Ryszard Antkiewicz

Ryszard Antkiewicz
Military University of Technology | WAT · Faculty of Cybernetics

About

46
Publications
8,835
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations
Introduction

Publications

Publications (46)
Article
Full-text available
Nowadays botnet-based threat, such as ransomwares, trojans and botnets per se, is still very dangerous for our privacy and data. Depending on their management architecture (centralized, decentralized, hybrid), they could be controlled from single or multi point servers called Command&Control (C2), what makes them very difficult to detect and mitiga...
Article
Full-text available
In the paper we present machine learning algorithms for the problem of optimizing the distribution of parcels in stochastic time-dependent networks, which have been built as a part of some Distribution Optimization System. The problem solved was a modified VRPTW (Vehicle Routing Problem with Time Windows) with many warehouses, a heterogeneous fleet...
Chapter
The chapter is based on our team's experience as active participants in a variety of wargames in player roles as well as from extensive support of wargaming environments with special simulation and artificial intelligence tools. It describes simulation and analytical support of wargaming. The proposed quantitative support of the team focused on sta...
Conference Paper
Full-text available
The paper deals with a modelling and simulation of complex activities. Complex interconnected activities occur e.g. in the phases of crisis management, such as prevention, response or recovery. In such cases, there is a need to plan for various complex projects, which may consist of many interlinked actions with stochastics characteristics. A net m...
Conference Paper
Full-text available
The paper presents a set of methods and tools for solving several problems related to the broadly understood optimisation of a logistics network. The described results are the outcome of a research project, the results of which are currently being implemented in logistics companies. We define three basic problems that are part of the distribution p...
Conference Paper
Full-text available
The paper presents a system (WAZkA) supporting risk analyses of CBRN threats and alarming the population, for the purpose of the National System for Detection of Contamination and Alarming in Poland. Additionally, the article presents the point of designing such a system, its concept, components, features, and functions. The selected modules includ...
Conference Paper
Full-text available
The article presents selected decision-making problems concerning the actions of the Police in search of missing persons and proposes methods of machine learning (ML) to support decisions concerning the level of service activities (so-called search level). The problem of determining the scale of operations in searching for missing persons is extrem...
Conference Paper
Full-text available
This paper presents the concept of using ML methods to infer the reason of the people missing. The issue of determining the reason of disappearing of persons is extremely important and orientates police action as well as has huge impact on the effectiveness of the search. In consideration of the amount and diversity of information collected in the...
Conference Paper
Full-text available
The paper includes a description, formulation, and method of the solution to a certain problem related to the optimization of the structure of parcel distribution system in a chosen logistics company. It was assumed that the parcels should be generated in the zip code areas (more precisely-we know the shipment volume between each pair of zip codes...
Article
The aim of this paper is to present a method of detecting botnets based on identification of their synchronous actions. There are a lot of botnets implementations and there are a lot of methods of their detection. Usually those methods are only effective against specific groups of botnets which are using for example IRC, HTTP or P2P protocols to co...
Article
Full-text available
The article presents the concept of a data-driven machine learning system increasing the efficiency of the process of supporting the distribution of goods and services, which arises as a result of the R&D project implemented within the framework of the Operational Programme Smart Development (EU) 2014-2020, financed by National Centre for Research...
Chapter
Full-text available
W artykule przedstawiono koncepcję uczącego się systemu informatycznego (System Optymalizacji Dystrybucji) zwiększającego efektywność procesu wspomagania dystrybucji towarów. Elementami prezentowanej koncepcji są algorytmy geokodowania (czyli precyzyjnego wyznaczania adresu dostawy, w oparciu o przekazane informacje), algorytmy wyznaczania tras (ro...
Chapter
Full-text available
The paper presents the set of analytical tools for CBRN risk analysis. They are modules of WAZkA system, which is IT system supporting the analysis of contamination risks and alarming in Poland. The Event Tree is a graphical representation of a chronological sequence of events, substantial from the point of view of functioning of the object, which...
Article
The article presents a description, formulation and method of solving a certain problem of optimization of the structure of the distribution system in a selected logistics company in Poland. It was assumed that shipments are generated in the areas of address codes (more precisely: we know the volume of shipments between each pair of address codes i...
Chapter
A social network is a structure whose nodes represent people or other entities embedded in a social context while its edges symbolize interaction, collaboration or exertion of influence between these fore-mentioned entities [3]. From a wide class of problems related to social networks, the ones related to link dynamics seems particularly interestin...
Chapter
The paper is devoted to a quantitative approach to support one of the most important problem solution in the area of defense planning process - armed forces (AF) structure optimization. The MUT team, taking part in Polish Strategic Defense Review has proposed a set of methods and tools to support the analyses for the evaluation of required capabili...
Conference Paper
The paper is devoted to a quantitative approach to support of strategic planning to control international conflicts. The MUT team, taking part in Polish-American “tabletop” games, has proposed a set of methods and tools to analyze possible moves to resolve a hypothetical conflict along a front line in northeastern Europe. Both the model and some ex...
Article
There are a lot of botnets implementations which are using different kind of communication protocols such as P2P, HTTP, IRC. There are also a lot of methods of their detection which are in most cases useless against botnets that are using novel communication protocols. In nowadays, one can observe increasing number of Internet threats that are usin...
Article
Full-text available
The article outlines a concept for the system supporting analyses of threats related to contamination and alarming (WAZkA), for the purpose of the National System for Detection of Contamination and Alarming (Krajowy System Wykrywania Skażeń i Alarmowania, KSWSiA) in Poland. The selected modules included in the WAZkA system: Event Tree Analyzer, vis...
Conference Paper
Full-text available
The aim of this paper is to present concept of the botnet detection method based on the network flow clustering. There are a lot of botnets implementations and there are a lot of methods of their detection. Usually those methods are only effective for specific groups of botnets for example, which are using IRC, HTML or P2P protocol for internal com...
Article
Full-text available
The article outlines a concept for the system supporting analyses of threats related to contamination and alarming (WAZkA), for the purpose of the National System for Detection of Contamination and Alarming (Krajowy System Wykrywania Skażeń i Alarmowania, KSWSiA) in Poland. Additionally, the article presents the point of designing such system, its...
Conference Paper
Full-text available
The paper introduces and presents the model and method of Capability Based Planning in the area of the Armed Forces Development. The model of development contains: the mathematical description of different capabilities’ assessment, the problem’s formulation of assessment of required, existing and lacking capabilities. The method of allocation of th...
Book
Full-text available
Assuring the security of critical infrastructure (CI) - vital from the point of view of the functioning of the state, society, business, and individual citizens – it is one of the most important challenges rising to face states at this moment. The Kosciuszko Institute's Report represents an analysis of the issues concerning the protection of critic...
Conference Paper
Full-text available
This paper presents a model, method and computer tool for military mission planning. The actions on the battlefield should be planned on the basis of reconnaissance (decision situation recognition) and the possibility of own troops action and counteractions of the enemy. A course of action (CoA) should be verified and we propose a special tool for...
Article
Full-text available
In the paper the planning process of a land battle is presented. The actions on a battlefield should be planned on the basis of a reconnaissance (decision situation recognition) and possible both own troops action and counteractions of enemy. A course of action (CoA) should be verified and we propose to use the special tool for recommendation of Co...
Conference Paper
Full-text available
Complex operation planning is a very complicated process. Computer support makes this process more effective and improves its quality. A quantitative evaluation of different variants of complex operation plan is especially important. In this paper we propose some quality measures of complex operation plan and methods of calculation of these measure...
Article
Full-text available
The paper deals with some aspects of designing and using deterministic and stochastic simulators for military trainings. These aspects are divided into three groups: (1) connected with experiences of authors concerning the usage of deterministic and stochastic models in simulators for military trainings; (2) connected with designing simulators for...
Article
Full-text available
W artykule przedstawione zostały problemy modelowania, projektowania i integracji systemów wspomagania dowodzenia. Omówione zostały w szczególności zagadnienia teleinformatycznej platformy integracji rozproszonych systemów dowodzenia oraz wymiany danych w rozproszonej symulacji działań bojowych, metody wspomagania dowodzenia w procesie planowania d...
Article
Full-text available
In this paper, which is the continuation of an MCC 2006 Conf. publication by the same group of authors, we propose a concept of early detection of terrorist action preparation activities. Our ideas rely on semantic and com-plex networks to extract useful information for terrorist threat indication. Presented methods will be used as a core frame-wor...
Article
Full-text available
The interactive simulation environment for training (and/or analysis) of military operations is presented as the Simulation Based Operational Training Support System (SBOTSS). The system was constructed in order to provide cost-effective approach of computer assisted exercises and it is an integrated, interactive, many-sided land, analysis and trai...
Conference Paper
Full-text available
The interactive simulation environment for training (and/or analysis) of military operations is presented as the Simulation Based Operational Training Support System (SBOTSS). The system was constructed in order to provide cost-effective approach of computer assisted exercises and it is an integrated, interactive, many-sided land, analysis and trai...
Article
Full-text available
The paper deals with the calibration of simulation models of selected battlefield processes. A concept of models calibration in complex battlefield simulation systems is presented. Model of targets detection process is defined and it is used as example of model for calibration process. Logical model of the calibrator as a tool for increasing adequa...
Article
Full-text available
In this paper we will describe the concept for modelling and effective development, implementation and experimentation for simulation based operational training support system. The idea and model of command and control process applied for the decision automata on the tactical level are presented. The automata execute the two main processes: decisio...
Article
Full-text available
In this paper we will describe the concept for simulation based decision support tool for predicting possible terrorist activities. Described simulator will improve NATO’s capabilities on predicting possible threats concerning terrorist activities as well as developing various campaigns for antiterrorism actions that could lead to efficient reactio...
Article
Full-text available
The idea and model of command and control process applied for the decision automata on the tactical level are presented.. The automata executes the two main processes: decision planning process and direct combat control. The decision planning process relating to the automata contains three stages: the identification of a decision situation, the gen...
Conference Paper
Full-text available
A computer simulator of a tactical communication system is presented. The simulated system is a circuit-switched digital system with nodes connected by line-of-sight (LOS) links or by wire links. The node of the system is moveable. It means, that during the simulation process, they can move according to the trajectory given by the user. It is possi...
Article
We study the ON/OFF model of telecommunication traffic source. The time duration of the state ON of this model has heavy-tailed probability distribution with infinity variance. We prove, that the index of dispersion for counts of traffic generated by such a source is unbounded for t increasing to infinity. It means, that this traffic possesses long...
Article
A multitask computer system with shared memory is described. The memory is considered to be limited. Initially it is shared among tasks in the form of separable memory areas. Each task generates random stream of data which fills memory area connected with it. When any memory area is filled with data the system must be reorganized. The problem formu...
Article
The influence of user mobility on performance of mobile wireless network is a very important problem. We present a model, which allows to evaluate new call blocking probability and probability of call handover failure, taking into account that users can change their positions. We use multidimensional Markov process as a model of cellular network wi...

Network

Cited By

Projects

Projects (3)
Archived project
Integration of military command systems.
Project
SymSG Border Tactics - Virtual decision game environment for Border Guard tactics training, utilising virtual and constructive simulators applied for supporting national and EU border protection doctrine. Project offers complex approach to training needs for Border Guard and Training Centre of Border Guard. Simulating system with developed methodology of executing simulation exercises for support of program for Border Guard's training. System includes didactic processes of advancement training course for Border Guard officers and commanders. Simulator is also designed to verify the accuracy and validity of decision made by Border Guard's supervisors. Project includes responsibility of every single supervisor, verifies validity of decisions and knowledge of Border Guard’s tactical procedures during planning and execution of operations. Simulation environment includes two simulation modules: command headquarters simulator - which is the central component of simulation environment. It focuses on BG commanders training delivering tools which support real world Decision Support Systems deployed in Border Guard. High resolution simulator (virtual simulator) is focused on supporting training of officers who execute detailed decisions during pyrotechnical check at the airports, personality check procedures on the Border Crossings, as well as road blocks and check points planning. System provides innovative, interactive tools used in training of Border Guard's officers and other Ministry of the Interior Affairs. It's functionality delivers training aimed at protecting exterior border of EU and Schengen zone. Such ICT solutions can imitate Border Guards activities, procedures and rules of cooperation with other institutions and government forces to strengthen the border protection and security. This construction provides practical use of project results in area of national defense and security. It is assumed that simulation system will be able to participate in multilevel simulation exercises of other resorts, functioning as one of the domain modules delivering various range of tasks connected with border protection and border traffic control.
Project
The main objective of WAZkA is to develop and construct a highly developed ICT tool, needed by the entities of KSWSiA, which shall support the following processes: information exchange between the system elements and coordination of the system operations, as well as to prepare assessment and expert analyses, needed by the decision-making bodies, with respect to risk emergency situations during natural disasters, technical failures or other events resulting in biological, chemical or radioactive contamination.