Wyniki wyszukiwania dla: COMMUNICATION PROTOCOLS
-
Comparative Review of Selected Internet Communication Protocols
Publikacja -
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublikacjaThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Konferencje -
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Wojciech Gumiński dr inż.
OsobyWojciech Gumiński ukończył studia na Wydziale Elektroniki, Telekomunikacji I Informatyki w 1991 r. W roku 2003 uzyskał stopień doktora nauk technicznych. Zainteresowania naukowe obejmują architektury sieciowe i protokoły telekomunikacyjne oraz cyfrowe przetwarzanie sygnałów. Uczestniczył jako główny wykonawca w szeregu projektach, między innymi: Inżynieria Internetu Przyszłości, PL-LAB 2020 i Internet na Bałtyku. Publikacje...
-
IoT protocols, architectures, and applications
PublikacjaThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...
-
Unbounded quantum advantage in communication complexity measured by distinguishability
PublikacjaCommunication complexity is a fundamental aspect of information science, concerned with the amount of communication required to solve a problem distributed among multiple parties. The standard quantification of one-way communication complexity relies on the minimal dimension of the communicated systems. In this paper, we measure the communication complexity of a task by the minimal distinguishability required to accomplish it,...
-
Zagrożenia bezpieczeństwa protokołów komunikacji morskiej, lotniczej i lądowej
PublikacjaW artykule przedstawiono przykładowe zagrożenia wykorzystujące słabości wybranych protokołów komunikacji morskiej, lotniczej i lądowej. Wskazano, jakie czynności należy podjąć, żeby się przed nimi ustrzec (przynajmniej częściowo). Opisano również kierunek, w jakim powinny być rozwijane analizowane protokoły, aby zwiększyć bezpieczeństwo osób je używających.
-
Protokoły łączności do transmisji strumieni multimedialnych na platformie KASKADA
PublikacjaPlatforma KASKADA rozumiana jako system przetwarzania strumieni multimedialnych dostarcza szeregu usług wspomagających zapewnienie bezpieczeństwa publicznego oraz ocenę badań medycznych. Wydajność platformy KASKADA w znaczącym stopniu uzależniona jest od efektywności metod komunikacji, w tym wymiany danych multimedialnych, które stanowią podstawę przetwarzania. Celem prowadzonych prac było zaprojektowanie podsystemu komunikacji...
-
Testing the Wide-Sense Stationarity of Bandpass Signals for Underwater Acoustic Communications
PublikacjaThe Underwater Acoustic Communication (UAC) systems work in communication channels characterized by a large variety of multipath propagation conditions that can additionally change over time. Designing a reliable communication system requires knowledge of the transmission parameters of the channel. There is a need for the development of adaptive signaling schemes that would dynamically optimize the signal parameters of the physical...
-
Testing OFDM Transmission Schemes for Shallow Water Acoustic Communications
PublikacjaLarge variability of communication properties of underwater acoustic channels, and especially strongly varying instantaneous conditions in shallow waters, is a tough challenge for the designers of underwater acoustics communication (UAC system. There is a need for developing adaptive signaling schemes that would dynamically optimize signal parameters in both physical and link layers of communication protocols. The orthogonal frequency...
-
Semi-definite programming and quantum information
PublikacjaThis paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...
-
Computer Networks EN 2022
Kursy OnlineThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
Computer Networks EN 2023
Kursy OnlineThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublikacjaThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
Analiza wpływu transmisji danych na jakość działania rozproszonych systemów sterowania
PublikacjaW artykule przedstawiono zagadnienia związane z transmisją danych w rozproszonych systemach sterowania. Opisano cechy charakterystyczne przemysłowych sieci i protokołów informatycznych. Utworzono model rozproszonego systemu sterowania poziomem cieczy w zbiorniku, w którym komunikacja oparta została na protokole Modbus RTU. Na podstawie zmian parametrów transmisji danych wykazano, że poprawna komunikacja pomiędzy elementami systemu...
-
Treatment of Odontogenic Maxillary Sinusitis with the Use of Growth Factors in Advanced Platelet-Rich Fibrin for Immediate Closure of Oro-Antral Communication: A Case Report
PublikacjaChronic odontogenic maxillary sinusitis (COMS), a prolonged inflammation of the maxillary sinus lasting over 12 weeks, is often a result of periapical lesions, marginal periodontitis, and complications like oro-antral communication (OAC) and fistula (OAF). OAC, commonly emerging post-teeth extraction in the lateral maxilla, lacks documented treatments using advanced platelet-rich fibrin (A-PRF). This study evaluates A-PRF’s efficacy...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublikacjaMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublikacjaThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
International Conference on Network Protocols
Konferencje -
International Workshop on Security Protocols
Konferencje -
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublikacjaQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublikacjaIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
International Workshop on Group-Oriented Cryptographic Protocols
Konferencje -
Computer controlled systems - 2022/2023
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
CCS-lecture-2023-2024
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...
-
Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks
Konferencje -
Analysis of IPv6 handovers in IEEE 802.16 environment
PublikacjaThe second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...
-
Silent Signals The Covert Network Shaping the Future
PublikacjaSilent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...
-
BODYGUARD PROFESSION A GUIDE TO THE ART OF PERSONAL PROTECTION
PublikacjaThe book "Bodyguard Profession: A Guide to the Art of Personal Protection" is a comprehensive guide that introduces readers to the intricacies of professional personal protection. The author thoroughly discusses both the physical and psychological aspects of a bodyguard's work, covering elements such as stress management, self-defense techniques, and the use of modern technology in VIP protection. The guide presents...
-
TRANSPORT POSSIBILITY FOR MPEG-4/AVC- AND MPEG-2-ENCODED VIDEO DATA IN IPTV: A COMPARISON STUDY
PublikacjaIPTV (Television over IP) is a modern service with a great potential to expand. It uses the IP transport platform, that is already in worldwide operation. At the time of writing, two techniques are used to transport the video and audio data of IPTV: MPEG-2 TS and Native RTP. The two techniques quite definitely have an influence on both quality of service (QoS) and quality of experience (QoE). This paper sets out to demonstrate...