelling Negotiations of Construction Subcontract based on a Game Theory – Results of an Experiment
Publikacja -
Ships Shore Service Optimization Using the Queueing Theory
Publikacja -
Model of emotions for game players
PublikacjaAffect-aware video games can respond to a game player's emotions. Such games seem to be more attractive for users. Therefore for that kind of games it is necessary to create a model of the player's emotions to know to which emotions the application should react. The paper describes different models of emotions. The questionnaire and experiment for video game players is presented. Some results of the tests are shown. Then the model...
-
Implementacja płaszczyzny danych i płaszczyzny sterowania dla Równoległego Internetu IPv6 QoS
PublikacjaW artykule przedstawiono aspekty związane z implementacją węzłów Równoległego Internetu (RI) IPv6 QoS na platformach umożliwiających wirtualizację. RI IPv6 QoS jest oparty na architekturze DiffServ i NGN. Zgodnie z architekturą DiffServ, w sieci IP wyróżniamy węzły brzegowe oraz szkieletowe, które wyposażone są w mechanizmy Quality of Service (QoS) wspierające gwarancje QoS dla przekazu pakie¬tów w sieci. Implementacja węzłów IPv6...
-
A proposition for integrating elements of game universe by means of behavioral trees
PublikacjaModern computer games often involve autonomous beings collaborating and competing with each other to reach their objectives in the game universe. It seems only natural to use agent-oriented approach in such cases. This article identifies the rules of building a game universe as an environment for executing agents. The paper also covers a method for decomposing compound behaviors into behavioral trees. Dividing complex behaviors...
-
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Publikacja -
International Game Theory Review
Czasopisma -
INTERNATIONAL JOURNAL OF GAME THEORY
Czasopisma -
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Service and service decomposition model - theoretical foundation of it service management
PublikacjaThe publication contains different definitions of Service - one of the fundamental IT Service Management term. It describes types of Service attributes nad introduces so-called ''distinguish functions'' in order to propose different categories of Services. It proposes both general model of Service decomposition and practical model based on CMDB implementation limitations. In summarizes obtained results and gives some remarks about...
-
Michał Hoeft dr inż.
OsobyMichał Hoeft z wyrożnieniem ukończył studia na Wydziale ETI Politechniki Gdańskiej w 2011. Obszary jego zainteresowań badawczych obejmują zarządzanie mobilnością w sieciach heterogenicznych oraz optymalizacje przełączania w sieciach IEEE 802.11. Michał Hoeft uczestniczył w licznych projektach B+R m. in. Inżynieria Internetu Przyszłości, PL-LAB2020 oraz netBaltic. Dodatkowo pełnił rolę recenzanta dla czasopism: Ad-Hoc Networks,...
-
Application tool for IP QoS network design
PublikacjaDespite the fact that differentiated-service-aware network implementation has been a widely discussed topic for quite some time, network design still proofs nontrivial. Well developed software could put an end to network designer's problems. This chapter describes work, which has been aimed at creating a comprehensive network design tool, offering a fair range of functionality and high reliability. The presented tool is able to...
-
QoS/QoE in the Heterogeneous Internet of Things (IoT)
PublikacjaApplications provided in the Internet of Things can generally be divided into three categories: audio, video and data. This has given rise to the popular term Triple Play Services. The most important audio applications are VoIP and audio streaming. The most notable video applications are VToIP, IPTV, and video streaming, and the service WWW is the most prominent example of data-type services. This chapter elaborates on the most...
-
Analysis and improvement attempt of prof. Alan Fowler’s negotiation game
PublikacjaThe main goal of the following article is to design an improved version of the negotiation game created by prof. Alan Fowler (Fowler, 1997). I have tried to achieve this by constructing four separate versions of the game which represent different approaches while preserving rules, chosen basic technical assumptions and the simplicity of the base game. Each version of the game is supposed to i.a. make it less obvious, create new...
-
NETWORKS
Czasopisma -
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublikacjaThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Computer Networks-laboratories - 2023
Kursy OnlineAcquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.