Wyniki wyszukiwania dla: MOBILE NETWORK
-
International Journal of Mobile Network Design and Innovation
Czasopisma -
Wireless and mobile networking (Foreword)
PublikacjaArtykuł zawiera omówienie prac z zakresu technologii sieci bezprzewodowych zamieszczonych na konferencji IFIP WMNC 2009.
-
Mobile Networks' Analysis in Terms of QoS Performance Assessment
PublikacjaQuality of service (QoS) assessment is one of the basic processes carried out by mobile network operators (MNOs) and regulators of the telecommunications market. Usually, professional companies carry out measurements for various country areas and use cases (scenarios). In this paper, we show exemplary measurement results carried out in drive tests in the vicinity of the Polish capital by a professional company. The measurement...
-
MOBILE NETWORKS & APPLICATIONS
Czasopisma -
INTEGRATION OF THE MOBILE PLATFORMS BASED ON SOCIAL NETWORK SERVICE DIRECTED AT USERS LOCALIZATION
PublikacjaThis paper presents an architecture overview and some aspects of implementation of the social network service directed at users localization. It shows how web services can be used as a tool for integrating different mobile platforms with a web application. The main focus is set on communication between system elements and related problems.
-
Optical Sensor Based Gestures Inference Using Recurrent Neural Network in Mobile Conditions
PublikacjaIn this paper the implementation of recurrent neural network models for hand gesture recognition on edge devices was performed. The models were trained with 27 hand gestures recorded with the use of a linear optical sensor consisting of 8 photodiodes and 4 LEDs. Different models, trained off-line, were tested in terms of different network topologies (different number of neurons and layers) and different effective sampling frequency...
-
A Method of Fast and Simultaneous Calibration of Many Mobile FMCW Radars Operating in a Network Anti-Drone System
PublikacjaA market for small drones is developing very fast. They are used for leisure activities and exploited in commercial applications. However, there is a growing concern for accidental or even criminal misuses of these platforms. Dangerous incidents with drones are appearing more often, and have caused many institutions to start thinking about anti-drone solutions. There are many cases when building stationary systems seems to be aimless...
-
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Czasopisma -
Collision-free network exploration
PublikacjaMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Collision-Free Network Exploration
PublikacjaA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Self-Organizing Wireless Nodes Monitoring Network
PublikacjaThe concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.
-
Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6
PublikacjaMultimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Cellular network quality evaluation at a university campus on the eve of 5G
PublikacjaThanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...
-
Mobile monitoring system for gaseous air pollution
PublikacjaThe concept of a mobile monitoring system for chemical agents control in the air is presented. The proposed system can be applied to measure industrial and car traffic air pollution. A monitoring station is relatively small and can be placed on cars or public transportation vehicles. Measured concentrations of air pollutants are collected and transferred via the GSM network to a central data base. Exemplary results from a measurement...
-
A system of visualization of operational situation on digital maps for mobile units of the Border Guards
PublikacjaBorder guards have to be equipped with technology enabling a communication, an acquisition, an exchange, and a visualization of data in different operational situations. This also applies to the staff, which is located on mobile units such as ground vehicles, aircrafts and vessels. Within the project realized for the Polish Border Guard and financed by The National Centre for Research and Development, a system was designed and...
-
Gossiping by energy-constrained mobile agents in tree networks
PublikacjaEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Ubiquity of client access in heterogeneous access environment
PublikacjaWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Advanced surveillance and operational communication system employing mobile terminals
PublikacjaDistributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...
-
Decontaminating Arbitrary Graphs by Mobile Agents: a Survey
PublikacjaA team of mobile agents starting from homebases need to visit and clean all nodes of the network. The goal is to find a strategy, which would be optimal in the sense of the number of needed entities, the number of moves performed by them or the completion time of the strategy. Currently, the field of distributed graph searching by a team of mobile agents is rapidly expanding and many new approaches and models are being presented...
-
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
A Point Set Connection Problem for Autonomous Mobile Robots in a Grid
PublikacjaConsider an orthogonal grid of streets and avenues in a Manhattan-like city populated by stationary sensor modules at some intersections and mobile robots that can serve as relays of information that the modules exchange, where both module-module and module-robot communication is limited to a straight line of sight within the grid. The robots are oblivious and move asynchronously. We present a distributed algorithm that, given...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Performance Evaluation of a Multidomain IMS/NGN Network Including Service and Transport Stratum
PublikacjaThe Next Generation Network (NGN) architecture was proposed for delivering various multimedia services with guaranteed quality. For this reason, the elements of the IP Multimedia Subsystem (IMS) concept (an important part of 4G/5G/6G mobile networks) are used in its service stratum. This paper presents comprehensive research on how the parameters of an IMS/NGN network and traffic sources influence mean Call Set-up Delay (E(CSD))...
-
Network effects—do they matter for digital technologies diffusion?
PublikacjaPurpose The main research target of this paper is to capture the network effects using the case of mobile cellular telephony, identified in European telecommunication markets, and its determinants enhancing the process of digital technologies diffusion. Design/methodology/approach This research relies on panel and dynamic panel regression analysis. The empirical sample covers 30 European countries, and the period for the analysis...
-
DAB+ Coverage Analysis: a New Look at Network Planning using GIS Tools
PublikacjaFor many years, the matter of designing a transmitter network, optimized for best signal coverage, has been a subject of intense research. In the last decade, numerous researchers and institutions used GIS and spatial analysis tools for network planning, especially transmitter location. Currently, many existing systems operate in a strictly two-dimensional manner, not taking into account the three-dimensional nature of the analyzed...
-
Planning a Cost-Effective Delay-Constrained Passive Optical Network for 5G Fronthaul
PublikacjaWith the rapid growth in the telecommunications industry moving towards 5G and beyond (5GB) and the emergence of data-hungry and time-sensitive applications, Mobile Network Operators (MNOs) are faced with a considerable challenge to keep up with these new demands. Cloud radio access network (CRAN) has emerged as a cost-effective architecture that improves 5GB performance. The fronthaul segment of the CRAN necessitates a high-capacity...
-
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublikacjaThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublikacjaRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
PublikacjaPopularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...
-
Neural network training with limited precision and asymmetric exponent
PublikacjaAlong with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...
-
Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network
PublikacjaIn this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The...
-
Embedded device for indoor positioning of mobile terminals in ISM 2.4 GHz frequency band integrated with ESPAR antenna
PublikacjaIn the era of multifunctional mobile phones, wireless positioning is one of the most important branches of telecommunications development. This functionality is possible thanks to global positioning systems such as GPS, whose services are available to every average user. Global systems, however, suffer from their low accuracy in confined environments such as forests and building interiors. A popular...
-
Mobile navigation system for visually impaired users in the urban environment
PublikacjaThis paper describes the prototype version of a mobile application supporting independent movement of theblind. Its objective is to improve the quality of life of visually impaired people, providing them with navigationalassistance in urban areas. The authors present the most important modules of the application. The module forprecise positioning using DGPS data from the ASG-EUPOS network as well as enhancements of positioning...
-
Study on CPU and RAM Resource Consumption of Mobile Devices using Streaming Services
PublikacjaStreaming multimedia services have become very popular in recent years, due to the development of wireless networks. With the growing number of mobile devices worldwide, service providers offer dedicated applications that allow to deliver on-demand audio and video content anytime and everywhere. The aim of this study was to compare different streaming services and investigate their impact on the CPU and RAM resources, with respect...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublikacjaDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Sensor Position Estimation Method for IoT Using Mobile Reference Node
PublikacjaThe paper proposes an innovative method of locating objects for the Internet of Things (IoT). The proposed method allows the position of a fixed measuring sensor (MS) to be estimated using one mobile base station with a known position moving around the MS. The mathematical analysis of the method, and three algorithms — Newton’s (NA), gradient descent (GD) and genetic (GA) — for solving the system of non-linear positional equations...
-
DOP and Pseudorange Error Estimation in Mobile GNSS Systems for Android OS Applications
PublikacjaIn the near past, GNSS (Global Navigation Satellite Systems) were only offered for a narrow group of recipients. Nowadays, thanks to mobile devices, they are available to anyone and everywhere. Personal navigation, searching for POI (Point of Interest), etc., had become a basic essential activity. Thanks to the widespread and availability of smartphones each user can obtain information considering his or her location even in an...
-
Mobile Cloud computing architecture for massively parallelizablegeometric computation
PublikacjaCloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...
-
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublikacjaDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...
-
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
PublikacjaThe new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
The analysis of tram tracks geometrical layout based on Mobile Satellite Measurements
PublikacjaIn this article, the results of the research in a field of which uses active global navigation satellite system (GNSS) geodetic networks for the inventory of geodetic geometric tram tracks are presented. The applied measurement technique has been adapted for the designing of the geometric layout of tram tracks. Several configurations of receivers and settings of an active GNSS networks with the objective to increase the accuracy...
-
Cooperative Data Transmission in Wireless Vehicular Networks
PublikacjaThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
DOP and Pseudorange Error Estimation in Urban Environments for Mobile Android GNSS Applications
PublikacjaJust a couple of years ago, GNSS (Global Navigation Satellite Systems) were available only for a narrow group of users. Currently, with the outbreak of mobile devices, they are accessible to anyone and everywhere. Urban navigation or searching for POIs (Points of Interest) had become an everyday activity. With the availability of consumer electronics and wireless technologies, each user can obtain information considering his or...
-
On the Consumption of Multimedia Content Using Mobile Devices: a Year to Year User Case Study
PublikacjaIn the early days, consumption of multimedia content related with audio signals was only possible in a stationary manner. The music player was located at home, with a necessary physical drive. An alternative way for an individual was to attend a live performance at a concert hall or host a private concert at home. To sum up, audio-visual effects were only reserved for a narrow group of recipients. Today, thanks to portable players,...
-
Measurements of OF QoS/QoE parameters for media streaming in a PMIPv6 TESTBED WITH 802.11 b/g/n WLANs
PublikacjaA growing number of mobile devices and the increasing popularity of multimedia services result in a new challenge of providing mobility in access networks. The paper describes experimental research on media (audio and video) streaming in a mobile IEEE 802.11 b/g/n environment realizing network-based mobility. It is an approach to mobility that requires little or no modification of the mobile terminal. Assessment of relevant parameters...
-
Study on transmission quality in cellular 4G and 5G networks between 2019–2021: Impact of the COVID-19 pandemic on the level of provided services by operating base transceiver stations
PublikacjaThe COVID-19 pandemic has significantly limited user mobility, not least among students. Remote learning had a particular impact on resource allocation in relation to using terrestrial cellular networks, especially 4G systems in urban agglomerations. This paper presents the results of a quality evaluation of an outdoor environment, carried out between 2019 and 2021 on the campus of a technical university. Annual studies are conducted...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublikacjaIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublikacjaWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublikacjaThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
Overview of cooperative communication methods
PublikacjaThe paper presents issues related to the cooperative communication in wireless networks. Cooperative com-munication involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. It is also possible to use several different data transmission standards. The paper presents the methods used to implement cooperative communication. The types of cooperative...
-
ZAPEWNIENIE SYNCHORNIZACJI CZASU PRZY CZĘŚCIOWYM WSPARCIU SIECI
PublikacjaCelem badań zaprezentowanych w artykule było sprawdzenie czy możliwe jest zapewnienie dużej dokładności synchronizacji czasu przy częściowym wsparciu sieci w oparciu o model HRM-1 składający się z 12 szeregowo podłączonych urządzeń sieciowych wraz z wygenerowanym ruchem sieciowym. Badania wykazały, że dla obecnie stosowanych technologii mobilnych takich jak LTE TDD możliwe jest zapewnienie odpowiedniej jakości synchronizacji czasu....
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
A Survey of Vehicular Network Systems for Road Traffic Management
PublikacjaIn this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublikacjaWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Throughput-Coverage Characteristics for Soft and Partial Frequency Reuse in the LTE Downlink
PublikacjaThe paper presents results of simulation and evaluation of throughput-coverage characteristics for the OFDMA-based LTE network with Soft Frequency Reuse or Partial Frequency Reuse. Firstly, simulation results of throughput characteristics for a single user connection are presented, which allow the evaluation of the stability and availability of bit rate achieved in different areas of a cell. Secondly, the capacity characteristics...
-
Technological substitution in Asia
PublikacjaThis book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublikacjaFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublikacjaWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publikacja. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublikacjaWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle
PublikacjaIn the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...
-
The searchlight problem for road networks
PublikacjaWe consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublikacjaThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
Augmenting digital documents with negotiation capability
PublikacjaActive digital documents are not only capable of performing various operations using their internal functionality and external services, accessible in the environment in which they operate, but can also migrate on their own over a network of mobile devices that provide dynamically changing execution contexts. They may imply conflicts between preferences of the active document and the device the former wishes to execute on. In the...
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublikacjaMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Realizacja przełączeń terminali ruchomych przez elementy infrastruktury systemu mobilności
PublikacjaW artykule przedstawione zostało rozwiązanie pozwalające zrealizować mobilność terminali, które nie posiadają zaimplementowanych zaawansowanych mechanizmów dedykowanych dla tej usługi. Opisano protokół Proxy Mobile IPv6 jako rozwiązanie wpisujące się w model network-based localized mobility management, w której to elementy infrastruktury systemu odpowiadają za zachowanie ciągłości połączenia w trakcie przełączania. Zaprezentowane...
-
Obsługa przełączeń terminali ruchomych niewspierających mobilności
PublikacjaArtykuł omawia koncepcję network-based mobility management umożliwiającą obsługę terminali ruchomych niewspierających protokołów mobilności. Praca koncentruje się na protokole Proxy Mobile IPv6 (PMIPv6) który zapewnienia ciągłą osiągalność terminala ruchomego, pomimo zmiany punktu przyłączenia terminala do sieci. W dalszej części artykuł przybliża wysiłki autorów poczynione w celu uruchomienia środowiska do testowania efektywności...
-
Pose classification in the gesture recognition using the linear optical sensor
PublikacjaGesture sensors for mobile devices, which have a capability of distinguishing hand poses, require efficient and accurate classifiers in order to recognize gestures based on the sequences of primitives. Two methods of poses recognition for the optical linear sensor were proposed and validated. The Gaussian distribution fitting and Artificial Neural Network based methods represent two kinds of classification approaches. Three types...
-
Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective
PublikacjaCurrently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...
-
Stanowisko wizualizacji zdarzeń w systemie STRADAR – realizacja i funkcje dla operatora
PublikacjaIt is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The system, with the use of a network of sensors located in both stationary and mobile...
-
Intelligent Autonomous Robot Supporting Small Pets in Domestic Environment
PublikacjaIn this contribution, we present preliminary results of the student project aimed at the development of an intelligent autonomous robot supporting small pets in a domestic environment. The main task of this robot is to protect a freely moving small pets against accidental stepping on them by home residents. For this purpose, we have developed the mobile robot which follows a pet and makes an alarm signal when a human is approaching....
-
Detection of the First Component of the Received LTE Signal in the OTDoA Method
PublikacjaIn a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...
-
Resilience of 5G Mobile Communication Systems to Massive Disruptions
PublikacjaThis chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the remaining part of the network and (c) multi-operator protection to address the resilience...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublikacjaAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
5G Millimeter Wave Network Optimization: Dual Connectivity and Power Allocation Strategy
PublikacjaThe fifth generation (5G) of mobile networks utilizing millimeter Wave (mmWave) bands can be considered the leading player in meeting the continuously increasing hunger of the end user demands in the near future. However, 5G networks are characterized by high power consumption, which poses a significant challenge to the efficient management of base stations (BSs) and user association. Implementing new power consumption and user...
-
Gesture Recognition With the Linear Optical Sensor and Recurrent Neural Networks
PublikacjaIn this paper, the optical linear sensor, a representative of low-resolution sensors, was investigated in the multiclass recognition of near-field hand gestures. The recurrent neural network (RNN) with a gated recurrent unit (GRU) memory cell was utilized as a gestures classifier. A set of 27 gestures was collected from a group of volunteers. The 27 000 sequences obtained were divided into training, validation, and test subsets....
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublikacjaFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
THE ROLE OF INFERENCE IN MOBILE MEDICAL APPLICATION DESIGN
PublikacjaIn the early 21st century, artificial intelligence began to be used to process medical information. However, before this happened, predictive models used in healthcare could only consider a limited number of variables, and only in properly structured and organised medical data. Today, advanced tools based on machine learning techniques - which, using artificial neural networks, can explore extremely complex relationships - and...
-
Projekt badawczy BRIK: Opracowanie innowacyjnej metody wyznaczania precyzyjnej trajektorii pojazdu szynowego
PublikacjaW artykule przedstawiono podstawowe informacje dotyczące projektu badawczego realizowanego na zlecenie Narodowego Centrum Badań i Rozwoju oraz Spółki PKP Polskie Linie Kolejowe S. A. przez Konsorcjum Politechniki Gdańskiej i Uniwersytetu Morskiego w Gdyni. Projekt obejmuje wykorzystanie nowoczesnych metod pomiarowych, takich jak techniki pozycjonowania satelitarnego GNSS, pomiary inercyjne INS oraz skaning laserowy LS, w procesie...
-
A Method of MOS Evaluation for Video Based Services
PublikacjaThis paper deals with a method for QoE evaluation for the services transmitting large amount of data perceived by the end user in relatively short time periods, e.g. streaming video in mobile operator...
-
A Low-Cost System for Far-Field Non-Anechoic Measurements of Antenna Performance Figures
PublikacjaPrototype measurements are the key step in the development of antenna structures. Typically, their far-field characteristics are validated in expensive, dedicated facilities such as open range sites, or anechoic chambers. Despite being necessary for obtaining high-precision data (e.g., for device qualification), the use of costly infrastructure might not be fully justified when the main goal of measurements includes demonstration...
-
Design and Evaluation of the Compact and Autonomous Energy Subsystem of a Wave Energy Converter
PublikacjaThis paper presents the results of the design process focused on the development of the energy subsystem (ES) of a wave energy converter (WEC). The ES is an important electrical part that significantly affects the energy reliability and energy efficiency of the entire WEC device. The designed ES was intended for compact WECs powering IoT network devices working in the distributed grid. The developed ES is an electronic circuit...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublikacjaDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublikacjaThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
PublikacjaIn its early days, consumption of multimedia content was only possible at a stationary terminal device. The music player was located at home, and had to have a physical drive. Over the last decade, there has been an enormous increase in the number of online streaming platforms. These services enable users to consume rich multimedia content on various devices. Thanks to the widespread and availability of portable devices, any person...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
Automated Parameter Determination for Horizontal Curves for the Purposes of Road Safety Models with the Use of the Global Positioning System
PublikacjaThis paper presents the results of research conducted to develop an automated system capable of determining parameters for horizontal curves. The system presented in this article could calculate the actual course of a road by means of a two-stage positioning of recorded points along the road. In the first stage, measurements were taken with a Real-Time Network (RTN) receiver installed in a research vehicle. In the second stage,...