Filtry
wszystkich: 1344
-
Katalog
- Publikacje 1127 wyników po odfiltrowaniu
- Czasopisma 49 wyników po odfiltrowaniu
- Konferencje 60 wyników po odfiltrowaniu
- Osoby 63 wyników po odfiltrowaniu
- Projekty 3 wyników po odfiltrowaniu
- Kursy Online 21 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 20 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: DIFFSERV PACKETS NETWORKS
-
Rapid tolerance‐aware design of miniaturized microwave passives by means of confined‐domain surrogates
PublikacjaThe effects of uncertainties, primarily manufacturing tolerances but also incomplete information about operating conditions or material parameters, can be detrimental to the performance of microwave components. Quantification of such effects is essential to ensure a meaningful evaluation of the structure, in particular, its reliability under imperfect fabrication procedures. The improvement of the circuit robustness can be achieved...
-
Variable‐fidelity modeling of antenna input characteristics using domain confinement and two‐stage Gaussian process regression surrogates
PublikacjaThe major bottleneck of electromagnetic (EM)-driven antenna design is the high CPU cost of massive simulations required by parametric optimization, uncertainty quantification, or robust design procedures. Fast surrogate models may be employed to mitigate this issue to a certain extent. Unfortunately, the curse of dimensionality is a serious limiting factor, hindering the construction of conventional data-driven models valid over...
-
Kriging metamodels and design re‐utilization for fast parameter tuning of antenna structures
PublikacjaThe paper addresses the problem of computationally efficient electromagnetic (EM)‐driven design closure of antenna structures. The foundations of the presented approach are fast kriging interpolation metamodels, utilized for two purposes: (a) producing a good starting point for further parameter tuning, and (b) yielding a reasonable Jacobian matrix estimate to jump‐start the optimization procedure. The models are rendered using...
-
Editorial for the special issue on advances in forward and inverse surrogate modeling for high-frequency design
PublikacjaThe design of modern‐day high‐frequency devices and circuits, including microwave/RF, antenna and photonic components, historically has relied on full‐wave electromagnetic (EM) simulation tools. Initially used for design verification, EM simulations are nowadays used in the design process itself, for example, for finding optimum values of geometry and/or material parameters of the structures of interest. In a growing number of...
-
A subdomain model for armature reaction field and open‐circuit field prediction in consequent pole permanent magnet machines
PublikacjaIn this paper, the machine quantity, such as electromagnetic torque, self and mutual inductances, and electromotive force, is analytically calculated for non-overlapping winding consequent pole slotted machine for open-circuit field and armature reaction. The sub-domain approach of (2-D) analytical model is developed using Maxwell's equations and divide the problem into slots, slot-openings, airgap and magnets region, the magnet...
-
A review on analytical models of brushless permanent magnet machines
PublikacjaThis study provides an in-depth investigation of the use of analytical and numerical methods in analyzing electrical machines. Although numerical models such as the finite-element method (FEM) can handle complex geometries and saturation effects, they have significant computational burdens, are time-consuming, and are inflexible when it comes to changing machine geometries or input values. Analytical models based on magnetic equivalent...
-
Rapid redesign of multiband antennas with respect to operating conditions and material parameters of substrate
PublikacjaThis work addresses geometry parameter scaling of multi-band antennas for Internet of Things applications. The presented approach is comprehensive and permits re-design of the structure with respect to both the operating frequencies and material parameters of the dielectric substrate. A two-step procedure is developed with the initial design obtained from an inverse surrogate model constructed using a set of appropriately prepared...
-
Size reduction of ultra-wideband antennas with efficiency and matching constraints
PublikacjaAntenna design is a multifaceted task that involves handling of various performance figures concerning both electrical performance of the structure as well as its geometry. Simultaneous control of several objectives through rigorous optimization is very challenging and virtually impossible through conventional approaches such as parameter sweeping. In this work, we investigate size reduction of ultra‐wideband antenna structures...
-
ZAPEWNIENIE SYNCHORNIZACJI CZASU PRZY CZĘŚCIOWYM WSPARCIU SIECI
PublikacjaCelem badań zaprezentowanych w artykule było sprawdzenie czy możliwe jest zapewnienie dużej dokładności synchronizacji czasu przy częściowym wsparciu sieci w oparciu o model HRM-1 składający się z 12 szeregowo podłączonych urządzeń sieciowych wraz z wygenerowanym ruchem sieciowym. Badania wykazały, że dla obecnie stosowanych technologii mobilnych takich jak LTE TDD możliwe jest zapewnienie odpowiedniej jakości synchronizacji czasu....
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublikacjaVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublikacjaThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublikacjaAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Influence of a Radio Frequency on RF Fingerprinting Accuracy Based on Ray Tracing Simulation
PublikacjaIn this paper the influence of a radio signal frequency on performance of Indoor Positioning System based on fingerprinting has been examined using ray-tracing simulations. It has been simulated how spatial distribution of an RF signal strength change with the signal’s frequency. The results were used to show its’ impact on the behavior of localization algorithms that are employing RSS measurements to determine node’s position...
-
Velocity measurement using the fdoa method in ground-based radio navigation system
PublikacjaVelocity is one of the main navigation parameters of the moving objects. However some systems of position estimation using radio wave measurements cannot provide velocity data due to limitation of their performance. In this paper a velocity measurement method for DS-CDMA radio navigation system is proposed, which doesn’t require full synchronization of reference stations carrier frequencies. The article presents basics of FDOA...
-
Design and implementation of GEPON architecture in laboratory testbed
PublikacjaThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
Operation, Administration, Maintenance in Carrier Grade Ethernet
PublikacjaOAM (Operation, Administration and Maintenance) plays a crucial role in carrier networks. OAM functionality ensures that network operators and service providers can maintain the quality of the services they offer. One of its major tasks is the detection of anomalies in the network before they become a problem. This enables network operators and service providers to deliver services that come up to a predetermined level of quality...
-
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
PublikacjaIP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublikacjaThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
Low Cost Method for Location Service in the WCDMA System
PublikacjaA new and low cost method for a location service (LCS) in the Wideband Code Division Multiple Access (WCDMA) system is outlined. This method, which is called TDOA + RTT, enables calculation of the geographical position of a mobile station (MS) without knowledge of relative time differences (RTDs) between base stations (BSs). The TDOA+RTT method is based on the measurement of round trip times (RTTs) between the MS and the serving...
-
Selfie and Personal Branding Phenomena in the Context of the Network Economy. A Literature Review
PublikacjaSelf-taken pictures called “selfies” shared in social media have become a worldwide phenomenon. This is due to the increased need of human being to share to other people their daily lives and to build their own personal brand in the networked world. Despite that, the subject of personal branding has not been sufficiently discussed in academic marketing literature over the past decade. The objective of the study is to present the...
-
Different Ways to Apply a Measurement Instrument of E-Nose Type to Evaluate Ambient Air Quality with Respect to Odour Nuisance in a Vicinity of Municipal Processing Plants
PublikacjaThis review paper presents different ways to apply a measurement instrument of e-nose type to evaluate ambient air with respect to detection of the odorants characterized by unpleasant odour in a vicinity of municipal processing plants. An emphasis was put on the following applications of the electronic nose instruments: monitoring networks, remote controlled robots and drones as well as portable devices. Moreover, this paper presents...
-
Vision-based parking lot occupancy evaluation system using 2D separable discrete wavelet transform
PublikacjaA simple system for rough estimation of the occupancy of an ad-hoc organized parking lot is presented. A reasonably simple microprocessor hardware with a low resolution monochrome video camera observing the parking lot from the location high above the parking surface is capable of running the proposed 2-D separable discrete wavelet transform (DWT)-based algorithm, reporting the percentage of the observed parking area occupied by...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublikacjaThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Fractional Calculus Evaluation of Hyaluronic Acid Crosslinking in a Nanoscopic Part of Articular Cartilage Model System
PublikacjaThis work presents a study of the mechanism of physical crosslinking of hyaluronic acid in the presence of common phospholipids in synovial joint organ systems. Molecular dynamic simulations have been executed to understand the formation of hyaluronan networks at various phospholipid concentrations. The results of the simulations suggest that the mechanisms exhibit subdiffusion characteristics. Transportation quantities derive...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublikacjaOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Działalność w obszarze grantów realizowana przez Katedrę Sieci Teleinformacyjnych
PublikacjaPrzedstawiono działalność Katedry Sieci Teleinformacyjnych PG WETI w obszarze grantów finansowanych przez instytucje centralne, przy czym główny nacisk położono na scharakteryzowanie aktualnie realizowanych projektów. Opisano dwa projekty finansowane przez NCBiR. Pierwszy dotyczy koncepcji oraz implementacji integracji informacji w rozproszonych elementach systemu wymiany danych Straży Granicznej, natomiast drugi strumieniowej...
-
Inteligentne systemy agentowe w systemach zdalnego nauczania
PublikacjaW pracy omówiono inteligentne systemy agentowe w systemach zdalnego nauczania. Po krótkim przedstawieniu ewolucji systemów zdalnego nauczania i ich wybranych zastosowań, scharakteryzowano inteligentne agenty edukacyjne. Omówiono wykorzystanie programowania genetycznego oraz algorytmów neuro-ewolucyjnych do implementacji oprogramowania tej klasy. Ponadto, nawiązano do modelu Map-Reduce, który efektywnie wspiera architekturę nowoczesnego...
-
Advanced sensitivity analysis of the impact of the temporal distribution and intensity of rainfall on hydrograph parameters in urban catchments
PublikacjaKnowledge of the variability of the hydrograph of outflow from urban catchments is highly important for measurements and evaluation of the operation of sewer networks. Currently, hydrodynamic models are most frequently used for hydrograph modeling. Since a large number of their parameters have to be identified, there may be problems at the calibration stage. Hence, sensitivity analysis is used to limit the number of parameters....
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models
PublikacjaDeep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...
-
Jakość usług w optycznej sieci wielodomenowej z hierarchiczną strukturą płaszczyzn sterowania
PublikacjaW rozprawie przedstawiono przegląd architektur sieci z gwarancją jakości klas usług oraz stan prac w zakresie realizacji optycznych sieci ASON, GMPLS oraz ASON/GMPLS. Opisano wymagania i zaawansowanie prac w realizacji sieci ASON/GMPLS z hierarchiczną strukturą płaszczyzn sterowania oraz problemy związane z zagadnieniem jakości klas usług w tej sieci. Zaprezentowano założenia, koncepcję oraz realizację modelu symulacyjnego optycznej...
-
Projektowanie i eksploatacja dróg szynowych z wykorzystaniem mobilnych pomiarów satelitarnych
PublikacjaNiniejsza monografia zawiera szczegółowy opis aktywnych sieci geodezyjnych GNSS oraz modelowania dokładności określania pozycji w pomiarach satelitarnych. Omówiono również opracowaną technikę mobilnych pomiarów satelitarnych toru kolejowego oraz aplikacje związane z jej zastosowaniem w projektowaniu i eksploatacji dróg szynowych. Autorzy zawarli w pracy wyniki swoich badań, wykonywanych na przestrzeni lat 2009–2015. Badania przeprowadzono...
-
Damage detection in plates based on Lamb wavefront shape reconstruction
PublikacjaMany of the current studies in the area of damage detection using elastic wave propagation are based on deploying sensor networks with a large number of piezoelectric transducers to detect small-size cracks. A major limitation of these studies is that cracks are usually larger and have different shapes in real cases. Moreover, using a large number of sensing nodes for damage detection is both costly and computationally intensive....
-
Interpretable Deep Learning Model for the Detection and Reconstruction of Dysarthric Speech
PublikacjaWe present a novel deep learning model for the detection and reconstruction of dysarthric speech. We train the model with a multi-task learning technique to jointly solve dysarthria detection and speech reconstruction tasks. The model key feature is a low-dimensional latent space that is meant to encode the properties of dysarthric speech. It is commonly believed that neural networks are black boxes that solve problems but do not...
-
Directions and Prospects for the Development of the Electric Car Market in Selected ASEAN Countries
PublikacjaThe purpose of this article is to present the current situation and evaluate the opportuni‐ ties for the development of the electric car market in selected Southeast Asian countries in the con‐ text of the current situation in the rest of the world. Currently, the electric car market is at an ad‐ vanced stage of development in regions such as Western Europe, the USA, and China. It should be noted, however, that the number of electric...
-
Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles
PublikacjaAs the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...
-
Estimation and Prediction of Vertical Deformations of Random Surfaces, Applying the Total Least Squares Collocation Method
PublikacjaThis paper proposes a method for determining the vertical deformations treated as random fields. It is assumed that the monitored surfaces are subject not only to deterministic deformations, but also to random fluctuations. Furthermore, the existence of random noise coming from surface’s vibrations is also assumed. Such noise disturbs the deformation’s functional models. Surface monitoring with the use of the geodetic levelling...
-
OBTAINING FLUID FLOW PATTERN FOR TURBINE STAGE WITH NEURAL MODEL.
PublikacjaIn the paper possibility of applying neural model to obtaining patterns of proper operation for fluid flow in turbine stage for fluid-flow diagnostics is discussed. Main differences between Computational Fluid Dynamics (CFD) solvers and neural model is given, also limitations and advantages of both are considered. Time of calculations of both methods was given, also possibilities of shortening that time with preserving the accuracy...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Current air quality analytics and monitoring: A review
PublikacjaThis review summarizes the different tools and concepts that are commonly applied in air quality monitoring. The monitoring of atmosphere is extremely important as the air quality is an important problem for large communities. Main requirements for analytical devices used for monitoring include a long period of autonomic operation and portability. These instruments, however, are often characterized by poor analytical performance....
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Disciplines and measures of information resilience
PublikacjaCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Dynamic Signal Strength Mapping and Analysis by Means of Mobile Geographic Information System
PublikacjaBluetooth beacons are becoming increasingly popular for various applications such as marketing or indoor navigation. However, designing a proper beacon installation requires knowledge of the possible sources of interference in the target environment. While theoretically beacon signal strength should decay linearly with log distance, on-site measurements usually reveal that noise from objects such as Wi-Fi networks operating in...
-
Fragmentation of Hydrographic Big Data Into Subsets During Reduction Process
PublikacjaThe article presented problems of fragmentation of hydrographic big data into smaller subsets during reduction process. Data reduction is a processing of reduce the value of the data set, in order to make them easier and more effective for the goals of the analysis. The main aim of authors is to create new reduction method. The article presented the first stage of this method – fragmentation of bathymetric data into subsets. It...
-
Fading Modelling in Dynamic Off-Body Channels
PublikacjaThis paper presents an off-body fading channel model for Body Area Networks. The proposed model, based on both simulations and measurements at 2.45 GHz in a realistic indoor environment, consists of three components: mean path loss, body shadowing, and multipath fading. The first is modelled as a log function of distance, the path loss exponent being in between 0.4 and 1.6. A statistical perspective is taken for the other two components,...
-
Applying Decisional DNA to Internet of Things: The Concept and Initial Case Study
PublikacjaIn this article, we present a novel approach utilizing Decisional DNA to help the Internet of Things capture decisional events and reuse them for decision making in future operations. The Decisional DNA is a domain-independent, standard and flexible knowledge representation structure that allows its domains to acquire, store, and share experiential knowledge and formal decision events in an explicit way. We apply this approach...
-
Risk Diagnosis and Management with BBN for Civil Engineering Projects during Construction and Operation
PublikacjaThe authors demonstrate how expert knowledge about the construction and operation phases combined with monitoring data can be utilized for the diagnosis and management of risks typical to large civil engineering projects. The methodology chosen for estimating the probabilities of risk elements is known as Bayesian Belief Networks (BBN). Using a BBN model one can keep on updating the risk event probabilities as the new evidence...
-
Residual MobileNets
PublikacjaAs modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...