Search results for: information-centric network - Bridge of Knowledge

Search

Search results for: information-centric network

Filters

total: 25173
filtered: 3429

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: information-centric network

  • What is information?

    Pojęcie informacji było dotąd kwantyfikowane głównie w terminach statystycznych, dając początek shannonowskiej teorii informacji i zasad cyfrowej transmisji danych. Współczesne systemy komunikacyjne łączące skomplikowane, inteligentne i autonomiczne podmioty wymagają nowego spojrzenia na miary informacji, uwzględniającego kontekst i semantykę przekazu oraz racjonalne działania podmiotów. W niniejszym eseju zaproponowano podejście...

  • What is information?

    Publication

    Przedstawiono zarys metodologii konstrukcji miar informacyjnych opartej na sterowaniu zdarzeniowym. Podejście takie umożliwia jawne uwzględnianie wpływu kontekstu, kryterium użyteczności i protokołu postępowania na ilość informacji. Podano szereg przykładów obejmujących systemy rozproszone, transmisję danych, środowiska niekooperacyjne i in. wraz z oceną wynikowej przepustowości. Wskazano dalsze kierunki badań, m. in. w kierunku...

  • Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji = TAKING ADVANTAGE OF WEB 2.0 AND THE INFORMATION ARCHITECTURE IN THE INFORMATION BROKER’S WORK

    Publication

    - Year 2011

    The development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical...

    Full text to download in external service

  • Software Modeling from the Perspective of Intuitive Information Processing

    Publication

    - Year 2014

    There is psychological evidence that humans process information not only consciously but also intuitively. Intuitive information processing is present also during the activities related to software modeling. The goal of this paper is to analyze software modeling from the perspective of theories which describe intuitive (nonconscious, implicit) information processing. The paper includes presentation of relevant psychological theories,...

    Full text to download in external service

  • Automatic evaluation of information credibility in Semantic Web and Knowledge Grid

    Publication

    - Year 2008

    This article presents a novel algorithm for automatic estimation of information credibility. It concerns information collected in Knowledge Grid and Semantic Web. Possibilities to evaluate the credibility of information in such structures are much greater than those available for WWW sites which use natural language. The rating system presented in this paper estimates credibility automatically on the basis of the following metrics:...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    Publication

    - PHYSICAL REVIEW A - Year 2010

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative...

    Full text available to download

  • Electromagnetic Modeling of Microstrip Elements Aided with Artificial Neural Network

    Publication

    - Year 2020

    The electromagnetic modeling principle aided withartificial neural network to designing the microwave widebandelements/networks prepared in microstrip technology is proposedin the paper. It is assumed that the complete information is knownfor the prototype design which is prepared on certain substratewith certain thickness and electric permittivity. The longitudinaland transversal dimensions of new design...

    Full text available to download

  • Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text available to download

  • Applications of semi-definite optimization in quantum information protocols

    Publication

    - Year 2016

    This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...

  • Gender, equality, science and information systems

    Publication

    - Year 2008

    In the entire Europe more women than men graduate from tertiary education institutes1. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors that both are related to power. A number of industry reports highlight a low number of women in IT occupations2. The EU Member States have, on political levels, committed themselves...

  • Hybrid model of the evolution of information technology support organisation

    Przedstawiono etapy budowy, weryfikacji i implementacji hybrydowego rozmytego modelu ewolucji organizacji wspomagania IT (information technology).

    Full text to download in external service

  • DAB+ Coverage Analysis: a New Look at Network Planning using GIS Tools

    Publication

    For many years, the matter of designing a transmitter network, optimized for best signal coverage, has been a subject of intense research. In the last decade, numerous researchers and institutions used GIS and spatial analysis tools for network planning, especially transmitter location. Currently, many existing systems operate in a strictly two-dimensional manner, not taking into account the three-dimensional nature of the analyzed...

  • Information Systems, Business and Law - Lessons Learnt

    Referat prezentuje badania na styku wytwarzania systemów informatycznych, procesów biznesowych i powiązanych z nimi regulacji prawnych. Zawiera on opis doświadczeń wynikających z zastosowania zintegrowanej metody analizy technicznej i prawnej podczas wytwarzania systemu ochrony własności intelektualnej. Przedstawione doświadczenia i powiązane analizy mogą być przydatne podczas tworzenia taksonomii zagadnień na styku systemów informatycznych,...

    Full text to download in external service

  • Information Retrieval in Wikipedia with Conceptual Directions

    Publication

    - Year 2015

    The paper describes our algorithm used for retrieval of textual information from Wikipedia. The experiments show that the algorithm allows to improve typical evaluation measures of retrieval quality. The improvement of the retrieval results was achieved by two phase usage approach. In first the algorithm extends the set of content that has been indexed by the specified keywords and thus increases the Recall value. Then, using the...

    Full text to download in external service

  • The Impact of Information and Communication Technology on the Rise of Urban Social Movements in Poland

    Publication

    - Year 2015

    The chapter examines the relationship between the use of Information and Communications Technology (ITC) and the emergence of social movements focused on urban agenda in Poland. The aim is to investigate how and to what extent a growing body of smaller activist groups use opportunities provided by the ITC to achieve their political objectives. The research results indicate that Web-based media have helped to raise the profile...

    Full text to download in external service

  • The Impact of Information and Communications Technology on the Rise of Urban Social Movements in Poland

    Publication

    - Year 2015

    The chapter examines the relationship between the use of Information and Communications Technology (ITC) and the emergence of social movements focused on urban agenda in Poland. The aim is to investigate how and to what extent a growing body of smaller activist groups use opportunities provided by the ITC to achieve their political objectives. The research results indicate that Web-based media have helped to raise the profile of...

    Full text to download in external service

  • Conception of interactive information and decision support system - model and evaluation

    Publication

    This article presents conception of interactive information and decision support system for urban and industrial air quality management. The emphasis of the project is on real-time analysis and multi-media information, and support of distributed and mobile clients through the Internet.

  • Follow the Light. Where to search for useful research information

    Architectural Lighting Design (ALD) has never been a standalone professional discipline. Rather, it has existed as the combination of art and the science of light. Today, third generation lighting professionals are already creatively intertwining these fields, and the acceleration in scientific, technological and societal studies has only increased the need for reliable multidisciplinary information. Therefore, a thorough re-examination...

    Full text available to download

  • Epoxy/Ionic Liquid-Modified Mica Nanocomposites: Network Formation–Network Degradation Correlation

    Publication
    • M. Jouyandeh
    • V. Akbari
    • S. M. R. Paran
    • S. Livi
    • L. Lins
    • H. Vahabi
    • M. Saeb

    - Nanomaterials - Year 2021

    We synthesized pristine mica (Mica) and N-octadecyl-N’-octadecyl imidazolium iodide (IM) modified mica (Mica-IM), characterized it, and applied it at 0.1–5.0 wt.% loading to prepare epoxy nanocomposites. Dynamic differential scanning calorimetry (DSC) was carried out for the analysis of the cure potential and kinetics of epoxy/Mica and epoxy/Mica-IM curing reaction with amine curing agents at low loading of 0.1 wt.% to avoid particle...

    Full text available to download

  • Sources of Market Information, Its Quality and New Product Financial Performance

    While we observe a growing interest in the role of market information in new product development (NPD), existing research has still largely ignored the quality of market information that is a crucial issue in the era of the information society. What does affect the quality of market information in new product development projects, and how does this quality influence the financial performance of new products? In this paper, we address...

    Full text available to download

  • Potential applicability of ontologies for the evaluation of information technology

    Publication

    In this article we present the possibilities of using ontologies as a part of a multi-agent system (MAS) designed for the evaluation of information technologies. This is a part of a broader idea devel-oped by the team of researchers at Gdańsk University of Technology. The article deals with defining ontologies, presenting main technologies for their design and implementation and proposes, initially, domains of the ontologies' interest...

  • Evolutionary Algorithms in MPLS network designing

    Publication

    - Year 2008

    MPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....

    Full text to download in external service

  • Model of management of knowledge bases in the information technology evaluation environment

    Publication

    - Year 2008

    The paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...

  • The Technological Advancement of New Products, Product Newness and Market Information

    Publication

    The purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...

    Full text available to download

  • Information Retrieval with the Use of Music Clustering by Directions Algorithm

    Publication

    - Year 2013

    This paper introduces the Music Clustering by Directions (MCBD) algorithm. The algorithm is designed to support users of query by humming systems in formulating queries. This kind of systems makes it possible to retrieve songs and tunes on the basis of a melody recorded by the user. The Music Clustering by Directions algorithm is a kind of an interactive query expansion method. On the basis of query, the algorithm provides suggestions...

    Full text to download in external service

  • Regional observatory as a part of road safety information system

    EU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service

  • Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents

    Publication
    • S. Donghui
    • L. Zhigang
    • J. Zurada
    • A. Manikas
    • J. Guan
    • P. Weichbroth

    - KNOWLEDGE AND INFORMATION SYSTEMS - Year 2024

    The construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...

    Full text to download in external service

  • Network effects—do they matter for digital technologies diffusion?

    Purpose The main research target of this paper is to capture the network effects using the case of mobile cellular telephony, identified in European telecommunication markets, and its determinants enhancing the process of digital technologies diffusion. Design/methodology/approach This research relies on panel and dynamic panel regression analysis. The empirical sample covers 30 European countries, and the period for the analysis...

    Full text to download in external service

  • DWDM Network Laboratory Solution for Telecommunication Education Engineering

    Publication

    Development of network architectures in the field of optical telecommunications technologies is an indicator of changes in telecommunication education engineering. Conducting didactic classes requires hardware infrastructure and research in terms of teaching needs. In the paper we present DWDM network laboratory solution for telecommunication education engineering on the basis of the ADVA Optical Networking equipment. We have to...

    Full text to download in external service

  • Product Graph Invariants with Applications in the Theory of Information

    Publication

    - Year 2012

    There are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...

  • Diagnosing wind turbine condition employing a neural network to the analysis of vibroacoustic signals

    It is important from the economic point of view to detect damage early in the wind turbines before failures occur. For this purpose, a monitoring device was built that analyzes both acoustic signals acquired from the built-in non-contact acoustic intensity probe, as well as from the accelerometers, mounted on the internal devices in the nacelle. The signals collected in this way are used for long-term training of the autoencoder...

    Full text available to download

  • Transmission protocol simulation framework for the resource-constrained sensor network

    Publication

    - Year 2014

    In this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...

  • Proposal of a methodology for the research of clients' demand engaging information technologies

    Publication

    - Year 2008

    Many researches on the customer's demands who engage the information technology in the business reveal significant mismatch in customer's expectations and technology vendors' offerings.

  • Methods of Network Resource Provisioning for the Future Internet IIP Initiative

    Publication
    • J. Gozdecki
    • M. Kantor
    • K. Wajda
    • J. Rak

    - TELECOMMUNICATION SYSTEMS - Year 2016

    In this paper, we present specification, design and implementation aspects of a network resource provisioning module introduced for the Polish Initiative of Future Internet called System IIP. In particular, we propose a set of novel LP optimization models of network resource provisioning designed to minimize the network resource consumption, either bandwidth or node’s computational power, as well as to maximize the residual capacity....

    Full text available to download

  • Redundant information encoding in QED during decoherence

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Broadly understood decoherence processes in quantum electrodynamics, induced by neglecting either the radiation [L. Landau, Z. Phys. 45, 430 (1927)] or the charged matter [N. Bohr and L. Rosenfeld, K. Danske Vidensk. Selsk, Math.-Fys. Medd. XII, 8 (1933)], have been studied from the dawn of the theory. However, what happens in between, when a part of the radiation may be observed, as is the case in many real-life situations, has...

    Full text available to download

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Full Network Coverage Monitoring Solutions – The netBaltic System Case

    Publication

    This paper defines the problem of monitoring a specific network, and more precisely – part of reporting process, which is responsible for the transport of data collected from network devices to station managers. The environment requires additional assumptions, as a specific network related to the netBaltic Project is to be monitored. Two new monitoring methods (EHBMPvU and EHBMPvF) are proposed, which priority is full network coverage....

    Full text to download in external service

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Security information sharing for smart grids: Developing the right data model

    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Transparency of publicly available information about fiscal and monetary policy in Poland

    Publication

    - Year 2021

    Research background: The quality of information provided by fiscal and monetary authorities are important in a democratic state. Ensuring fiscal policy transparency reduces fiscal risk and corruption and promotes public acceptance of fiscal reforms. Ensuring transparency in monetary policy allows market participants to anticipate central bank responses and take their effects into account when making investment and consumption decisions. Aim...

    Full text available to download

  • Self-Organizing Wireless Nodes Monitoring Network

    The concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.

  • Cognitive network model dedicated to transport system telematics

    The paper defines the concept of cognitive radio, in the context of transport systems, with particular emphasis on modern ecological concept of “green cognitive radio”. In addition, in the paper a modified cognitive network model dedicated to transport system telematics is proposed and presented. Algorithms to support the functioning of the cognitive radio are discussed. Sensors necessary to use the network to support cognitive...

  • Cache service for maps presentation in distributed information data exchange system

    The paper presents the proposition of caches implementation for map presentation in distributed information data exchange system. The concept of cache service is described in the context of distributed information data exchange system elements which control and present on maps positions and other identification data of vessels and other suspicious objects on the territorial sea, sea-coast and the internal sea-waters. The proposed...

    Full text to download in external service

  • Detecting coupling directions with transcript mutual information: A comparative study

    Publication

    - DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES B - Year 2019

    Causal relationships are important to understand the dynamics of coupled processes and, moreover, to influence or control the effects by acting on the causes. Among the different approaches to determine cause-effect relationships and, in particular, coupling directions in interacting random or deterministic processes, we focus in this paper on information-theoretic measures. So, we study in the theoretical part the difference between...

    Full text to download in external service

  • Global Surrogate Modeling by Neural Network-Based Model Uncertainty

    Publication

    - Year 2022

    This work proposes a novel adaptive global surrogate modeling algorithm which uses two neural networks, one for prediction and the other for the model uncertainty. Specifically, the algorithm proceeds in cycles and adaptively enhances the neural network-based surrogate model by selecting the next sampling points guided by an auxiliary neural network approximation of the spatial error. The proposed algorithm is tested numerically...

    Full text to download in external service

  • Report of the ISMIS 2011 Contest : Music Information Retrieval

    Publication

    - Year 2011

    This report presents an overview of the data mining contestorganized in conjunction with the 19th International Symposiumon Methodologies for Intelligent Systems (ISMIS 2011), in days betweenJan 10 and Mar 21, 2011, on TunedIT competition platform. The contestconsisted of two independent tasks, both related to music information retrieval:recognition of music genres and recognition of instruments, for agiven music sample represented...

  • Personal Branding—A New Competency in the Era of the Network Economy. Corporate Brand Performance Implications

    Publication

    - Year 2018

    Primary assets of the network economy are information, network, re-lationships, knowledge, and a virtual environment. The competency of personal branding exercised by knowledge workers, also thought of as knowledge producers, is becoming a natural consequence of the business environment where the significance of hierarchies is constantly decreasing. Knowledge workers are powerful as never be-fore and can exist as separate actors...

    Full text to download in external service