Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 9
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper introduces the distributed framework for determining the shortest path of robots in the logistic applications, i.e. the warehouse with a swarm of robots cooperating in the Real- Time mode. The proposed solution uses the optimization routine to avoid the downtime and collisions between robots. The presented approach uses the reference model based on Dijkstra, Floyd- Warshall and Bellman-Ford algorithms, which search the path in the weighted undirected graph. Their application in the onboard robot’s computer requires the analysis of the time efficiency. Results of comparative simulations for the implemented algorithms are presented. For their evaluation the data sets reflecting actual processes were used. Outcomes of experiments have shown that the tested algorithms are applicable for the logistic purposes, however their ability to operate in the Real-Time requires the detailed analysis.
Go to article

Bibliography

[1] Mobile Robot Platforms, Shuttle Automated Storage and Retrieval Systems, Industrial Robotic Manipulators, and Gantry Robots: Global Market Analysis and Forecasts, Informa PLC, https://www.tractica.com/research/warehousing-and-logistics-robots/
[2] J. Miklinska, “Trends in the logistic market and warehouses for logistics service providers-experiences from Poland,” Economic and Social Development: Book of Proceedings, 2020, 193-202.
[3] M. Khamphroo, N. Kwankeo, K. Kaemarungsi, K. Fukawa, “MicroPython-based educational mobile robot for computer coding learning,” 2017 8th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES), Chonburi, 2017.
[4] K. Dokic, B. Radisic, M. Cobović, “MicroPython or Arduino C for ESP32 - Efficiency for Neural Network Edge Devices,” Springier, 2020, pp.33-34, https://doi.org/10.1007/978-3-030-43364-2_4.
[5] N. Deo, “Graph theory with applications to engineering and computer science,” Englewood Cliffs, NJ: Prentice-Hall, 1974.
[6] G. Laporte, ”The traveling salesman problem: An overview of exact and approximate algorithms,” EJOR, 1992, Vol.59, pp. 231-247.
[7] Lu Feng, “Shortest path algorithm: Taxonomy and Advance in Research”, Acta Geodaetica et Cartographica Sinica, vol. 30, no. 3, pp. 269-275, 2001.
[8] D. Dobrilovic, V. Jevtic, I. Beker, Z. Stojanov, “Shortest-path based Model for Warehouse Inner Transportation Optimization” in 7th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
[9] Y. Liu, T. M. Vitolo, “Graph Data Warehouse: Steps to Integrating Graph Databases Into the Traditional Conceptual Structure of a Data Warehouse,” 2013 IEEE International Congress on Big Data, 2013, pp. 433-434, https://doi.org/10.1109/BigData.Congress.2013.72
[10] H.Y. Jang, J.U. Sun, “A Graph Optimization Algorithm for Warehouses with Middle Cross Aisles,” Applied Mechanics and Materials, 2011, 145. 354-358, https://doi.org/10.4028/www.scientific.net/AMM.145.354.
[11] B.D. Acharya, M.K. Gill, “On the Index of Gracefulness of a Graph and the Gracefulness of Two-Dimensional Square Lattice Graphs, ” Indian J. Math., 1981, 23, 81-94.
[12] T.H. Cormen, C.E. Leiserson, and R.L. Rivest, “Introduction to algorithms,” MIT Press, 1994.
[13] Warehouse material flows and flow charts, https://www.mecalux.co.uk/warehouse-manual/warehouse-design/warehouse-material-flowchart
[14] A. Niemczyk et al., “Organizacja i monitorowanie procesów magazynowych,” Instytut Logistyki i Magazynowania, 2014.
[15] A. Szymonik, D. Chudzik, “Logistyka nowoczesnej gospodarki magazynowej,” Difin, 2018.
[16] B. Mbakop A. Kevine, “The Effectiveness of ABC Cross Analysis on Products Allocation in the Warehouse,” 2018, January – February, Vol. 5, Issue 1, pp: 11-30.
Go to article

Authors and Affiliations

Tomasz Markowski
1
Piotr Bilski
2
ORCID: ORCID

  1. Lukasiewicz – Institute of Logistics and Warehousing, Poland
  2. Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Go to article

Authors and Affiliations

Bartosz Kościug
1
Piotr Bilski
1
ORCID: ORCID

  1. The Faculty of Electronics and Information Technology on Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The following paper presents the players profiling methodology applied to the turn-based computer game in the audience-driven system. The general scope are mobile games where the players compete against each other and are able to tackle challenges presented by the game engine. As the aim of the game producer is to make the gameplay as attractive as possible, the players should be paired in a way that makes their duel the most exciting. This requires the proper player profiling based on their previous games. The paper presents the general structure of the system, the method for extracting information about each duel and storing them in the data vector form and the method for classifying different players through the clustering or predefined category assignment. The obtained results show the applied method is suitable for the simulated data of the gameplay model and clustering of players may be used to effectively group them and pair for the duels.
Go to article

Authors and Affiliations

Piotr Bilski
1
ORCID: ORCID
Izabella Antoniuk
2
ORCID: ORCID
Rafał Łabędzki
3

  1. Warsaw University of Technology, Poland
  2. Warsaw University of Life Sciences, Poland
  3. SGH Warsaw School of Economics, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper presents a novel heuristic procedure (further called the AH Method) to investigate function shape in the direct vicinity of the found optimum solution. The survey is conducted using only the space sampling collected during the optimization process with an evolutionary algorithm. For this purpose the finite model of point-set is considered. The statistical analysis of the sampling quality based upon the coverage of the points in question over the entire attraction region is exploited. The tolerance boundaries of the parameters are determined for the user-specified increase of the objective function value above the found minimum. The presented test-case data prove that the proposed approach is comparable to other optimum neighborhood examination algorithms. Also, the AH Method requires noticeably shorter computational time than its counterparts. This is achieved by a repeated, second use of points from optimization without additional objective function calls, as well as significant repository size reduction during preprocessing.
Go to article

Authors and Affiliations

Daniel Andrzej Piętak
1
Piotr Bilski
1
ORCID: ORCID
Paweł Jan Napiórkowski
2

  1. Institute of Radioelectronics and Multimedia Technology, Warsaw University of Technology, Poland
  2. Heavy Ion Laboratory, University of Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the magnetic sensor’s applicability to the energy harvesting operations. The general scheme and technical advancement of the energy extraction from the electric vehicle (such as a tram or a train) is presented. The proposed methodology of applying the magnetic sensor to the energy harvesting is provided. The experimental scheme for the sensor characteristics and measurement results is discussed. Conclusions and future prospects regarding the practical implementation of the energy harvesting system are provided.

Go to article

Authors and Affiliations

Karol Kuczynski
ORCID: ORCID
Adrian Bilski
ORCID: ORCID
Piotr Bilski
ORCID: ORCID
Jerzy Szymanski
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the novel concept of the magnetoelectric sensor constructed using the amorphous glass ribbon. Its output characteristics (voltage pattern), conditions of work and experimental results are presented. The novel construction allows for minimizing the demagnetizing field in the core of the sensor and linearization of the characteristics between the magnetic field and obtained voltage. Conducted experiments were aimed at determining the sensor operation in the presence of the constant magnetic field (HDC). The main concern of the tests was to verify the linear dependency between the HDC value and the amplitude of the output voltage. Next, the computer model representing the sensor behavior in the constant magnetic field is described. The model implements the parameter identification task based on the regression algorithms. The presented work shows that the proposed device can be used to measure the weak magnetic field and the dependency between the output signal amplitudes and the constant component in the measured magnetic field is approximately linear. This enables measurements of even weak fields.
Go to article

Authors and Affiliations

Karol Kuczynski
1
ORCID: ORCID
Piotr Bilski
1
ORCID: ORCID
Adrian Bilski
2
ORCID: ORCID
Jerzy Szymanski
3
ORCID: ORCID

  1. Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Radioelectronics and Multimedia Technology, Poland
  2. Warsaw University of Life Sciences, Poland
  3. Kazimierz Pulaski University of Technology and Humanities in Radom, Faculty of Transport, Electrical Engineering and Computer Science, Poland

This page uses 'cookies'. Learn more