Filtry
wszystkich: 320
-
Katalog
- Publikacje 194 wyników po odfiltrowaniu
- Czasopisma 6 wyników po odfiltrowaniu
- Konferencje 9 wyników po odfiltrowaniu
- Osoby 16 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 5 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 87 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: CLOUD COMPUTING, IAAS CLOUD, RESOURCES, BIG DATA, INTERNET OF THINGS, IOT
-
Optimization algorithm and filtration using the adaptive TIN model at the stage of initial processing of the ALS point cloud
PublikacjaAirborne laser scanning (ALS) provides survey results in the form of a point cloud. The ALS point cloud is a source of data used primarily for constructing a digital terrain model (DTM). To generate a DTM, the set of ALS observations must be first subjected to the point cloud processing methodology. A standard methodology is composed of the following stages: acquisition of the ALS data, initial processing (including filtration),...
-
Routing Method for Interplanetary Satellite Communication in IoT Networks Based on IPv6
PublikacjaThe matter of interplanetary network (IPN) connection is a complex and sophisticated topic. Space missions are aimed inter alia at studying the outer planets of our solar system. Data transmission itself, as well as receiving data from satellites located on the borders of the solar system, was only possible thanks to the use of powerful deep space network (DSN) receivers, located in various places on the surface of the Earth. In...
-
Suitability of LoRaWAN Technology for the Development of Maritime Applications
PublikacjaThe LoRaWAN Technology opens new possibilities for gathering and analysis of distributed data. In the paper we concentrate on its maritime usability which was tested by us in the period from June to August 2018. Measurements of the LoRaWAN network coverage in the Bay of Gdansk area were carried out. Various conditions and places were tested. The research was planned in such a way as to gradually increase the range and control the...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublikacjaWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublikacjaIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Jerzy Proficz dr hab. inż.
OsobyJerzy Proficz – dyrektor Centrum Informatycznego Trójmiejskiej Akademickiej Sieci Komputerowej (CI TASK) na Politechnice Gdańskiej. Uzyskał stopień naukowy doktora habilitowanego (2022) w dyscyplinie: Informatyka techniczna i telekomunikacja. Autor i współautor ponad 50 artykułów w czasopismach i na konferencjach naukowych związanych głównie z równoległym przetwarzaniem danych na komputerach dużej mocy (HPC, chmura obliczeniowa). Udział...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
International Conference on Green, Pervasive and Cloud Computing (International Conference on Grid and Pervasive Computing)
Konferencje -
Definiowany programowo uniwersalny interfejs radiowy inteligentnych urządzeń internetu rzeczy
PublikacjaIntensywny wzrost liczby urządzeń komunikujących się ze sobą na dużym obszarze wymaga opracowywania i realizacji rozwiązań systemowych. Z tego względu organizacja 3GPP zdefiniowała wąskopasmowy interfejs radiowy NB-IoT (Narrowband Internet of Things) będący podsystemem LTE (Long Term Evolution) na potrzeby zastosowań IoT niewymagających dużych przepływności. W niniejszym artykule przedstawiono charakterystykę systemu NB-IoT, a...
-
Modeling Volunteer Based Systems
PublikacjaThere are two main approaches to processing tasks requiring high amounts of computational power. One approach is using clusters of mostly identical hardware, placed in dedicated locations [1, 2, 3]. The other approach is outsourcing computing resources from large numbers of volunteers connected to the Internet [7]. This chapter presents an application of a mathematical model of the volunteer computing presented in Volume 1 of this...
-
C2 Niwa - The Centre of Competence for Novel Infrastructure of Workable Applications
PublikacjaScientific and cloud computing are discussed in the paper . The paradigm of EaaS (Everything as a Service) is presented and the design methodology of service oriented applications is proposed. Implementation of the SOSE (Software Oriented Software Engineering) approach is analyzed and the roles of developing teams to obtain software products satisfying business requirements are also shown. The above listed activities create a basic...
-
A Simplistic Downlink Channel Estimation Method for NB-IoT
PublikacjaThis paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...
-
DECISION - MAKING IN VIRTUAL SOFTWARE TEAMS USING CLOUD PLATFORMS
PublikacjaSoftware development projects are usually realized by traditional or virtual IT teams using computing clouds. Team collaboration requires decision - making regarding essential aspects of a project progress. The article concerns methods of decision – making process in the case of traditional and virtual teams’ work. The research results conducted in a group of IT specialists are presented, and to analyze their preferences in decision-making...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
High performance filtering for big datasets from Airborne Laser Scanning with CUDA technology
PublikacjaThere are many studies on the problems of processing big datasets provided by Airborne Laser Scanning (ALS). The processing of point clouds is often executed in stages or on the fragments of the measurement set. Therefore, solutions that enable the processing of the entire cloud at the same time in a simple, fast, efficient way are the subject of many researches. In this paper, authors propose to use General-Purpose computation...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublikacjaThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors
PublikacjaIn recent years, emotion recognition algorithms have achieved high efficiency, allowing the development of various affective and affect-aware applications. This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels. However, the increase in computing and communication capabilities of smartphones,...
-
Applying Decisional DNA to Internet of Things: The Concept and Initial Case Study
PublikacjaIn this article, we present a novel approach utilizing Decisional DNA to help the Internet of Things capture decisional events and reuse them for decision making in future operations. The Decisional DNA is a domain-independent, standard and flexible knowledge representation structure that allows its domains to acquire, store, and share experiential knowledge and formal decision events in an explicit way. We apply this approach...
-
Open smart glasses development platform for AAL applications
PublikacjaThis paper describes an open platform for multi sensory electronic glasses that supports new and enhanced methods for intelligent interaction with patients, with smart objects, or to be used as new data input modalities like proximity sensor or smart textile interfaces. All the activities have been developed, investigated and evaluated within EU CHIST-ERA eGlasses project...
-
Data Analysis in Bridge of Data
PublikacjaThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublikacjaAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublikacjaWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
Big Data Analytics for ICT Monitoring and Development
PublikacjaThe expanded growth of information and communication technology has opened new era of digitization which is proving to be a great challenge for researchers and scientists around the globe. The utmost paradigm is to handle and process the explosion of data with minimal cost and discover relevant hidden information in the least amount of time. The buzz word “BIG DATA” is a widely anticipated term with the potential to handle heterogeneous,...
-
Energy efficient indoor localisation for narrowband internet of things
PublikacjaThere are an increasing number of Narrow Band IoT devices being manufactured as the technology behind them develops quickly. The high co-channel interference and signal attenuation was seen in edge Narrow Band IoT devices make it challenging to guarantee the service quality of these devices. To maximize the data rate fairness of Narrow Band IoT devices, a multi-dimensional indoor localization model is devised, consisting of...
-
Airborne Laser Scanning Point Cloud Update by Used of the Terrestrial Laser Scanning and the Low-Level Aerial Photogrammetry
PublikacjaLaser scanning technology is a spatial information gathering technique which is commonly used all over the world. Systems where the red-light beam are used, are divided into: terrestrial, mobile and airborne scanning systems. The main differences between those are the accuracy, the data acquisition solution (f. e. in ALS and MLS besides of the laser scanner, the inertial navigation system is required) and the covered area in one...
-
A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention
PublikacjaTogether with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...
-
St. Adalberd church 3D point model
Dane BadawczeResearch data show the church of St. Adalbert in Gdansk, Poland. Two layers are presented in the .zip file: one represents the laser scanning result, the second represents the point cloud from 36 photogrammetry images from the UAV system. The aligned point clouds formed the basis to create the high-resolution 3D model. Reference data are laser scanning...
-
A new method of presosns identification based on comparative analysis of 3D face models
PublikacjaThe article presents the use of modern close range photogrammetry for possessing highly accurate 3D models of the human face (including the ears). Modern methods used to obtain precise data describing the construction of a human face, and even the whole human body, should allow to get finished measurement material in a very short time. Those features belong to the optical scanning technology. Comparative analysis of models of the...
-
Experience oriented enhancement of smartness for Internet of Things
PublikacjaIn this paper, we propose a novel approach, the Experience-Oriented Smart Things that allows experiential knowledge discovery, storage, involving, and sharing for Internet of Things. The main features, architecture, and initial experiments of this approach are introduced. Rather than take all the data produced by Internet of Things, this approach focuses on acquiring only interesting data for its knowledge discovery process. By...
-
ARTIFICIAL MODEL IN THE ASSESSMENT OF THE ALGORITHM OF OBJECTS RECORDED BY LASER SCANNING SHAPE DETECTION (ALS/TLS)
PublikacjaBrief description of the study and used methods. Brief description of the study and used As part of the preparatory work aimed to create the application solution allowing for the automation of searching objects in data, obtained in the scanning process using ALS (Airborne Laser Scanning) or TLS (Terrestrial Laser Scanning), the authors prepared a artificial (synthetic, theoretical) model of space, used for the verification of operation...
-
Classification of objects in the LIDAR point clouds using Deep Neural Networks based on the PointNet model
PublikacjaThis work attempts to meet the challenges associated with the classification of LIDAR point clouds by means of deep learning. In addition to achieving high accuracy, the designed system should allow the classification of point clouds covering an area of several dozen square kilometers within a reasonable time interval. Therefore, it must be characterized by fast processing and efficient use of memory. Thus, the most popular approaches...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Syntactic modular decomposition of large ontologies with relational database
PublikacjaSupport for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publikacjan order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
Konferencje -
A Parallax Shift Effect Correction Based on Cloud Height for Geostationary Satellites and Radar Observations
PublikacjaThe effect of cloud parallax shift occurs in satellite imaging, particularly for high angles of satellite observations. This study demonstrates new methods of parallax effect correction for clouds observed by geostationary satellites. The analytical method that could be found in literature, namely the Vicente et al./Koenig method, is presented at the beginning. It approximates a cloud position using an ellipsoid with semi-axes...
-
Model of Volunteer Based Systems.
PublikacjaThere are two main approaches to processing tasks requiring high amounts of computational power. One approach is using clusters of mostly identical hardware, placed in dedicated locations. The other approach is outsourcing computing resources from large numbers of volunteers connected to the Internet. This chapter attempts to formulate a mathematical model of the volunteer based approach to distributed computations and apply it...
-
Standard deviation as the optimization criterion in the OptD method and its influence on the generated DTM
PublikacjaReduction of the measurement dataset is one of the current issues related to constantly developing technologies that provide large datasets, eg. laser scanning. It could seems that presence and evolution of processors computer, increase of hard drive capacity etc. is the solution for development of such large datasets. And in fact it is, however, the “lighter” datasets are easier to work with. Additionally, reduced datasets can...
-
Programmatic Simulation of Laser Scanning Products
PublikacjaThe technology of laser scanning is widely used for producing three-dimensional digital representations of geographic features. The measurement results are usually available in the form of 3D point clouds, which are often used as a transitional data model in various remote sensing applications. Unfortunately, while the costs of Light Detection And Ranging scanners have dropped significantly in recent years, they are still considered...
-
Excitation of Circularly Polarized Wave via Single-Feed Metasurface-Integrated Compact Antenna for Internet of Things
PublikacjaA compact circularly polarized (CP) quasi-omnidirectional antenna is introduced for internet of things (IoT). The structure consists of two components implemented on FR-4 substrates, and sep-arated by an air gap: one printed with a rectangular patch fed through a matching network, and another with a metasurface and a ground plane. Two different methods for impedance matching are employed. An equivalent circuit model of the antenna...
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Zapewnianie wiarygodnosci przetwarzania przy integracji komponentów usług
PublikacjaPrzedstawiono problematykę Service Oriented Architecture(SOA) oraz nowoczesne metodologie integracji gotowych komponentów programistycznych.Omówiono Service Component Architecture (SCA), Cloud computing, oraz modelowanie procesów biznesowych jako metodologie zbliżone koncepcyjne do SOA. Opisano główne atrybuty wiarygodności i zestawionokonkretne techniki poprawy wiarygodno±ci. Modelowanie procesów biznesowychzaprezentowano na przykładzie...
-
A Survey of Vehicular Network Systems for Road Traffic Management
PublikacjaIn this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...
-
Channel State Estimation in LTE-Based Heterogenous Networks Using Deep Learning
PublikacjaFollowing the continuous development of the information technology, the concept of dense urban networks has evolved as well. The powerful tools, like machine learning, break new ground in smart network and interface design. In this paper the concept of using deep learning for estimating the radio channel parameters of the LTE (Long Term Evolution) radio interface is presented. It was proved that the deep learning approach provides...
-
Application of Reverse Engineering Technology in Part Design for Shipbuilding Industry
PublikacjaIn the shipbuilding industry, it is difficult to create CAD models of existing or prototype parts, especially with many freeform surfaces. The paper presents the creation of the CAD 3D model of a shipbuilding component with the application of the reverse engineering technology. Based on the data obtained from the digitization process, the component is reconstructed in point cloud processing programs and the CAD model is created....
-
Quality Modeling in Grid and Volunteer-Computing Systems
PublikacjaA model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...
-
A Cost-Effective Method for Reconstructing City-Building 3D Models from Sparse Lidar Point Clouds
PublikacjaThe recent popularization of airborne lidar scanners has provided a steady source of point cloud datasets containing the altitudes of bare earth surface and vegetation features as well as man-made structures. In contrast to terrestrial lidar, which produces dense point clouds of small areas, airborne laser sensors usually deliver sparse datasets that cover large municipalities. The latter are very useful in constructing digital...