Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES - Bridge of Knowledge

Search

Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES

Filters

total: 25642
filtered: 3419

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES

  • Fast collaborative graph exploration

    Publication

    - INFORMATION AND COMPUTATION - Year 2015

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text available to download

  • Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements

    Publication

    - PHYSICAL REVIEW A - Year 2019

    Recently the quantum information science community devoted a lot of attention to the theoretical and practical aspects of generalized measurements, the formalism of all possible quantum operations leading to acquisition of classical information. On the other hand, due to imperfections present in quantum devices, and limited thrust to them, a trend of formulating quantum information tasks in a semi-device-independent manner emerged....

    Full text available to download

  • Communication and Load Balancing Optimization for Finite Element Electromagnetic Simulations Using Multi-GPU Workstation

    This paper considers a method for accelerating finite-element simulations of electromagnetic problems on a workstation using graphics processing units (GPUs). The focus is on finite-element formulations using higher order elements and tetrahedral meshes that lead to sparse matrices too large to be dealt with on a typical workstation using direct methods. We discuss the problem of rapid matrix generation and assembly, as well as...

    Full text to download in external service

  • Measurement of Impulse Response of Shallow Water Communication Channel by Correlation Method

    Performances of underwater acoustic communication (UAC) systems are strongly related to specific propagation conditions of the underwater channel; conditions that can additionally change in time due to the movement of the acoustic system transmitter and receiver or to reflection by underwater objects of the transmitted signal. The time-varying impulse response is a comprehensive description of dynamically changing transmission...

    Full text available to download

  • Smart Knowledge Engineering for Cognitive Systems: A Brief Overview

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2022

    Cognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia

    Publication

    - Year 2014

    Zadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....

  • Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0

    Publication

    - Procedia Computer Science - Year 2015

    This paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....

    Full text available to download

  • CROWDSOURCING A KOMUNIKACJA Z KONSUMENTAMI

    Publication

    - Year 2013

    Rozdział prezentuje wybrane modele komunikacji w Internecie oraz crowdsourcing jako nową metodę pozyskiwania pomysłów i informacji od konsumentów. W ciągu ostatnich 5 lat rozwój technologii komunikacyjnych znacząco zmienił sposób komunikowania się ludzi, a w konsekwencji również organizacji z konsumentami. Nie tylko firmy z branży IT mogą wzmocnić swoją markę, reputację oraz zwiększyć przychody dzięki opracowaniu atrakcyjnej, społecznie...

    Full text to download in external service

  • KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR

    Przedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...

    Full text to download in external service

  • Stanowisko wizualizacji zdarzeń w systemie STRADAR – realizacja i funkcje dla operatora

    It is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The system, with the use of a network of sensors located in both stationary and mobile...

    Full text available to download

  • Module of priorities for public transport vehicles in the TRISTAR system

    Publication

    One of the most important elements of the intelligent traffic control systems is the ability to control movement in such a way as to privilege the selected users movement, in particular public transport vehicles. Implemented at the Tri-City the TRISTAR system will also have a module for prioritizing public transport vehicles. The article presents a characteristics of the priority action system: the way of communication with the...

  • Influence of the internet and electronic commerce growth on polish small and medium enterprises. PODAĆ POLSKI TYTUŁ.

    Publication

    - Year 2004

    Technological development in communication creates new possibilities for commercial activity . Each new medium was changing business processes . Internet does the same - implies rapid changes in every stage of commercial activity.The aim of this paper is to show that the Internet and Electronic Commerce are influencing the Small and Medium Enterprises (SMEs) development in Poland. For achieving this another issue had to be under...

  • Standard Compliance Framework for effective requirements communication

    Standard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...

  • Architektura medialna : kierunki rozwoju w kontekście sztuki i technologii

    Publication

    - Year 2014

    W artykule zaprezentowane jest zagadnienie architektury medialnej w obrębie której następuje integracja sztuki i technologii. Jest to architektura, która staje się nośnikiem zmiennych treści wizualnych w oparciu o technologie informacyjne i oświetleniowe. Zagadnienie to rozpatrywane jest w kontekście przestrzeni komercyjnych, w których architektura medialna staję się nowym sposobem ich promocji. Zarysowany zostanie kontekst rozwoju...

  • Analytical method of modelling the geometric system of communication route

    Publication

    The paper presents a new analytical approach to modelling the curvature of a communication route by making use of differential equations. The method makes it possible to identify both linear and nonlinear curvature. It enables us to join curves of the same or opposite signs of curvature. Solutions of problems for linear change of curvature and selected variants of nonlinear curvature in polynomial and trigonometric form were analyzed....

    Full text available to download

  • Big Data Analytics for ICT Monitoring and Development

    Publication

    - Year 2017

    The expanded growth of information and communication technology has opened new era of digitization which is proving to be a great challenge for researchers and scientists around the globe. The utmost paradigm is to handle and process the explosion of data with minimal cost and discover relevant hidden information in the least amount of time. The buzz word “BIG DATA” is a widely anticipated term with the potential to handle heterogeneous,...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities

    Publication
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Year 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Full text available to download

  • Integration of heterogeneous web services in exceptional situations

    Web services are intended to enable interoperability between heterogeneous distributed systems. Although the technology has been widely adopted and accepted, there are still differences between runtime platforms in exception structure and handling. This results in difficulties in effective handling of exceptions during Web services invocation. The paper presents a solution that enables coordinated exception handling between different...

    Full text available to download

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publication
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Year 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Full text to download in external service

  • Communication Networks in the Service of the Environmental Monitoring

    In the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...

  • The role of the human factor in the companies' innovativeness

    Publication

    - Year 2015

    Innovation is one of the factors enabling the development of both individual companies and entire economies. While previously the possibilities offered by technology were focused on, including information and communication technology (ICT), recently the potential of human resources has been gaining more and more attention. This capital — often underestimated — can in the right conditions and with a conducive organizational culture...

  • A novel architecture for e-learning knowledge assessment systems

    Publication

    Abstract. In this paper we propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. Our research proved that such architecture,while well suited for didactic content distribution systems is ill-suited for knowledge assessment...

  • A novel architecture for e-learning knowledge assessment systems

    Publication

    In this paper we propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. Our research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge assessment products....

    Full text to download in external service

  • A novel architecture for e-learning knowledge assessment systems

    Publication

    In this paper we propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. Our research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge assessment products....

  • A Highly Scalable, Modular Architecture for Computer Aided Assessment e-Learning Systems

    Publication

    In this chapter, the authors propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. The authors' research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge...

  • Automatic road traffic safety management system in urban areas

    Publication

    Traffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce...

    Full text available to download

  • Infobrokerstwo w Polsce

    Publication

    W artykule przedstawiono etapy tworzenia infobrokeringu w Polsce, formy kształcenia infobrokerów,: studia podyplomowe, uczelnie, kursy i szkolenia.

    Full text to download in external service

  • Review of Recent Advancement on Nature/Bio-inspired Antenna Designs

    Publication

    - IEEE Access - Year 2024

    This article presents an extensive examination of antennas rooted in nature and biology, showcasing their remarkable performance across a wide spectrum of frequencies—from microwave to terahertz. The limitations of traditional antenna design have become increasingly evident in the face of burgeoning demands for novel communication technologies. Conventional analytical-equation-based approaches struggle to deliver the combined performance...

    Full text available to download

  • What do hashtags afford in digital fashion communication? An exploratory study on Gucci-related hashtags on Twitter and Instagram.

    Being enmeshed in a digital environment, we daily produce internet-mediated texts – encompassing several different semiotic codes – accessible on a global scale. Posts on different networks usually contain hashtags, which can be understood as affordances or behavior opportunities. These affordances allow specific actions both from the part of the writer and the reader. They can also be “behavior triggers,” which invite certain...

    Full text to download in external service

  • Is it too late now to say we’re sorry? Examining anxiety contagion and crisis communication strategies using machine learning

    Publication

    - PLOS ONE - Year 2022

    In this paper, we explore the role of perceived emotions and crisis communication strategies via organizational computer-mediated communication in predicting public anxiety, the default crisis emotion. We use a machine-learning approach to detect and predict anxiety scores in organizational crisis announcements on social media and the public’s responses to these posts. We also control for emotional and language tones in organizational...

    Full text available to download

  • Energy storage device based on flywheel, power converters and Simulink real-time

    Publication

    - Year 2017

    This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Paper presents information on Energy Storage Device based on Flywheel and bi-directional IGBT Power Converters – designed for LINTE^2 laboratory owned by Gdansk University of Technology in Poland. Paper is divided into four sections. First section of the paper provides introductory information...

    Full text to download in external service

  • The Crisis of Marketing Communication in the Era of Social Media

    The articles examines the widely discussed in literature the problem of marketing communication crisis resulting from the changes of the environment. These changes generate both new problems and also new solutions, e.g. social media. The practicioners are pursuing both effective and efficient solutions, in relation to the difficulties encountered while achieving market objectives via traditional methods and channels. In accordance...

    Full text to download in external service

  • Subjective Quality Evaluation of Underground BPL-PLC Voice Communication System

    Publication

    - Year 2020

    Designing a reliable voice transmission system is not a trivial task. Wired media, thanks to their resistance to mechanical damage, seem an ideal solution. The BPL-PLC (Broadband over Power Line – Power Line Communication) cable is resilient to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency situation, including paramedic rescue operations. These features...

    Full text to download in external service

  • Application of wireless communication to small WECS with induction generator

    Publication

    - Year 2010

    Wind energy conversion systems (WECS) seem to be self-evident elements of the future smart grids. Among many generator types the squirrel cage induction generator (SCIG) characterizes robustness and low cost. A full-scale power converter can perform smooth grid connection over wide speed range of multiple-stage geared SCIG. Increasing number of sensors can improve the WECS control and diagnostics but increasing number of thin wires...

    Full text to download in external service

  • Semantic Integration of Heterogeneous Recognition Systems

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2011

    Computer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...

  • How much is Impact Factor worth?

    Publication

    - Year 2019

    The  purpose  of  this   work  is  to  present  an aspect  of  counting citations,  which is  correlated  to  the Impact  Factor,  very  important  for journals  in  scientific communication,   and   provides   information   about   the position of a scientific journal in a particular research area. Sometimes citations don’t count in a research output, e.g. if an article is  published  in a predatory  journal.  Those journals ...

    Full text to download in external service

  • Quantum superadditivity in linear optics networks: Sending bits via multiple-access Gaussian channels

    Publication

    Superadditivity effects of communication capacities are known in the case of discrete variable quantum channels. We describe the continuous variable analog of one of these effects in the framework of Gaussian multiple access channels (MACs). Classically, superadditivity-type effects are strongly restricted: For example, adding resources to one sender is never advantageous to other senders in sending their respective information...

    Full text available to download

  • A Point Set Connection Problem for Autonomous Mobile Robots in a Grid

    Publication

    - COMPUTING AND INFORMATICS - Year 2012

    Consider an orthogonal grid of streets and avenues in a Manhattan-like city populated by stationary sensor modules at some intersections and mobile robots that can serve as relays of information that the modules exchange, where both module-module and module-robot communication is limited to a straight line of sight within the grid. The robots are oblivious and move asynchronously. We present a distributed algorithm that, given...

    Full text to download in external service

  • Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities

    Publication

    - Year 2022

    In relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...

    Full text available to download

  • Multiple-Input Multiple-Output Technique for Underwater Acoustic Communication System

    Publication

    The performance of an underwater acoustic communication (UAC) system is limited due to tough propagation conditions in the UAC channel. Multiple-Input Multiple-Output (MIMO) technique can improve the reliability of the data transmission system, increase its speed, increase its range, and reduce the energy consumption. The paper presents an implementation method of MIMO technique in the form of coding the Space-Time Block Code and...

    Full text to download in external service

  • Quantifying Contextuality

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • P. Joshi
    • W. Kłobus
    • A. Wójcik

    - PHYSICAL REVIEW LETTERS - Year 2014

    Contextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...

    Full text to download in external service

  • Multi-Beam Antenna for Ka-Band CubeSat Connectivity Using 3-D Printed Lens and Antenna Array

    In this paper, the design of a passive multi-beam lens antenna is proposed for the CubeSat space communication system as an alternative application of a 2-D microstrip antenna array that has originally been designed for a 39 GHz 5 G MU-MIMO system. The half-ellipsoid lens is 3-D printed using stereolithography (SLA) technology. The antenna prototype is capable of selecting the main beam between 16 different directions with a gain...

    Full text available to download

  • Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    In this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...

    Full text to download in external service

  • Fast Collaborative Graph Exploration

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2013

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text to download in external service

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Full text to download in external service

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Zagrożenia bezpieczeństwa protokołów komunikacji morskiej, lotniczej i lądowej

    W artykule przedstawiono przykładowe zagrożenia wykorzystujące słabości wybranych protokołów komunikacji morskiej, lotniczej i lądowej. Wskazano, jakie czynności należy podjąć, żeby się przed nimi ustrzec (przynajmniej częściowo). Opisano również kierunek, w jakim powinny być rozwijane analizowane protokoły, aby zwiększyć bezpieczeństwo osób je używających.

    Full text to download in external service