Wydział Fizyki Technicznej, Informatyki i Matematyki Stosowanej / Faculty of Technical Physics, Information Technology and Applied Mathematics / W7
Stały URI zbioruhttp://hdl.handle.net/11652/7
Przeglądaj
5 wyniki
Wyniki wyszukiwania
Pozycja MPTCP Congestion Control Algorithms for Streaming Applications – Performance Evaluation in Public Networks(Wydawnictwo Politechniki Łódzkiej, 2023) Łuczak, Łukasz Piotr; Ignaciuk, Przemysław; Morawski, MichałEfficient data transfer for high-quality streaming requires fast speed, low latency, and stable transmission parameters. Utilizing multiple communication paths is a promising solution for improving performance. This paper evaluates the most common MPTCP congestion control algorithms in the context of streaming applications in the open Internet. The results show that the BALIA algorithm is the most effective CC algorithm for multi-path streaming. This algorithm achieves the lowest path delay and Head-of-Line blocking degree with consistent throughput. Conversely, the MPTCP CC algorithm wVegas exhibits the weakest performance.Pozycja Integrating Anomaly Detection for Enhanced Data Protection in Cloud-Based Applications(Wydawnictwo Politechniki Łódzkiej, 2023) Czerkas, Konrad; Drozd, Michał; Duraj, Agnieszka; Lichy, Krzysztof; Lipiński, Piotr; Morawski, Michał; Napieralski, Piotr; Puchała, Dariusz; Kwapisz, Marcin; Warcholiński, Adrian; Karbowańczyk, Michał; Wosiak, PiotrIn this research, anomaly detection techniques and artificial neural networks were employed to address the issue of attacks on cluster computing systems. The study investigated the detection of Distributed Denial of Service (DDoS) and Partition attacks by monitoring metrics such as network latency, data transfer rate, and number of connections. Additionally, outlier detection algorithms, namely Local Outlier Factor (LOF) and COF, as well as ARIMA and SHESD models were tested for anomaly detection. Two types of neural network architectures, multi-layer perceptron (MLP) and recursive LSTM networks, were used to detect attacks by classifying events as “attack” or “no attack”. The study underscores the importance of implementing proactive security measures to protect cluster computing systems from cyber threats.Pozycja Energy Dissipation Anomalies in Buildings(Wydawnictwo Politechniki Łódzkiej, 2023) Morawski, Michał; Tomczyk, Arkadiusz; Idaczyk, MaciejPozycja AI-driven Ecodriving and ETA Solutions for Truck Transport(Wydawnictwo Politechniki Łódzkiej, 2023) Lipiński, Piotr; Morawski, Michał; Napieralski, Piotr; Nowok, Paweł; Zawiślak, Bartosz; Hojdys, Leszek; Lazar, Marcin; Lazarek, Przemysław; Zając, Norbert; Pizoń, Sylwester; Jakubiec, Rafał; Sienkiewicz, Jacek; Gołąbek, Sebastian; Kabocik, Mateusz; Fedrizzi, Szymon; Kuliga, Michał; Frączkiewicz, Mateusz; Malarz, Mirosław; Puchalski, Jarosław; Danysz, Ewa; Grajcarek, MaciejPozycja Game-based communication in Network Control Systems(Komisja Informatyki Polskiej Akademii Nauk, Oddział w Gdańsku, 2014) Morawski, MichałNetwork based Control Systems (NCSs) are more and more often selected in designing distributed control systems due to both economic and practical reasons. Today designs of NCSs frequently involve the non-expensive wireless communication instead of traditional wired links. Such systems are usually calledWireless Sensor Networks (WSNs) and are used for many other purposes as well. While convenient in installation and management, wireless links are susceptible to noise and not very reliable. While common approach of data delivery relies on routing (proactive or reactive), this paper presents a different approach to designing wireless NCSs. In the proposed approach every node takes an independent decision as a result of a game between the nodes. Unlike the routing solutions, the nodes never create any path, and even have no knowledge concerning network topology.