Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Niewiadomska-Szynkiewicz, E." wg kryterium: Wszystkie pola


Tytuł:
The IP QoS System
Autorzy:
Burakowski, W.
Śliwiński, J.
Tarasiuk, H.
Bęben, A.
Niewiadomska-Szynkiewicz, E.
Pyda, P.
Mongay Batalla, J.
Powiązania:
https://bibliotekanauki.pl/articles/307862.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
classes of service
DiffServ architecture
multi-service networks
NGN architecture
quality of service
Opis:
This paper shortly describes the IP QoS System which offers strict quality of service (QoS) guarantees in IP-based networks and supports a number of, so called, classes of services. Such solution requires to implement in the network a set of QoS mechanisms and algorithm working on packet, connection request and provisioning levels. Furthermore, we require signaling system for informing the network about new connection request and network resource allocation capabilities for providing required resources to given connection. The IP QoS System is based on the next generation networks (NGN) and differentiated services (DiffServ) architectures and, at least for now, it is designed for single domain only.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 3; 5-11
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks
Autorzy:
Daniluk, K.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309341.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
energy aware security architectures
routing protocols
security protocols
wireless sensor networks
WSN
Opis:
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) - a special type of ad hoc networks. We focus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure networks, first, the security requirements of wireless sensor networks are presented and the relationships between network security and network lifetime limited by often insufficient resources of network nodes are explained. Second, a short literature survey of energy aware security solutions for use in WSNs is presented.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 64-72
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Software Platform for Research on Auction Mechanisms
Autorzy:
Kamola, M.
Niewiadomska-Szynkiewicz, E.
Malinowski, K.
Stańczuk, W.
Pałka, P.
Powiązania:
https://bibliotekanauki.pl/articles/307872.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
auctions
multi-commodity markets
Opis:
The platform for research on auction mechanisms is a distributed simulation framework providing means to carry out research on resource allocation efficiency mechanisms and user strategies. Both kinds of algorithms examined are completely user-defined. Interaction of algorithms is recorded and pre-defined measures for the final resource allocation are calculated. Underlying database design provides for efficient results lookup and comparison across different experiments, thus enabling research groupwork. A recognised, open and flexible information model is employed for experiment descriptions.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 3; 38-46
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy-saving Algorithms for the Control of Backbone Networks: A Survey
Autorzy:
Kamola, M.
Niewiadomska-Szynkiewicz, E.
Arabas, P.
Sikora, A.
Powiązania:
https://bibliotekanauki.pl/articles/307968.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
green routing
mixed-integer programming
OSPF heuristics
power-save networks
Opis:
The rapid growth of energy demand by wired IP networks can be mitigated on hardware and software levels. While upgrading to more efficient transmission media still brings biggest savings, we take a look here at power-saving algorithms that combine the capability of setting networking equipment in arbitrary energy states which, combined with profound knowledge of the network traffic matrix, leads to considerable complex optimization problem formulations. Alternatively, lightweighted heuristic approaches are presented, built on much simpler network model but still capable to perform energy-efficient traffic engineering.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 13-20
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative Study of Supervised Learning Methods for Malware Analysis
Autorzy:
Kruczkowski, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309481.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data classification
k-Nearest Neighbors
malware analysis
Naive Bayes
support vector machine (SVM)
Opis:
Malware is a software designed to disrupt or even damage computer system or do other unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti-malware protection and intrusion detection can be significantly supported by a comprehensive and extensive analysis of data on the Web. The aim of such analysis is a classification of the collected data into two sets, i.e., normal and malicious data. In this paper the authors investigate the use of three supervised learning methods for data mining to support the malware detection. The results of applications of Support Vector Machine, Naive Bayes and k-Nearest Neighbors techniques to classification of the data taken from devices located in many units, organizations and monitoring systems serviced by CERT Poland are described. The performance of all methods is compared and discussed. The results of performed experiments show that the supervised learning algorithms method can be successfully used to computer data analysis, and can support computer emergency response teams in threats detection.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 4; 24-33
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heavy Gas Cloud Boundary Estimation and Tracking using Mobile Sensors
Autorzy:
Krzysztoń, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309177.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deployment strategies
heavy gas cloud boundary tracking
MANET
mobile ad hoc network
mobility models
sensor networks
Opis:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cloud, create temporary network topology and finally, cover the cloud boundary, and track the moving cloud. The utility and efficiency of the proposed strategies has been justified through simulation experiments.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 38-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Price Method and Network Congestion Control
Autorzy:
Malinowski, K.
Niewiadomska-Szynkiewicz, E.
Jaskóła, P.
Powiązania:
https://bibliotekanauki.pl/articles/309158.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
computer network
congestion control
coordination strategy
price
price instruments
retail pricing problem
Opis:
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems. The formulation and basic properties of the Price Method are reviewed and then the congestion control by price instruments in a computer network is described and tested.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 2; 73-77
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heterogeneous GPU&CPU cluster for High Performance Computing in cryptography
Autorzy:
Marks, M.
Jantura, J.
Niewiadomska-Szynkiewicz, E.
Strzelczyk, P.
Góźdź, K.
Powiązania:
https://bibliotekanauki.pl/articles/305288.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
parallel computing
HPC
clusters
GPU computing
OpenCL
cryptography
cryptanalysis
Opis:
This paper addresses issues associated with distributed computing systems and the application of mixed GPU&CPU technology to data encryption and decryption algorithms. We describe a heterogenous cluster HGCC formed by two types of nodes: Intel processor with NVIDIA graphics processing unit and AMD processor with AMD graphics processing unit (formerly ATI), and a novel software framework that hides the heterogeneity of our cluster and provides tools for solving complex scientific and engineering problems. Finally, we present the results of numerical experiments. The considered case study is concerned with parallel implementations of selected cryptanalysis algorithms. The main goal of the paper is to show the wide applicability of the GPU&CPU technology to large scale computation and data processing.
Źródło:
Computer Science; 2012, 13 (2); 63-79
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multiobjective Approach to Localization in Wireless Sensor Networks
Autorzy:
Marks, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309060.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
localization
simulated annealing
stochastic optimization
wireless sensor network
Opis:
Wireless sensor network localization is a complex problem that can be solved using different types of methods and algorithms. Nowadays, it is a popular research topic. What becomes obvious is that there are several criteria which are essential when we consider wireless sensor networks. Our objective is to determine accurate estimates of nodes location under the constraints for hardware cost, energy consumption and computation capabilities. In this paper the application of stochastic optimization for performing localization of nodes is discussed. We describe two phase scheme that uses a combination of the trilateration method, along with the simulated annealing optimization algorithm. We investigate two variants of our technique, i.e., centralized and distributed. The attention is paid to the convergence of our algorithm for different network topologies and trade-off between its efficiency and localization accuracy.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 59-67
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of Social Network Analysis to the Investigation of Interpersonal Connections
Autorzy:
Mincer, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309185.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
centrality measures
communities detection
social network
social network analysis
Opis:
Social network analysis (SNA) is an important and valuable tool for knowledge extraction from massive and unstructured data. Social network provides a powerful abstraction of the structure and dynamics of diverse kinds of interpersonal connection and interaction. In this paper, we address issues associated with the application of SNA to the investigation and analysis of social relationships of people. We provide a brief introduction to representation and analysis of social networks, SNA models and methods. The main objective is to investigate the application of SNA techniques to data mining in case of two social networks Facebook and Twitter. The presented simulations illustrate how social analysis can be used to determine the interpersonal connections, importance of actors in a given social network and detect communities of people. We then discuss strength and weakness of SNA techniques.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 2; 83-91
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Hybrid CPU/GPU Cluster for Encryption and Decryption of Large Amounts of Data
Autorzy:
Niewiadomska-Szynkiewicz, E.
Marks, M.
Jantura, J.
Podbielski, M.
Powiązania:
https://bibliotekanauki.pl/articles/309363.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
AES
computer clusters
cryptography
DES
GPU computing
parallel calculation
software systems
Opis:
The main advantage of a distributed computing system over standalone computer is an ability to share the workload between cores, processors and computers. In our paper we present a hybrid cluster system - a novel computing architecture with multi-core CPUs working together with many-core GPUs. It integrates two types of CPU, i.e., Intel and AMD processor with advanced graphics processing units, adequately, Nvidia Tesla and AMD FirePro (formerly ATI). Our CPU/GPU cluster is dedicated to perform massive parallel computations which is a common approach in cryptanalysis and cryptography. The efficiency of parallel implementations of selected data encryption and decryption algorithms are presented to illustrate the performance of our system.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 32-39
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Software Platform for Global Optimization
Autorzy:
Niewiadomska-Szynkiewicz, E.
Marks, M.
Powiązania:
https://bibliotekanauki.pl/articles/308471.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
global optimization
integrated software systems
nonconvex optimization
numerical libraries
price management
Opis:
This paper addresses issues associated with the global optimization algorithms, which are methods to find optimal solutions for given problems. It focuses on an integrated software environment - global optimization object-oriented library (GOOL), which provides the graphical user interface together with the library of solvers for convex and nonconvex, unconstrained and constrained problems. We describe the design, performance and possible applications of the GOOL system. The practical example - price management problem - is provided to illustrate the effectiveness and range of applications of our software tool.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 3; 49-56
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of a Java-Based Framework to Parallel Simulation of Large-Scale Systems
Autorzy:
Niewiadomska-Szynkiewicz, E.
Żmuda, M.
Malinowski, K.
Powiązania:
https://bibliotekanauki.pl/articles/908095.pdf
Data publikacji:
2003
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
informatyka
parallel computations
simulation
large-scale systems
computer systems
computer-aided system design
Opis:
Large-scale systems, such as computer and telecommunication networks, complex control systems and many others, operate in inherently parallel environments. It follows that there are many opportunities to admit parallelism into both the algorithm of control implementation and simulation of the system operation considered. The paper addresses issues associated with the application of parallel discrete event simulation (PDES). We discuss the PDES terminology and methodology. Particular attention is paid to the software environment CSA&S/PV (Complex Systems Analysis & Simulation-Parallel Version), which provides a framework for simulation experiments performed on parallel computers. CSA&S/PV was applied to investigate several real-life problems. The case studies are presented for both computer and water networks.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2003, 13, 4; 537-547
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ASimJava: a Java-based library for distributed simulation
Autorzy:
Niewiadomska-Szynkiewicz, E.
Sikora, A.
Powiązania:
https://bibliotekanauki.pl/articles/308988.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
parallel computations
parallel asynchronous simulation
computer networks simulation
Opis:
The paper describes the design, performance and applications of ASimJava, a Java-based library for distributed simulation of large networks. The important issues associated with the implementation of parallel and distributed simulation are discussed. The focus is on the effectiveness of different synchronization protocols implemented in ASimJava. The practical example -computer network simulation - is provided to illustrate the operation of the presented software tool.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 3; 12-17
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative Study of Wireless Sensor Networks Energy-Efficient Topologies and Power Save Protocols
Autorzy:
Niewiadomska-Szynkiewicz, E.
Kwaśniewski, P.
Windyga, I.
Powiązania:
https://bibliotekanauki.pl/articles/309032.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
energy conservation protocols
topology control
wireless sensor network
Opis:
Ad hoc networks are the ultimate technology in wireless communication that allow network nodes to communicate without the need for a fixed infrastructure. The paper addresses issues associated with control of data transmission in wireless sensor networks (WSN) - a popular type of ad hoc networks with stationary nodes. Since the WSN nodes are typically battery equipped, the primary design goal is to optimize the amount of energy used for transmission. The energy conservation techniques and algorithms for computing the optimal transmitting ranges in order to generate a network with desired properties while reducing sensors energy consumption are discussed and compared through simulations. We describe a new clustering based approach that utilizes the periodical coordination to reduce the overall energy usage by the network.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 68-75
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies