Wyniki wyszukiwania dla: WAHN - MODELING - REPUTATION - SELFISH BEHAVIOR - PATH EQUATIONS
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublikacjaIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
A Centralized Reputation System for MANETs Based on Observed Path Performance
PublikacjaA reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...
-
Propagation Path Loss Modeling in Container Terminal Environment
PublikacjaThis paper describes novel method of path loss modeling for radio communication channels in container port area. Multi-variate empirical model is presented, based on multidimensional regression analysis of real path loss measurements from container terminal environment. The measurement instruments used in propagation studies in port area are also described.
-
QoS-sensitive selfish behavior in ad hoc wireless lans: a stochastic game model
PublikacjaRozważany jest prosty model stacji sieci bezprzewodowej wprowadzają-cych ruch elastyczny przy wymaganiu minimalnej przepływności. Każda stacja, okresowo przełączając się na egoistyczną konfigurację MAC, próbuje wyeliminować inne stacje z ubiegania się o pasmo sieci. Dla powstającej w ten sposób gry zastosowano model gry markowowskiej i pokazano istnienie symetrycznego punktu równowagi strategicznej.
-
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublikacjaDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Modeling of behavior of organic pollutants in aquatic and related ecosystems
PublikacjaW pracy omówiono możliwości wykorzystania różnych modeli do opisu zjawisk migracji oraz przemian w środowisku wodnym ksenobiotyków z grupy trwałych zanieczyszczeń organicznych (TZO). Przedstawiono charakterystykę zarówno modeli otwartych, jak i zamkniętych w warunkach ustalonych, jak i w warunkach nierównowagowych.
-
Modeling of the behavior of granular bodies using DEM with contact moments
PublikacjaW artykule przedstawiono wyniki symulacji badania trójosiowego dla materiałów granulowanych. Obliczenia wykonano przy zastosowaniu metody DEM. Pokazano wpływ momentów kontaktowych na wytrzymałość próbki. Zbadano wpływ parametrów mikroskopowych.
-
Systems, Environments, and Soliton Rate Equations: Toward Realistic Modeling
PublikacjaIn order to solve a system of nonlinear rate equations one can try to use some soliton methods. The procedure involves three steps: (1) find a ‘Lax representation’ where all the kinetic variables are combined into a single matrix ρ, all the kinetic constants are encoded in a matrix H; (2) find a Darboux–Bäcklund dressing transformation for the Lax representation iρ˙=[H,f(ρ)], where f models a time-dependent environment; (3) find...
-
Assessment of rod behavior theories used in spectral finite element modeling
PublikacjaW pracy przedstawiono teorie prętów i przedstawiono ich przydatnośc w analizie propagacji fal sprężystych z wykorzystaniem metody spektralnych elementów skończonych.
-
Modeling N2O behavior during denitrification with different carbon sources and electron acceptors
PublikacjaA mathematical model was developed for identification of the most important mechanism leading to nitrous oxide (N2O) accumulation in denitrifying activated sludge systems. The activated sludge model No. 2d (ASM2d) was extended to include intermediate three steps of the denitrification process. The formation and accumulation of nitric oxide (NO) was assumed to be very low in the performed laboratory experiments. These experiments...
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publikacja. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Some Aspects of Shear Behavior of Soft Soil–Concrete Interfaces and Its Consequences in Pile Shaft Friction Modeling
PublikacjaThis paper examines the stiffness degradation and interface failure load on soft soil–concrete interface. The friction behavior and its variability is investigated. The direct shear tests under constant normal load were used to establish parameters to hyperbolic interface model which provided a good approximation of the data from instrumented piles. Four instrumented piles were used to obtain reference soil–concrete interface behavior....
-
Piotr Paradowski dr
OsobyDr Piotr Paradowski's areas of expertise in quantitative social science methods include truncated and censored models, quantile regressions, survival analysis, panel data models, discrete regressions and qualitative choice models, instrumental variable estimation, and hierarchical modeling. He is also an expert in statistical matching and statistical methods to handle missing data. In addition, he conducts research on income and...
-
Image-based numerical modeling of the tensile deformation behavior and mechanical properties of additive manufactured Ti–6Al–4V diamond lattice structures
PublikacjaThis work concerns the numerical modeling of the deformation process and mechanical properties of structures obtained by the additive method laser power bed fusion (LPBF). The investigation uses diamond structures of Ti–6Al–4V titanium implantation alloy with various relative densities. To model the process of tensile deformation of the materials, geometric models were used, mapping the realistic shape of the examined structures....
-
Justyna Signerska-Rynkowska dr inż.
OsobySince 2021 visiting assistant professor in Dioscuri Centre in Topological Data Analysis (Institute of Mathematics of the Polish Academy of Sciences, IMPAN) Since 2016 assistant professor at Gdańsk University of Technology, Faculty of Applied Physics and Mathematics, Department of Differential Equations and Mathematics Applications 2020 - 2023 Principal Investigator in "SONATA" grant “Challenges of low-dimensional...
-
Marek Czachor prof. dr hab.
Osoby -
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublikacjaWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...