Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "management control" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks
Autorzy:
Felkner, A.
Powiązania:
https://bibliotekanauki.pl/articles/307588.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
role-based trust management
trust
wireless sensor networks
Opis:
Trust plays an important role in human life environments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person. In social sciences trust between humans was studied, but it also was analyzed in economic transactions. A lot of computer scientists from different areas, like security, semantic web, electronic commerce, social networks tried to transfer this concept to their domains. Trust is an essential factor in any kind of network, whether social or computer. Wireless sensor networks (WSN) are characterized by severely constrained resources, they have limited power supplies, low transmission bandwidth, small memory sizes and limited energy, therefore security techniques used in traditional wired networks cannot be adopted directly. Some effort has been expended in this fields, but the concept of trust is defined in slightly different ways by different researchers. In this paper we will show how the family of Role-based Trust management languages (RT) can be used in WSN. RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 4; 70-77
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Interference Management using Power Control for Device-to-Device Communication in Future Cellular Network
Autorzy:
Nugraha, T. A.
Pamungkas, M. P.
Chamim, A. N. N.
Powiązania:
https://bibliotekanauki.pl/articles/958069.pdf
Data publikacji:
2018
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cellular network
device-to-device communication
interference management
power control
Opis:
There are many scenarios that have been proposed for fifth generation (5G) networks. Some of them, if implemented, will bring fundamental changes at the architectural and node level. One example of such proposed technologies is device-to-device (D2D) communications which will change the nature of conventional cellular network design. D2D permits direct communication between two or more user devices without intervention of the base station (i.e. eNB). D2D can ensure network performance improvement over the traditional cellular network, because it can offload the mobile data traffic from the other devices. However, applying D2D features in a cellular network will bring about more complex interference problems, since D2D communication uses the same band as its underlying cellular communication network. The aim of this research is to investigate interference-related problems caused by D2D communications, affecting the underlying cellular networks, during downlink and uplink transmissions. The paper examines the use of power control methods to mitigate interference. A comparison is offered between fixed power level (FC) with or without power control, and adaptive power controls using two methods (AC1 and AC2), on a base station or on each of the D2D devices, based on the measured signal to interference plus noise ratio (SINR). The simulation results show that both power control methods contribute to improvement of network performance. AC1 and AC2 can improve SINR by about 1 dB and 0.5 dB compared to FC in a downlink transmission, and by 0.5 dB in an uplink transmission.
Źródło:
Journal of Telecommunications and Information Technology; 2018, 3; 31-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Two semantics of trust management language with negation
Autorzy:
Felkner, A.
Powiązania:
https://bibliotekanauki.pl/articles/308637.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
inference system
monotonicity
role-based trust management
set-theoretic semantics
Opis:
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The main topic of this paper is RT⊖, a language which provides a carefully controlled form of non-monotonicity. The core part of the paper defines two different semantics of RT⊖ language – a relational, set-theoretic semantics for the language, and an inference system, which is a kind of operational semantics. The set-theoretic semantics maps roles to a set of entity names. In the operational semantics credentials can be derived from an initial set of credentials using a set of inference rules. The soundness and the completeness of the inference system with respect to the set-theoretic semantics of RT⊖ will be proven.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 4; 102-108
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization of Call Admission Control for UTRAN
Autorzy:
Wągrowski, M.
Ludwin, W.
Powiązania:
https://bibliotekanauki.pl/articles/307858.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
blocking and dropping of calls
call admission control
measurement based optimization
radio resource management
traffic analysis
Opis:
This paper addresses the traffic's grade of service indicators: call blocking and dropping rates as well as the optimization of their mutual relation, corresponding to the call admission control procedure configuration. In the presented results of simulations authors showed opportunities for the CAC load threshold adaptation according to the traffic volume and user mobility changes observed in the mobile radio network.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 3; 74-80
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Inteligentny system transportu dla aglomeracji trójmiejskiej
Intelligent transportation systems for tri-city agglomeration
Autorzy:
Jamroz, K.
Oskarbski, J.
Powiązania:
https://bibliotekanauki.pl/articles/317448.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
system zarządzania transportem
inteligentne systemy transportu
sterowanie ruchem
transport management system
intelligent transport systems
traffic control
Opis:
Wskazano przesłanki zastosowania inteligentnych systemów transportu. Opisano założenia, koncepcję architektury i funkcjonowania trójmiejskiego inteligentnego systemu trasportu aglomeracyjnego TRISTAR oraz poszczególnych jego podsystemów.
The reasons to introduce intelligent transportation systems are presented, together with assumptions and objectives to built the TRISTAR system in the tri-city (Gdańsk, Gdynia, Sopot) area in northern Poland, the concept of system architecture and individual subsystems.
Źródło:
Telekomunikacja i Techniki Informacyjne; 2009, 1-2; 66-76
1640-1549
1899-8933
Pojawia się w:
Telekomunikacja i Techniki Informacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
RTT+ - Time Validity Constraints in RTT Language
Autorzy:
Felkner, A.
Kozakiewicz, A.
Powiązania:
https://bibliotekanauki.pl/articles/309209.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
inference system with time constraints
logic programming semantics
role-based trust management
set-theoretic semantics
Opis:
Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and service provider or resource owner are often unknown to each other. To overcome the shortcomings of traditional access control models, trust management models have been presented. The topic of this paper is three different semantics (set-theoretic, operational, and logic- programming) of RTT , language from the family of role-based trust management languages (RT). RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The set-theoretic semantics maps roles to a set of sets of entity names. Members of such a set must cooperate in order to satisfy the role. In the case of logic-programming semantics, the credentials are translated into a logic program. In the operational semantics the credentials can be established using a simple set of inference rules. It turns out to be fundamental mainly in large- scale distributed systems, where users have only partial view of their execution context. The core part of this paper is the introduction of time validity constraints to show how that can make RTT language more realistic. The new language, named RTT+ takes time validity constraints into account. The semantics for RTT+ language will also be shown. Inference system will be introduced not just for specific moment but also for time intervals. It will evaluate maximal time validity, when it is possible to derive the credential from the set of available credentials. The soundness and completeness of the inference systems with the time validity constraints with respect to the set-theoretic semantics of RTT+ will be proven.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 2; 74-82
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies