Didn't find any results in this catalog!
But we have some results in other catalogs.Filters
total: 2417
-
Catalog
- Publications 1337 available results
- Journals 283 available results
- Conferences 142 available results
- People 291 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 100 available results
- Events 5 available results
- Open Research Data 256 available results
displaying 1000 best results Help
Search results for: computer
-
LECTURE NOTES IN COMPUTER SCIENCE
Journals -
Procedia Computer Science
Journals -
THEORETICAL COMPUTER SCIENCE
Journals -
Communications in Computer and Information Science
Journals -
Computer synchronization of power generators
PublicationAktualną staje się kwestia opracowania odpowiednich algorytmów pomiarów i obliczeń, według których będzie możliwe prowadzenie procesu automatycznej synchronizacji bezpośrednio z wykorzystaniem komputera. W artykule przedstawiono komputerową metodę realizacji warunku fazowego podczas synchronizacji oraz podano wyniki jej badań symulacyjnych oraz badań na obiektach rzeczywistych.
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Gesture-based computer control system
PublicationIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Computer application for railway track realignment
PublicationThe topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...
-
Computer modeling and testing of structural metamaterials
Publication