Circular Image

P. Pawelczak

47 records found

This study investigates the performance of two objective speech quality metrics, Perceptual Evaluation of Speech Quality (PESQ) and Virtual Speech Quality Objective Listener (ViSQOL), in predicting human-rated speech quality scores, which are essential for telecommunication syste ...
Clear communication in public address systems is essential, especially in environments where safety or information clarity is critical. Speech intelligibility is often assessed using objective intelligibility metrics (OIMs), which predict intelligibility through mathematical mode ...
Objective speech intelligibility metrics (OIMs) are widely used in various fields, including public ser- vice announcements. These metrics do not directly predict the intelligibility of a speech (defined as the ratio of understandable words in an audio sample), but produce values ...

System Call Sandboxing

Comparing static and dynamic analysis and filter generation

All complex programs are bound to contain software bugs, of which some could be exploited. These exploits rely on the application being able to start – or become – a process that it should not normally. To exploit these applications in this way, the attacker needs the operating s ...

System Call Sandboxing

Analysis of PWD and NGINX system call policy generation using dynamic and static techniques

System call sandboxing represents a pivotal security measure in the contemporary digital landscape, where reducing the attack surface of applications is crucial to mitigate potential cyber threats. This paper investigates the efficacy of static versus dynamic system call filterin ...

System Call Sandboxing: Enhancing Security Through Analysis

Comparing Dynamic and Static System Call Analysis for Diff and SSH

Sandboxing is a technique that restricts software applications’ access to system resources to limit unintended harmful behaviour. These measures may include limiting the number of system calls that can be used. This paper compares dynamic and static analysis methods for dete ...

An analysis of system call set extraction tools on configurable Linux binaries

Comparing the performance of various system call set extraction tools on various configurations of the busybox application

System calls are a primary way in which applications to communicate with the kernel. This is to allow them to perform sensitive tasks, however, an application will typically not require all of the system calls available to function properly. Despite this, the Linux kernel allows ...

Exploring automated system call sandbox policy generation

Investigating and comparing static and dynamic analysis approaches to generate system call policies

System call sandboxing is the idea to restrict the set of system calls an application is able to invoke.
This reduces the attack surface available to an attacker exploiting the binary, and adheres to the principle of least privilege, giving entities the minimum required permi ...
Continuous Integration (CI) is a widely used quality-assurance measure within software development. It empowers developers to spot bugs and integration issues early in the development cycle and helps to maintain a coherent codebase, both in terms of quality and styling, even in o ...
The averse reaction of lithium batteries inspired researchers to look for alternat-
ives for energy storage in electronics. Battery-free or intermittent devices intro-
duce a new paradigm with their own specific problems about power, state track-
ing, timing and commu ...
Over development of the past three decades, control systems in automobiles have undergone a significant transformation, shifting from mechanical devices to a multitude of interconnected computers that oversee sensors, drivers, and passengers. In today's modern vehicles, 50-80 ind ...
The wake effect which is turbulence behind a wind turbine created when it extracts energy negatively impacts the power output of the downstream turbines. Active Wake Control can mitigate this effect, by rotating some turbines away from the wind. Previous research applied single a ...

Sailing the Wind: Evaluating the Impact of COMA on Multi-Agent Active Wake Control in Wind Farms

What is the effect of COMA on the problem of AWC compared to single-agent RL algorithms?

The close proximity of wind turbines to one another in a wind farm can lead to inefficiency in terms of power production due to wake effects. One technique to mitigate the losses is to veer from their individual optimal direction. As such, the wakes can be steered away from downs ...

Graph convolution reinforcement learning for active wake control in windfarms

Application of a multi-agent reinforcement learning algorithm

Wind energy, generated by windfarms, is playing an increasingly critical role in meeting current and future energy demands. windfarms, however, face a challenge due to the inherent flaw of wake-induced power losses when turbines are located in close proximity. Wakes, characterize ...
In wind farms wind turbines are often placed close to each other. Each turbine generates a turbulent wake field, this field negatively affects subsequent turbines. This can cost more than 12% efficiency. To decrease this loss we can steer the turbines away from the wind direction ...
Industry 4.0 and the Industrial Internet of Things (IIoT) growth will result in an explosion of data generated by connected devices. Adapting 5G and 6G technology could be the leading enabler of the broad possibilities of connecting IIoT devices in masses. However, the edge solut ...
Artificial intelligence, machine learning, and deep learning have been the buzzwords in almost every industry (medical, automotive, defense, security, finance, etc.) for the last decade. As the market moves towards AI-based solutions, so does the computation need for these solut ...
With the increase in the number of user devices and applications, the 5G systems (5GS) user plane is bound to be burdened. More work towards independent scaling and optimisation of the 5GS user plane has to be done. The 4G base stations (eNB) are mainly deployed as monolithic uni ...
In this thesis we propose a novel memory architecture design that is robust to frequent memory failures targeting next generation low power embedded system. We explore the how the architecture works and perform detailed evaluations to show that our system achieves better performa ...
This work presents the first robust connection mode for Bluetooth Low Energy on an energy harvesting sensor.