Filtry
wszystkich: 7774
-
Katalog
- Publikacje 5951 wyników po odfiltrowaniu
- Czasopisma 607 wyników po odfiltrowaniu
- Konferencje 406 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 377 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 19 wyników po odfiltrowaniu
- Zespoły Badawcze 3 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 185 wyników po odfiltrowaniu
- Wydarzenia 18 wyników po odfiltrowaniu
- Oferty 1 wyników po odfiltrowaniu
- Dane Badawcze 204 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INTERNET OF THINGS MOBILE COMPUTING COMPUTER NETWORKS DISTRIBUTED COMPUTING QUALITY OF SERVICE CLOUD COMPUTING
-
Visual Computing for Industry Biomedicine and Art
Czasopisma -
Depth Images Filtering In Distributed Streaming
PublikacjaIn this paper, we propose a distributed system for point cloud processing and transferring them via computer network regarding to effectiveness-related requirements. We discuss the comparison of point cloud filters focusing on their usage for streaming optimization. For the filtering step of the stream pipeline processing we evaluate four filters: Voxel Grid, Radial Outliner Remover, Statistical Outlier Removal and Pass Through....
-
DEPTH IMAGES FILTERING IN DISTRIBUTED STREAMING
PublikacjaIn this paper we discuss the comparison of point cloud filters focusing on their applicability for streaming optimization. For the filtering stage within a stream pipeline processing we evaluate three filters: Voxel Grid, Pass Through and Statistical Outlier Removal. For the filters we perform series of the tests aiming at evaluation of changes of point cloud size and transmitting frequency (various fps ratio). We propose a distributed...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Managing Service Quality
Czasopisma -
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
Czasopisma -
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublikacjaMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Study of data scheduling methods in the WiMAX Mobile metropolitan area networks
PublikacjaThe paper discusses basic assumptions of the WiMAX Mobile system. It also presents and analyses the results of simulation tests run for selected data scheduling methods and subcarrier allocation. Based on the test results, the authors have prepared a comparative analysis of two popular data scheduling methods, i.e. WRR and PF, and their own method CDFQ which uses information about the current channel situation for the queuing processes...
-
Service time distribution influence on end-to-end call setup delay calculation in networks with Session Initiation Protocol
PublikacjaThe most important GoS parameter for networks with SIP protocol is end-to-end call setup delay. So far there were no coherent models allowing calculation of these parameters for networks with SIP protocol. Few models were developed but they are insufficient. In the paper we propose model which allows end-to-end call setup delay calculation for networks with SIP protocol. The model is using chain of M/G/1/K models and is applicable...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Distributed state estimation using a network of asynchronous processing nodes
PublikacjaWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Reduced-cost optimization-based miniaturization of microwave passives by multi-resolution EM simulations for internet of things and space-limited applications
PublikacjaStringent performance specifications along with constraints imposed on physical dimensions, make the design of contemporary microwave components a truly onerous task. In recent years, the latter demand has been growing in importance, with the innovative application areas such as Internet of Things coming into play. The need to employ full-wave electromagnetic (EM) simu-lations for response evaluation, reliable yet CPU heavy, only...
-
Highly Integrable Planar-structured Printed Circularly Polarized Antenna for Emerging Wideband Internet of Things Applications in the Millimeter-Wave Band
PublikacjaThis paper proposes a numerically and experimentally validated printed wideband antenna with a planar geometry for Internet of Things (IoT) applications. This design tackles the challenges associated with deploying IoT sensors in remote areas or across extensive geographical regions. The proposed design exploits a coplanar-waveguide-fed modified microstrip line monopole for excitation of circularly polarized waves radiating in...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublikacjaThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublikacjaA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublikacjaThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Quality of Resilience in IP-based Future Internet Communications
PublikacjaInternet Przyszłości (zwany również Internetem 3.0 czy też NGN) jest następnym krokiem ewolucji Internetu. Prace badawcze związane z nową architekturą obejmują szerokie spektrum zagadnień, a zwłaszcza: architekturę sieci (protokoły), technologie sieciowe, aplikacje, itd. W tym artykule zakładamy wykorzystanie koncepcji Differentiated Services (DiffServ). W szczególności, proponujemy podejście ochrony zróżnicowanej ruchu. Jest ono...
-
Asynchronous time difference of arrival (ATDOA) method
PublikacjaA new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublikacjaWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublikacjaAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
TensorHive: Management of Exclusive GPU Access for Distributed Machine Learning Workloads
PublikacjaTensorHive is a tool for organizing work of research and engineering teams that use servers with GPUs for machine learning workloads. In a comprehensive web interface, it supports reservation of GPUs for exclusive usage, hardware monitoring, as well as configuring, executing and queuing distributed computational jobs. Focusing on easy installation and simple configuration, the tool automatically detects the available computing...
-
The methods of design reliable distributed networks
PublikacjaOpisano dwie metody projektowania niezawodnych sieci rozległych. W pierwszej metodzie przyjęto, że koszt konstrukcji każdego połączenia jest jednakowy, w drugiej koszty opisuje zadana macierz kosztów. Jako parametr niezawodnościowy przyjęto liczbę niezależnych dróg pomiędzy węzłami sieci. Pierwsza z metod jest metodą dokładną, druga heurystyczną. Zdefiniowano i oceniono błąd metody heurystycznej. Opublikowano wyniki otrzymane...
-
Context sensitive privacy management in a distributed environment
PublikacjaArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Krzysztof Goczyła prof. dr hab. inż.
OsobyKrzysztof Goczyła, profesor zwyczajny Politechniki Gdańskiej, informatyk, specjalista z inżynierii oprogramowania, inżynierii wiedzy i baz danych. Ukończył studia wyższe na Wydziale Elektroniki Politechniki Gdańskiej w 1976 r. jako magister inżynier elektronik w specjalności automatyka. Na Politechnice Gdańskiej pracuje od 1976. Na Wydziale Elektroniki PG w 1982 r. uzyskał doktorat z informatyki, a w 1999 r. habilitację. W 2012...
-
Industrial computer networks and functional safety
PublikacjaW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
On weak solutions of boundary value problems within the surface elasticity of Nth order
PublikacjaA study of existence and uniqueness of weak solutions to boundary value problems describing an elastic body with weakly nonlocal surface elasticity is presented. The chosen model incorporates the surface strain energy as a quadratic function of the surface strain tensor and the surface deformation gradients up to Nth order. The virtual work principle, extended for higher‐order strain gradient media, serves as a basis for defining...
-
Applications of Tensor Analysis in Continuum Mechanics
PublikacjaA tensor field is a tensor-valued function of position in space. The use of tensor fields allows us to present physical laws in a clear, compact form. A byproduct is a set of simple and clear rules for the representation of vector differential operators such as gradient, divergence, and Laplacian in curvilinear coordinate systems. The tensorial nature of a quantity permits us to formulate transformation rules for its components...
-
Tomasz Gierszewski dr inż.
Osoby -
Advances in Architectures, Big Data, and Machine Learning Techniques for Complex Internet of Things Systems
PublikacjaTe feld of Big Data is rapidly developing with a lot of ongoing research, which will likely continue to expand in the future. A crucial part of this is Knowledge Discovery from Data (KDD), also known as the Knowledge Discovery Process (KDP). Tis process is a very complex procedure, and for that reason it is essential to divide it into several steps (Figure 1). Some authors use fve steps to describe this procedure, whereas others...
-
Distributed MIND - A New Processing Model Based on Mobile Interactive Documents
PublikacjaObliczenia w trybie zespołowym pozwalają na integrację działań ludzi i agentów systemowych w otwartym środowisku rozproszonym w celu rozwiązywania problemów formułowanych dynamicznie w trakcie pracy systemu. Problemy te najczęściej nie mają charakteru algorytmicznego, tzn. generowane rozwiązania nie mogłyby zostać wyliczone w skończonej liczbie kroków na podstawie danych charakteryzujących uczestników obliczeń. Autorzy proponują...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Multi-Aspect Quality Assessment Of Mobile Image Classifiers For Companion Applications In The Publishing Sector
PublikacjaThe paper presents the problem of quality assessment of image classifiers used in mobile phones for complimentary companion applications. The advantages of using this kind of applications have been described and a Narrator on Demand (NoD) functionality has been described as one of the examples, where the application plays an audio file related to a book page that is physically in front of the phone's camera. For such a NoD application,...
-
Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children
PublikacjaThis paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublikacjaMultimodal interfaces development history is reviewed briefly in the introduction. Some applications of multimodal interfaces to education software for disabled people are presented. One of them, the LipMouse is a novel, vision-based human-computer interface that tracks user’s lip movements and detect lips gestures. A new approach to diagnosing Parkinson’s disease is also shown. The progression of the disease can be measured employing...
-
Three levels of fail-safe mode in MPI I/O NVRAM distributed cache
PublikacjaThe paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...
-
Structural and Temporal Topic Models of Feedbacks on Service Quality – A Path to Theory Development?
PublikacjaThere is growing interest in applying computational methods in analysing large amount of data without sacrificing rigour in Information Systems research. In this paper, we demonstrate how the use of structural and temporal topic modelling can be employed to produce insights of both theoretical and practical importance from the analysis of textual comments on the quality of services in hospitals. As a first step, we revealed the...
-
Video Cloud Services for Hospitals: Designing an End-to-End Cloud Service Platform for Medical Video Storage and Secure Access
Publikacja -
Association for Computing Machinery (ACM)
Wydawnictwa -
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Cluster Computing-The Journal of Networks Software Tools and Applications
Czasopisma -
Service restoration in survivable networks under attacks
PublikacjaW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Journal of Artificial Intelligence and Soft Computing Research
Czasopisma -
IEEE Transactions on Multi-Scale Computing Systems
Czasopisma -
International Journal of Trust Management in Computing and Communications
Czasopisma -
World Research Journal of Biologically-Inspired Computing
Czasopisma -
International Journal of Space-Based and Situated Computing
Czasopisma -
International Journal of Modeling Simulation and Scientific Computing
Czasopisma -
International Journal of Grid and High Performance Computing
Czasopisma -
ACM Journal on Emerging Technologies in Computing Systems
Czasopisma