Search results for: ICT, NETWORK EXTERNALITIES - Bridge of Knowledge

Search

Search results for: ICT, NETWORK EXTERNALITIES

Filters

total: 2013
filtered: 1681

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: ICT, NETWORK EXTERNALITIES

  • E-textbook technologies for academics in medical education

    Publication

    - Studies in Logic, Grammar and Rhetoric - Year 2018

    Public universities in Poland receive fairly limited financial support for creating e-textbooks and lack the appropriate ICT competences among teaching staff, especially in the case of non-technical universities. The authors propose a pedagogical and technological paradigm for e-textbooks in medical education using open source software with minimal IT skills required. Technologies used to develop e-textbooks are connected with:...

    Full text available to download

  • Europejski sektor małych i średnich przedsiębiorstw wobec wyzwań gospodarki światowej

    Publication

    W rozdziale przedstawiono sytuację europejskiego sektora MSP wobec zmian zachodzących w gospodarce światowej. Opisywane przez autorów zmiany są powodowane tak przez uniwersalne trendy jak i przez nowe, regionalne zjawiska i procesy. Najważniejsze, z punktu widzenia europejskich MSP uniwersalne trendy to przyspieszenie globalizacji, upowszechnienie technologii informacyjnych i komunikacyjnych (ICT), utworzenie JRE, wprowadzenie...

  • Hybrid DUMBRA: an efficient QoS routing algorithm for networks with DiffServ architecture

    Publication

    - Year 2011

    Dynamic routing is very important issue of current packet networks. It may support the QoS and help utilize available network resources. Unfortunately current routing mechanisms are not sufficient to fully support QoS. Although many research has been done in this area no generic QoS routing algorithm has been proposed that could be used across all network structures. Existing QoS routing algorithms are either dedicated to limited...

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • QoS Extensions for Flow-Awareness Networks

    The paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...

    Full text available to download

  • A Novel Multicast Architecture of Programmable Networks

    Publication

    - Year 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Full text to download in external service

  • Transient detection for speech coding applications

    Signal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...

    Full text to download in external service

  • Distinguishing views in symmetric networks: A tight lower bound

    Publication

    The view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.

    Full text available to download

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • Multi-agent systems registration and maintenance of address mapping without agent self-registation

    Monitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...

    Full text to download in external service

  • Towards 5G — Cloud-based Radio Access Networks

    In the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...

    Full text available to download

  • Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis

    Publication

    - Year 2018

    A realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...

    Full text available to download

  • A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios

    This article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...

    Full text to download in external service

  • INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS

    Publication

    - Year 2015

    A minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...

    Full text to download in external service

  • Active Learning Based on Crowdsourced Data

    The paper proposes a crowdsourcing-based approach for annotated data acquisition and means to support Active Learning training approach. In the proposed solution, aimed at data engineers, the knowledge of the crowd serves as an oracle that is able to judge whether the given sample is informative or not. The proposed solution reduces the amount of work needed to annotate large sets of data. Furthermore, it allows a perpetual increase...

    Full text available to download

  • Evaluation of Vehicle Routing Problem Algorithms for Transport Logistics Using Dedicated GIS System

    Publication

    - Year 2016

    The development and research related to optimization of fleet management is of high interest among many industrial and scientific entities related to logistics and transport. Optimal distribution of transportation resources leads to significant cost reduction. In this context, scientific research related to so called Vehicle Routing Problem (VRP) which relies on determining the shortest transport routes for a strictly limited number...

    Full text to download in external service

  • E-learning in tourism and hospitality: A map

    Publication

    The impact of information and communication technologies (ICT) on tourism and hospitality industries has been widely recognized and investigated as a one of the major changes within the domains in the last decade: new ways of communicating with prospective tourists and new ways of purchasing products arisen are now part of the industries’ everyday life. Poor attention has been paid so far to the role played by new media in education...

    Full text to download in external service

  • Introduction to the ONDM 2022 special issue

    Publication
    • J. Turkiewicz
    • T. Gomes
    • M. Klinkowski
    • J. Rak
    • M. Tornatore

    - Journal of Optical Communications and Networking - Year 2023

    This JOCN special issue contains extended versions of selected papers presented at the 26th International Conference on Optical Network Design and Modeling (ONDM 2022), which took place 16–19 May 2022 at Warsaw University of Technology, Warsaw, Poland. The topics covered by the papers represent trends in optical networking research: application of machine learning to network management, cross-layer network performance optimization,...

    Full text available to download

  • eNauczanie – wykorzystajmy potencjał, jaki niesie za sobą technologia

    Publication

    Popyt na zaawansowaną edukację jest ogromny – dotyczy to nie tylko młodych ludzi, ale również dorosłych szukających ścieżek dalszego kształcenia lub budowania nowych dróg swojej kariery zawodowej. Uczelnie wyższe są pod ogromną presją finansową – chcą pogodzić kształcenie egalitarne z elitarnym. Z formalnej edukacji na poziomie wyższym obecnie korzysta znaczna liczba odbiorców, o zróżnicowanych potrzebach edukacyjnych. Instytucje...

    Full text to download in external service

  • Design and implementation of GEPON architecture in laboratory testbed

    Publication

    This paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...

  • QoS Resource Reservation Mechanisms for Switched Optical Networks

    Publication

    The paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...

    Full text to download in external service

  • On the Disaster Resiliency within the Context of 5G Networks : The RECODIS Experience

    Publication
    • C. Esposito
    • A. Gouglidis
    • D. Hutchison
    • A. Gurtov
    • B. Helvik
    • P. Heegaard
    • G. Rizzo
    • J. Rak

    - Year 2018

    Network communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resiliency is hence a key issue that future network paradigms, such as 5G, need to address. This...

    Full text to download in external service

  • Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard

    With the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...

    Full text available to download

  • Konzepte zur Energieeffizienzsteigerung bei Internet-Zugangsgeräten

    Publication

    - Year 2008

    The key issue of this paper is the power management of Internet access devices. The paper commences with an outline on the energy consumption of today's IT devices. It is followed by a description of options to increase energy efficiency of computers. The paper proves that in practice network cards and other IT network components, such as modems, network access points, switches and routers have the maximum energy consumption -...

  • Ubiquity of client access in heterogeneous access environment

    With popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....

    Full text available to download

  • Performance improvement of NN based RTLS by customization of NN structure - heuristic approach

    Publication

    - Year 2015

    The purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...

    Full text to download in external service

  • Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms

    Providing a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...

    Full text available to download

  • A MODEL FOR FORECASTING PM10 LEVELS WITH THE USE OF ARTIFICIAL NEURAL NETWORKS

    Publication

    - Year 2014

    This work presents a method of forecasting the level of PM10 with the use of artificial neural networks. Current level of particulate matter and meteorological data was taken into account in the construction of the model (checked the correlation of each variable and the future level of PM10), and unidirectional networks were used to implement it due to their ease of learning. Then, the configuration of the network (built on the...

    Full text available to download

  • Estimation and Prediction of Vertical Deformations of Random Surfaces, Applying the Total Least Squares Collocation Method

    Publication

    - SENSORS - Year 2020

    This paper proposes a method for determining the vertical deformations treated as random fields. It is assumed that the monitored surfaces are subject not only to deterministic deformations, but also to random fluctuations. Furthermore, the existence of random noise coming from surface’s vibrations is also assumed. Such noise disturbs the deformation’s functional models. Surface monitoring with the use of the geodetic levelling...

    Full text available to download

  • A Novel Iterative Decoding for Iterated Codes Using Classical and Convolutional Neural Networks

    Publication

    - Year 2024

    Forward error correction is crucial for communication, enabling error rate or required SNR reduction. Longer codes improve correction ratio. Iterated codes offer a solution for constructing long codeswith a simple coder and decoder. However, a basic iterative code decoder cannot fully exploit the code’s potential, as some error patterns within its correction capacity remain uncorrected.We propose two neural network-assisted decoders:...

    Full text to download in external service

  • Selection of energy storage units by genetic algorithm for mitigating voltage deviations

    Publication

    In recent years, energy storage units have become very popular. They are applied both for economic and technical purposes. Unfortunately, the cost of such devices is still high and selecting their proper location and rated power have to be performed precisely. In this paper, a Genetic-Algorithm-based optimization method for selecting the best configuration of energy storage units in the power network is proposed. The presented...

    Full text to download in external service

  • Direct estimation of linear and nonlinear functionals of quantum state

    Publication
    • A. Ekert
    • C. M. Alves
    • D. K. Oi
    • M. Horodecki
    • P. Horodecki
    • L. C. Kwek

    - PHYSICAL REVIEW LETTERS - Year 2002

    We present a simple quantum network, based on the controlled-SWAP gate, that can extract certain properties of quantum states without recourse to quantum tomography. It can be used as a basic building block for direct quantum estimations of both linear and nonlinear functionals of any density operator. The network has many potential applications ranging from purity tests and eigenvalue estimations to direct characterization of...

  • Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management

    Publication

    - ENERGIES - Year 2022

    This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...

    Full text available to download

  • State of Development of Intelligent Transport Systems Services on National Roads in Poland

    In recent years we can see intensifying implementation of Intelligent Transport System (ITS) measures in Polish cities and on national roads. The architecture of the National Traffic Management System (KSZR) will enable the implementation of a uniform, integrated and intelligent ICT system to launch ITS systems that are the most important for drivers and the General Directorate for National Roads and Motorways (GDDKiA). This paper...

    Full text available to download

  • Side Effects of National Immunization Program: E-Governance Support Toward Elders' Digital Inclusion

    Publication

    In response to the coronavirus pandemic, the European Union (EU) governments develop policies to regulate exclusive health protection actions that consider societal needs with the emphasis on elders. Given that the EU vaccination strategy uses a centralized ICT-based approach, there is little guidance on how seniors are included in national immunization programs (NIP). In this paper, we addressed a knowledge gap of the side effects...

    Full text available to download

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publication

    - Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska - Year 2020

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Full text available to download

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model

    In this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...

    Full text to download in external service

  • Call processing performance in multidomain IMS/NGN architecture

    Publication

    The Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service

  • Position Estimation in Mixed Indoor-Outdoor Environment Using Signals of Opportunity and Deep Learning Approach

    To improve the user's localization estimation in indoor and outdoor environment a novel radiolocalization system using deep learning dedicated to work both in indoor and outdoor environment is proposed. It is based on the radio signatures using radio signals of opportunity from LTE an WiFi networks. The measurements of channel state estimators from LTE network and from WiFi network are taken by using the developed application....

    Full text available to download

  • An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks

    Publication

    Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...

    Full text available to download

  • Downlink Capacity-Coverage Trade-off Estimation Based on Measurement of WCDMA/FDD Interface Load

    The method of capacity-coverage trade-off determination by using of universal load characteristics and normalized coverage curves for the WCDMA/FDD radio interface has been presented. The practical applications of discussed method for UMTS radio network planning process and network exploitation has been mentioned.

  • Ship Resistance Prediction with Artificial Neural Networks

    Publication

    - Year 2015

    The paper is dedicated to a new method of ship’s resistance prediction using Artificial Neural Network (ANN). In the initial stage selected ships parameters are prepared to be used as a training and validation sets. Next step is to verify several network structures and to determine parameters with the highest influence on the result resistance. Finally, other parameters expected to impact the resistance are proposed. The research utilizes...

    Full text available to download

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • The realization of ASON/GMPLS control plane

    Publication

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • Exploring Neural Networks for Musical Instrument Identification in Polyphonic Audio

    Publication

    - IEEE INTELLIGENT SYSTEMS - Year 2024

    The purpose of this paper is to introduce neural network-based methods that surpass state-of-the-art (SOTA) models, either by training faster or having simpler architecture, while maintaining comparable effectiveness in musical instrument identification in polyphonic music. Several approaches are presented, including two authors’ proposals, i.e., spiking neural networks (SNN) and a modular deep learning model named FMCNN (Fully...

    Full text to download in external service

  • Management Information Base module for electrical power system configuration and use

    Publication

    - Year 2012

    Internet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.

    Full text to download in external service