Wyniki wyszukiwania dla: COMMUNICATION POWER
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublikacjaThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
On possible applications of media described by fractional-order models in electromagnetic cloaking
PublikacjaThe purpose of this paper is to open a scientific discussion on possible applications of media described by fractional-order (FO) models (FOMs) in electromagnetic cloaking. A 2-D cloak based on active sources and the surface equivalence theorem is simulated. It employs a medium described by FOM in communication with sources cancelling the scattered field. A perfect electromagnetic active cloak is thereby demonstrated with the use...
-
Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming
PublikacjaIn the paper we investigate a practical approach to application of integer linear programming for optimization of data assignment to compute units in a multi-level heterogeneous environment with various compute devices, including CPUs, GPUs and Intel Xeon Phis. The model considers an application that processes a large number of data chunks in parallel on various compute units and takes into account computations, communication including...
-
IoT protocols, architectures, and applications
PublikacjaThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...
-
Does technology matter for economic development? Empirical evidence for Latin American Countries
PublikacjaThe spread of new Information and Communication Technologies (ICTs) has been recognized worldwide. ICTs are broadly perceived as tools facilitating economic growth and development, especially in backward countries. They are easy and cheap to adopt, require minimum skills for effective use, and bring opportunities for disadvantaged societies. They enable education, knowledge dissemination and sharing, and processing and storing...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Strengthening the local communities’ competence for engaging in participatory planning
PublikacjaThe article describes the genesis of undertaking the subject of improving the planning competencies in local communities, in order to eliminate communication gaps to strengthen the civil attitudes. It puts forward a thesis that innovation in this issue involves creation of new participatory planning techniques, i.e. the described urban mentoring model. Describing the inclinations for undertaking the subject of the “Quo Vadis Gdansk?...
-
Blended Learning Model for Computer Techniques for Students of Architecture
PublikacjaAbstract: The article summarizes two-year experience of implementing hybrid formula for teaching Computer Techniques at the Faculty of Architecture at the Gdansk University of Technology. Original educational e-materials, consisting of video clips, text and graphics instructions, as well as links to online resources are embedded in the university e-learning educational platform. The author discusses technical constraints associated...
-
Wireless intelligent audio-video surveillance prototyping system
PublikacjaThe presented system is based on the Virtex6 FPGA and several supporting devices like a fast DDR3 memory, small HD camera, microphone with A/D converter, WiFi radio communication module, etc. The system is controlled by the Linux operating system. The Linux drivers for devices implemented in the system have been prepared. The system has been successfully verified in a H.264 compression accelerator prototype in which the most demanding...
-
Experimental test of nonclassicality with arbitrarily low detection efficiency
PublikacjaWe theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking an extra assumption of independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the classical communication capacity of the channel through which the systems are communicated. The essence for our...
-
Supporting Assurance by Evidence-based Argument Services
PublikacjaStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
The Bridge to Knowledge – Open Access to Scientific Research Results on Multidisciplinary Open System Transferring Knowledge Platform
PublikacjaThe European policy of Open Access to scientific research is now one of the key issues discussed in public debates on the future development of scientific communication. The implementation of Open Access tools has significant impact on scientific and economic growth. On the one hand, Open Access accelerates disseminating new research findings and facilitates recognition of authors on a more global scale. On the other hand, Open...
-
New Technologies Adoption and Diffusion Patterns in Developing Countries. An Empirical Study for the Period 2000-2011
PublikacjaIn recent years, enormous changes are noted worldwide when broad adoption of Information and Communication Technologies (ICT). These unique technologies – often perceived as economic development incentives – have a great ability to spread at high pace and low cost in world countries, bringing to people opportunities to contribute to economic development and growth. New Technologies play a special role in developing countries, where...
-
High Isolation Metamaterial-based Dual-band MIMO Antenna for 5G Millimeter-wave Applications
PublikacjaThis article presents a high-isolation metamaterial-based dual-band multiple-input multiple-output (MIMO) antenna for 5G millimeter-wave communication networks. The proposed antenna is a pentagon-shaped monopole that provides a dual-band response with a wide operating bandwidth at 5G 28/28 bands. The antenna is printed on 0.508-mm-thick Rogers RT5880 substrate of relative permittivity ɛr =2.2. It exhibits a small physical size...
-
(Re)Shaping Open Access Policy to Scientific Resources at Polish Technical Universities: Gdańsk University of Technology Perspective
PublikacjaDeveloping European Open Access policy to scientific resources is one of the most important issues undertaken during the public debate about future scholarly communication trends. The Open Access landscape is determined by several factors (e.g. mandates). The open mandate: voluntary or mandatory, can be implemented at the institutional, national or international level. It requires scholars to use open repository to deposit results...
-
Parallelization of large vector similarity computations in a hybrid CPU+GPU environment
PublikacjaThe paper presents design, implementation and tuning of a hybrid parallel OpenMP+CUDA code for computation of similarity between pairs of a large number of multidimensional vectors. The problem has a wide range of applications, and consequently its optimization is of high importance, especially on currently widespread hybrid CPU+GPU systems targeted in the paper. The following are presented and tested for computation of all vector...
-
Application of unmanned USV surface and AUV underwater maritime platforms for the monitoring of offshore structures at sea
PublikacjaThe operation of offshore structures at sea requires the implementation of advanced systems for their permanent monitoring. There is a set of novel technologies that could be implemented to deliver a higher level of effective and safe operation of these systems. A possible novel solution may be the application of a new maritime unmanned (USV) surface and underwater vehicles/platforms (AUV). Application of such vehicles/platforms...
-
Stationary underwater channel experiment: Acoustic measurements and characteristics in the Bornholm area for model validations
PublikacjaThe underwater acoustical channel is time-variant, and even on small time scales there is often existing no ‘acoustical frozen ocean’. Popular is the use of WSSUS-channel transmission modeling (Wide-Sense Stationary Uncorrelated Scattering) for the stochastic description of bandpass signals in GSM mobile phones with moving participants; since this results in a halved number of model parameters. For underwater sound applications...
-
How much is Impact Factor worth?
PublikacjaThe purpose of this work is to present an aspect of counting citations, which is correlated to the Impact Factor, very important for journals in scientific communication, and provides information about the position of a scientific journal in a particular research area. Sometimes citations don’t count in a research output, e.g. if an article is published in a predatory journal. Those journals ...
-
A method for testing the wide-sense stationary uncorrelated scattering assumption fulfillment for an underwater acoustic channel
PublikacjaWide-sense stationary and uncorrelated scattering (WSSUS) assumptions are often applied for the statistical description of wireless communication channels. However, in the case of underwater acoustic channels the WSSUS model is of limited value. The degree of similarity of in-phase and quadrature components of the channel impulse response, measured with the use of bandpass modulated signals, can be used as an indicator of WSSUS...
-
Selected properties and parameters of radio channel impulse response estimation in ISM 2.4 GHz band
PublikacjaThe article presents experimental research indicating that the impulse response of the communication channel, determined in practice, are not of an universal character, but only represent its approximate value for the frequency on which this measurement was made. Phases for each of the replicas of the measurement signal were determined during the analysis of the received signals in the baseband. Phase changes of individual replicas...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublikacjaIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
An Analysis of the Relationship between the Architecture and the Structure of a Vessel on the Example of the Reconstruction Design Process of the Historical Sailing Yacht "General Zaruski" Carried Out between 2009 and 2012
PublikacjaThe article analyzes the relation between architecture and structure of a vessel on the example of the reconstruction design of a wooden sailing yacht "General Zaruski" built in Ekanӓs, Sweden in 1939. Based on the documentation of "Kaparen" (sister yacht), "Mloda Gwardia" (ex "General Zaruski") and the reconstruction classification project made by the authors, the impact of functional, spatial and aesthetic design objectives (e.g....
-
A Point Set Connection Problem for Autonomous Mobile Robots in a Grid
PublikacjaConsider an orthogonal grid of streets and avenues in a Manhattan-like city populated by stationary sensor modules at some intersections and mobile robots that can serve as relays of information that the modules exchange, where both module-module and module-robot communication is limited to a straight line of sight within the grid. The robots are oblivious and move asynchronously. We present a distributed algorithm that, given...
-
Exploring ontological approach for user requirements elicitation in design of online virtual agents
PublikacjaEffective user requirements elicitation is a key factor for the success of software development projects. There are many qualitative and quantitative research studies that promulgate particular methods and show the application of user requirements elicitation in particular domains. However, few try to eliminate the burden of ambiguity in gathered data, naturally occurring in different groups of stakeholders. This paper deals with...
-
Standards on Cyber Security Assessment of Smart Grid
PublikacjaSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Quantum superadditivity in linear optics networks: Sending bits via multiple-access Gaussian channels
PublikacjaSuperadditivity effects of communication capacities are known in the case of discrete variable quantum channels. We describe the continuous variable analog of one of these effects in the framework of Gaussian multiple access channels (MACs). Classically, superadditivity-type effects are strongly restricted: For example, adding resources to one sender is never advantageous to other senders in sending their respective information...
-
Sonar Pulse Detection Using Chirp Rate Estimation and CFAR Algorithms
PublikacjaThis paper presents a new approach to sonar pulse detection. The method uses chirp rate estimators and algorithms for the adaptive threshold, commonly used in radiolocation. The proposed approach allows detection of pulses of unknown parameters, which may be used in passive hydrolocation or jamming detection in underwater communication. Such an analysis is possible thanks to a new kind of imaging, which presents signal energy in...
-
Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0
PublikacjaThis paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublikacjaIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublikacjaIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych
PublikacjaIn the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...
-
Application of multi-criteria method to assess the usefulness of a hydrotechnical object for floating housing
PublikacjaThis publication presents the analysis of three hydrotechnical objects located in the Municipality of Gdańsk with a view of mooring Floating Houses. The assessment of the adaptation of a hydrotechnical object has been carried out by a multi- criteria method AHP and using the main criteria such as: mooring system, communication with the mainland, availability of the utility networks, waste disposal and location of the parking spaces....
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs
PublikacjaIn this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Web-based real-time simulation system
PublikacjaThe paper presents the development of a simulation system composed of a real-time plant simulator with real-time controller included in the software-in-the-loop structure using web-based communication. The client-server architecture build in a TCP/IP network environment was introduced, where the server is a computing unit for real-time high temporal resolution plant simulation (and optionally also as controllers' platform) and...
-
On symmetric extendibility of quantum states and its applications
PublikacjaThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Establishing the allosteric mechanism in CRISPR‐Cas9
PublikacjaAllostery is a fundamental property of proteins, which regulates biochemical information transfer between spatially distant sites. Here, we report on the critical role of molecular dynamics (MD) simulations in discovering the mechanism of allosteric communication within CRISPR‐Cas9, a leading genome editing machinery with enormous promises for medicine and biotechnology. MD revealed how allostery intervenes during at least three...
-
Distributed Architectures for Intensive Urban Computing: A Case Study on Smart Lighting for Sustainable Cities
PublikacjaNew information and communication technologies have contributed to the development of the smart city concept. On a physical level, this paradigm is characterised by deploying a substantial number of different devices that can sense their surroundings and generate a large amount of data. The most typical case is image and video acquisition sensors. Recently, these types of sensors are found in abundance in urban spaces and are responsible...
-
Design and Implementation of Multi-Band Reflectarray Metasurface for 5G Millimeter Wave Coverage Enhancement
PublikacjaA compact low-profile multi-band millimeter-wave (mm-wave) reflectarray metasurface design is presented for coverage enhancement in 5G and beyond cellular communication. The proposed single-layer metasurface exhibits a stable reflection response under oblique incidence angles of up to 60o at 24 and 38 GHz, and transmission response at 30 GHz, effectively covering the desired 5G mm-wave frequency bands. The proposed reflectarray...
-
Application of Maximum-Length Sequences to impulse response measurement of hydroacoustic communications systems
PublikacjaThere is a growing interest in digital transmission of telemetry data on ultrasonic waves. The dependence of signal attenuation on squared frequency, specific to the hy-droacoustic systems, induces problems that do not exist in monochromatic, narrowband radio communications systems. For adapting the transmission parameters to current propagation conditions, a precise knowledge of instantaneous changes of channel performances is...
-
LLA : A New Anypath Routing Scheme Providing Long Path Lifetime in VANETs
PublikacjaVehicular ad-hoc networks (VANETs) are a promising solution to improve the road traffic safety, reduce the environmental pollution, or simply provide the on-board infotainment services. However, these actions are often not possible due to high mobility of vehicles causing frequent failures of VANET links. In this paper, we focus on anypath routing to improve the reliability of multihop VANET communications. In particular, the paper...
-
Speech synthesis controlled by eye gazing
PublikacjaA method of communication based on eye gaze controlling is presented. Investigations of using gaze tracking have been carried out in various context applications. The solution proposed in the paper could be referred to as ''talking by eyes'' providing an innovative approach in the domain of speech synthesis. The application proposed is dedicated to disabled people, especially to persons in a so-called locked-in syndrome who cannot...
-
Remote command and control capabilities for data acquisition systems provided by delay-tolerant network mechanisms
PublikacjaThe paper presents an assessment of a remote device reconfiguration service employing a Delay Tolerant Network (DTN) mechanisms. This service has been implemented as a part of a communication appliance dedicated to marine data transfer in off-shore and open sea areas. The service has been successfully deployed and validation test have been completed. The practical use-case has been defined as remote access to the equipment operating...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublikacjaMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublikacjaIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...