Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Blazej Adamczyk is active.

Publication


Featured researches published by Blazej Adamczyk.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2012

Virtualization Devices for Prototyping of Future Internet

Andrzej Chydzinski; Mariusz Rawski; Piotr Wisniewski; Blazej Adamczyk; Iwo Olszewski; Piotr Szotkowski; Lukasz Chrost; Paweł Tomaszewicz; Damian Parniewicz

In this paper we present three virtualization devices (Xen server, NetFPGA and EZ appliance) which have been used for implementation of data plane functionality in a Future Internet architecture, the IIP System. We give general description of these devices and present implementation of the IIP System node on each device.


Mathematical Problems in Engineering | 2012

Transient and Stationary Losses in a Finite-Buffer Queue with Batch Arrivals

Andrzej Chydzinski; Blazej Adamczyk

We present an analysis of the number of losses, caused by the buffer overflows, in a finite-buffer queue with batch arrivals and autocorrelated interarrival times. Using the batch Markovian arrival process, the formulas for the average number of losses in a finite time interval and the stationary loss ratio are shown. In addition, several numerical examples are presented, including illustrations of the dependence of the number of losses on the average batch size, buffer size, system load, autocorrelation structure, and time.


international conference on transport systems telematics | 2014

Automatic Control Systems and Control of Vibrations in Vehicles Car

R. Burdzik; Łukasz Konieczny; Blazej Adamczyk

Growing customer requirements for comfort of vehicles more often become refer to vibrations that affect the people in transport. At the same time each car put into service must has the appropriate parameters traction to the road surface responsible for the safety. Due to the nature of the vibration transmitted to the vehicle body vibration requirements are of the often contradictory. Therefore, an intense research on modern control systems, active vibration damping system parameters are require. This paper presents the advantages and disadvantages associated with the suspension systems of vehicles of conventional and active and semiactiv based on the elements of a controlled characteristics of both elastic elements and damping. It was suggested the possibilities of advanced signal processing methods application developed in vibration research.


Applied Mathematics and Computation | 2018

Burst ratio in the finite-buffer queue with batch Poisson arrivals

Andrzej Chydzinski; Dominik Samociuk; Blazej Adamczyk

We study the burst ratio in the queueing system with finite buffer and batch arrivals. The study is motivated by computer networking, in which packet losses occur due to queueing mechanisms and buffer overflows. First, we derive the formula for the burst ratio in the case of compound Poisson arrivals, general distribution of the service time and general distribution of the batch size. Then, we study its asymptotic behavior, as the buffer size grows to infinity. Using the obtained analytical solutions, we present several numerical examples with various batch size distributions, service time distributions, buffer sizes and system loads. Finally, we compare the computed burst ratios with values obtained in simulations.


Theoretical and Applied Informatics | 2017

Secure gateway for Internet of Things with internal AAA mechanism

Dominik Samociuk; Blazej Adamczyk

In this paper, we describe secure gateway for Internet of Things (IoT) devices with internal AAA mechanism, implemented to connect IoT sensors with Internet users. Secure gateway described in this paper allows to (1) authenticate each connected device, (2) authorise connection or reconfiguration performed by the device and (3) account each action. The same applies to Internet users who want to connect, download data from or upload data to an IoT device. Secure Gateway with internal AAA mechanism could be used in Smart Cities environments and in other IoT deployments where security is a critical concern. The mechanism presented in this paper is a new concept and has been practically validated in Polish national research network PL-LAB2020.


Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne | 2015

Infrastruktura PL-LAB2020

Artur Binczewski; Bartosz Belter; Łukasz Łopatowski; Michał Giertych; Wojciech Burakowski; Halina Tarasiuk; Andrzej Beben; Maciej Sosnowski; Piotr Krawiec; Janusz Granat; Piotr Wiśniewski; Wojciech Szymak; Adam Grzech; Paweł Świątek; Patryk Schauer; Radosław Adamkiewicz; Józef Woźniak; Krzysztof Gierłowski; Wojciech Gumiński; Krzysztof Nowicki; Andrzej Chydzyński; Blazej Adamczyk; Dominik Samociuk; Agnieszka Brachman

Przedstawiono infrastrukture sieci badawczej PL-LAB2020. Zaprezentowano 7 laboratoriow badawczych PL-LAB umozliwiających prowadzenie badan w glownych ich obszarach zdefiniowanych dla programu Horyzont 2020. Przedstawiono szczegoly struktury operacyjnej PL-LAB2020 lączącej zasoby poszczegolnych laboratoriow zlokalizowane w 6 ośrodkach naukowo-badawczych w jedno rozproszone środowisko badawcze. Ostatecznie pokazano, jak infrastruktura PL-LAB2020 zostala polączona z innymi sieciami badawczymi w Europie.


PLOS ONE | 2015

Achieving High Resolution Timer Events in Virtualized Environment.

Blazej Adamczyk; Andrzej Chydzinski

Virtual Machine Monitors (VMM) have become popular in different application areas. Some applications may require to generate the timer events with high resolution and precision. This however may be challenging due to the complexity of VMMs. In this paper we focus on the timer functionality provided by five different VMMs—Xen, KVM, Qemu, VirtualBox and VMWare. Firstly, we evaluate resolutions and precisions of their timer events. Apparently, provided resolutions and precisions are far too low for some applications (e.g. networking applications with the quality of service). Then, using Xen virtualization we demonstrate the improved timer design that greatly enhances both the resolution and precision of achieved timer events.


Computer Networks and Isdn Systems | 2013

Analysis and Optimization of LEACH Protocol for Wireless Sensor Networks

Blazej Adamczyk

The growing popularity of wireless sensor networks increases the need for optimal and energy efficient routing protocols. Among many hierarchical routing protocols, the one which is really worth noticing is the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. Because of its simplicity and distributed operation it has been used as a base for several further protocols such as PEGASIS, HEED, TEEN and APTEEN. This article presents an analysis of the LEACH protocol and suggests a modification to improve its effectiveness by far.


Computer Networks and Isdn Systems | 2012

Improving Packet Reception and Forwarding within Virtualized Xen Environments

Tomasz Fortuna; Blazej Adamczyk

Popularization of virtualization techniques in networking makes, among the well-known advantages, the packet manipulation process to be more complicated and CPU-intensive. In this paper we study techniques for improving the performance of the packet reception and forwarding within virtualized Xen environments. Namely, in a set of experiments we demonstrate the possibility for decreasing the number of packet losses by proper IRQ balancing and discuss the possibility to exploit the coalesce functionality built-in modern network adapters.


Computer Networks and Isdn Systems | 2018

Security Considerations of Modern Embedded Devices and Networking Equipment

Blazej Adamczyk

The aim of this paper is to present the potential impact and risks related with security breaches in modern networking equipment and embedded devices in general. Firstly, the possible attack vectors and exemplary exploitation methods are presented. The methods are based on real vulnerabilities the author has recently found in a popular wireless router software. Besides presenting the vulnerabilities themselves the papers main goal is to assess the possible impact of a successful attack. Author presents several post exploitation methods which show how easily it is to use the fully-featured embedded device operating system maliciously.

Collaboration


Dive into the Blazej Adamczyk's collaboration.

Top Co-Authors

Avatar

Andrzej Chydzinski

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Dominik Samociuk

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Hafed Zghidi

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

R. Burdzik

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Łukasz Konieczny

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Grzech

Wrocław University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Świtoński

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrzej Beben

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar

Halina Tarasiuk

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge