Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT) - Bridge of Knowledge

Search

Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT)

Filters

total: 427
filtered: 315

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT)

  • Creating private and public value in data-related management projects: a cross-border case study from Switzerland and Italy

    Publication
    • E. Garbani-Nerini
    • E. Marchiori
    • N. Sabatini
    • L. Cantoni

    - Year 2024

    The literature in the field of smart cities shows a continuous emphasis and interest in the topic of big data due to the extensive use of Information and Communication Technologies by public and private institutions within each city. There is undoubtedly value in big data: in data lie insights on the city, its stakeholders, citizens, products, and services. Challenges, though, lie in data’s variety, volume, and velocity, but also...

    Full text available to download

  • A compact spline-enhanced monopole antenna for broadband/multi-band and beyond UWB applications

    In this work, a compact monopole antenna for broadband/multi-band and beyond ultra- wideband (UWB) communication has been proposed. The structure is based on a spline-enhanced radiator with a broadband feed and a modified ground plane. Rigorous design optimization of the radiator has been performed in a two-stage framework where optimization of the structure with respect to electrical performance is followed by explicit miniaturization...

    Full text available to download

  • A New Adaptive Method for the Extraction of Steel Design Structures from an Integrated Point Cloud

    Publication

    - SENSORS - Year 2021

    The continuous and intensive development of measurement technologies for reality modelling with appropriate data processing algorithms is currently being observed. The most popular methods include remote sensing techniques based on reflected-light digital cameras, and on active methods in which the device emits a beam. This research paper presents the process of data integration from terrestrial laser scanning (TLS) and image data...

    Full text available to download

  • Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks

    Publication

    - IEEE Access - Year 2022

    Object detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...

    Full text available to download

  • Opportunities and challenges for exploiting drones in agile manufacturing systems

    Publication

    - Procedia Manufacturing - Year 2020

    Drones have become an advanced supply chain implementation instrument, especially in connecting warehouses to outlet points or even individual customers. However, their potential application in an intra-logistics framework has not been studied, let alone explored so far. Modeling and simulations in virtual environments can help explore and evaluate the opportunities for practical and profitable applications of drones in manufacturing...

    Full text available to download

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Full text available to download

  • How digital technology affects working conditions in globally fragmented production chains: Evidence from Europe

    This paper uses a sample of over 9 million workers from 22 European countries to study the intertwined relationship between digital technology, cross-border production links and working conditions. We compare the social consequences of technological change exhibited by three types of innovation: computerisation (software), automation (robots) and artificial intelligence (AI). To fully quantify work-related wellbeing, we propose...

    Full text available to download

  • Automatic Emotion Recognition in Children with Autism: A Systematic Literature Review

    Publication

    - SENSORS - Year 2022

    The automatic emotion recognition domain brings new methods and technologies that might be used to enhance therapy of children with autism. The paper aims at the exploration of methods and tools used to recognize emotions in children. It presents a literature review study that was performed using a systematic approach and PRISMA methodology for reporting quantitative and qualitative results. Diverse observation channels and modalities...

    Full text available to download

  • Utilizing Genome-Wide mRNA Profiling to Identify the Cytotoxic Chemotherapeutic Mechanism of Triazoloacridone C-1305 as Direct Microtubule Stabilization

    Publication
    • J. Króliczewski,
    • S. Bartoszewska
    • M. Dudkowska
    • D. Janiszewska
    • A. Biernatowska
    • D. Crossman
    • K. Krzymiński
    • M. Wysocka
    • A. Romanowska
    • M. Bagiński... and 6 others

    - Cancers - Year 2020

    Rational drug design and in vitro pharmacology profiling constitute the gold standard in drug development pipelines. Problems arise, however, because this process is often dicult due to limited information regarding the complete identification of a molecule’s biological activities. The increasing aordability of genome-wide next-generation technologies now provides an excellent opportunity to understand a compound’s diverse eects...

    Full text available to download

  • Increasing K-Means Clustering Algorithm Effectivity for Using in Source Code Plagiarism Detection

    Publication
    • P. Hrkút
    • M. Ďuračík
    • M. Mikušová
    • M. Callejas-cuervo
    • J. Żukowska

    - Year 2019

    The problem of plagiarism is becoming increasingly more significant with the growth of Internet technologies and the availability of information resources. Many tools have been successfully developed to detect plagiarisms in textual documents, but the situation is more complicated in the field of plagiarism of source codes, where the problem is equally serious. At present, there are no complex tools available to detect plagiarism...

  • The influence of electromagnetic pollution on living organisms – historical trends and forecasting changes

    Publication

    - JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY - Year 2015

    Current technologies have become a source of omnipresent electromagnetic pollution from generated electromagnetic fields and resulting electromagnetic radiation. In many cases this pollution is much stronger than any natural sources of electromagnetic fields or radiation. Wireless and radio communication, electric power transmission or devices in daily use such as smartphones, tablets and portable computers every day expose people...

    Full text available to download

  • Progress towards a unified approach to entanglement distribution

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Entanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...

    Full text available to download

  • Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks

    Publication

    - ENTROPY - Year 2023

    The rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....

    Full text available to download

  • Social media and efficient computer infrastructure in smart city

    Publication

    - Year 2018

    Social media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...

    Full text to download in external service

  • I love to write and create. Can I earn money doing it? Entrepreneurial process of bloggers

    Publication

    - Year 2023

    New technologies and a new way of looking at the life of future generations, open up new perspectives of entrepreneurial activities. One of them is to run a blog. Although the first blogs appeared many years ago and earning money from running them is also known to bloggers, little research is devoted to this form of entrepreneurship. The analysis of this phenomenon was carried out using the netnography method, which is not common...

    Full text to download in external service

  • Biometryczna kontrola dostępu

    Opisano szczegółowo algorytm detekcji oraz identyfikacji człowieka na podstawie punktów nodalnych twarzy. Zdefiniowano pojęcia: biometria, proces pomiaru biometrycznego, metody biometrycznej identyfikacji oraz kontrola dostępu. Przedstawiono opis opracowanego systemu biometrycznej identyfikacji wykorzystującego sztuczne sieci neuronowe. Podano wyniki badań oraz przeprowadzono ich wnikliwą dyskusję.Biometrics is the study of automated...

    Full text available to download

  • Asymmetrical-Slot Antenna with Enhanced Gain for Dual-Band Applications

    Publication

    Dual-band operation is an important feature of antennas to be applied in modern communication systems. Although high gain of radiators is rarely of concern in urban areas with densely located broadcasting stations, it becomes crucial for systems operating in more remote environments. In this work, a dual-band antenna with enhanced bandwidth is proposed. The structure consists of a driven element in the form of an asymmetrical radiator/slot...

    Full text available to download

  • Adopting Collaborative Games into Agile Requirements Engineering

    Publication

    In agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....

    Full text available to download

  • Communication and Load Balancing Optimization for Finite Element Electromagnetic Simulations Using Multi-GPU Workstation

    This paper considers a method for accelerating finite-element simulations of electromagnetic problems on a workstation using graphics processing units (GPUs). The focus is on finite-element formulations using higher order elements and tetrahedral meshes that lead to sparse matrices too large to be dealt with on a typical workstation using direct methods. We discuss the problem of rapid matrix generation and assembly, as well as...

    Full text to download in external service

  • Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective

    Publication

    - SENSORS - Year 2022

    Currently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...

    Full text available to download

  • The Digital Tissue and Cell Atlas and the Virtual Microscope

    Publication
    • J. Skokowski
    • M. Bolcewicz
    • K. Jendernalik
    • T. Vanelslander
    • J. Gulczyński
    • A. Lewandowska
    • L. Kalinowski

    - Year 2022

    With the cooperation of the CI TASK (Center of lnformatics Tri-Citry Academic Supercomputer and network) and the Gdańsk University of Technology, the Medical University of Gdańsk undertook the creation of the Digital Tissue and Cell Atlas and the Virtual Microscope for the needs of the Bridge of Data project. In the beginning, an extensive collection of histological and cytological slides was carefully selected and prepared by...

    Full text available to download

  • Asking Data in a Controlled Way with Ask Data Anything NQL

    Publication
    • A. Seganti
    • P. Kapłański
    • J. Campo
    • K. Cieśliński
    • J. Koziołkiewicz
    • P. Zarzycki

    - Year 2016

    While to collect data, it is necessary to store it, to understand its structure it is necessary to do data-mining. Business Intelligence (BI) enables us to make intelligent, data-driven decisions by the mean of a set of tools that allows the creation of a potentially unlimited number of machine-generated, data-driven reports, which are calculated by a machine as a response to queries specified by humans. Natural Query Languages...

    Full text to download in external service

  • Experience-Based Cognition for Driving Behavioral Fingerprint Extraction

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2020

    ABSTRACT With the rapid progress of information technologies, cars have been made increasingly intelligent. This allows cars to act as cognitive agents, i.e., to acquire knowledge and understanding of the driving habits and behavioral characteristics of drivers (i.e., driving behavioral fingerprint) through experience. Such knowledge can be then reused to facilitate the interaction between a car and its driver, and to develop better and...

    Full text available to download

  • Symbiosis of Art and Technology – From Renaissance to Interactive Art,

    Publication

    The article presents the mutual relations between art and technology from the Renaissance to the interactive art of today. It indicates important factors influencing the possibilities of imaging and interpreting reality by artists, ranging from the development of oil painting techniques, linear perspective, the invention of printing and photography, to achievements related to the development of information technologies (computers,...

    Full text to download in external service

  • The thermal effort during marine steam turbine flooding with water

    Publication

    - AIP Conference Proceedings - Year 2019

    The work discussed an extreme case of cooling a steam turbine. The ship's steam turbine was used as an example. In marine transport units with low-speed engines dominate, however, there are also units with steam turbines. An example of analysed marine steam turbine is shown in Fig. 1. When considering the issue of cooling steam turbines, it is necessary to estimate the extreme conditions that may occur during operation of the turbine....

    Full text available to download

  • What Skills for Multi-Partner Open Innovation Projects? Open Innovation Competence Profile in a Cluster Ecosystem Context

    Publication

    Industry 4.0 and the turbulent environment have rendered increasing interest in open inno- vation that extends from the bilateral transmission of expertise to multilateral platform collaborations. Open innovation ventures are seen as intricate collaborations that require the commitment of numer- ous partners during the lifetime of the project. In order to examine the specific competence of open innovation teams, we set the research...

    Full text available to download

  • Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing

    Publication
    • P. A. Mironowicz
    • A. Tavakoli
    • A. Hameedi
    • B. Marques
    • M. Pawłowski
    • M. Bourennane

    - NEW JOURNAL OF PHYSICS - Year 2016

    Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...

    Full text available to download

  • Ongoing progress on novel nanocomposite membranes for the separation of heavy metals from contaminated water

    Publication

    - CHEMOSPHERE - Year 2021

    Membranes, as the primary separation element of membrane-based processes, have greatly attracted the attention of researchers in several water treatment applications, including wastewater treatment, water purification, water disinfection, toxic and non-toxic chemical molecules, heavy metals, among others. Today, the removal of heavy metals from water has become challenging, in which chemical engineers are approaching new materials...

    Full text available to download

  • Design and computational fluid dynamics analysis of the last stage of innovative gas-steam turbine

    Publication

    - Archives of Thermodynamics - Year 2021

    Research regarding blade design and analysis of flow has been attracting interest for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics and computational flow mechanics. Currently a combination of mentioned methods is used for the design of turbine blades. These methods enabled us to improve flow efficiency...

    Full text available to download

  • The evaluation of eGlasses eye tracking module as an extension for Scratch

    Publication

    In this paper we present the possibility of using eGlasses eye tracking module as an extension for Scratch programming tool which is a visual programming language supporting computer skills learning. The main concept behind this project is to setup the interface for rapid interaction design. Eye tracking is a powerful tool for hands free communication but for that requires a dedicated software. This software is rarely tailored...

    Full text to download in external service

  • Laboratory Load Model Based on 150 kVA Power Frequency Converter and Simulink Real-Time – Concept, mplementation, Experiments

    Publication

    - Acta Energetica - Year 2015

    First section of the paper provides technical specification of laboratory load model basing on 150 kVA power frequency converter and Simulink Real-Time platform. Assumptions, as well as control algorithm structure is presented. Theoretical considerations based on criteria which load types may be simulated using discussed laboratory setup, are described. As described model contains transformer with thyristor-controlled tap changer,...

    Full text available to download

  • Interactive Prototypes in Teaching User-Centred Design and Business Process Modelling

    Publication

    - Year 2014

    This publication describes experiences gathered during the use of interactive prototyping in two areas: design of user interfaces for a touch screen information kiosk and interactive prototyping of business processes. Prototyping is promoted here as a technique useful for both visualizing design concepts and for stimulating communication within relevant teams. Developing interactive prototypes of use interfaces is discussed here...

  • Impact of optimization of ALS point cloud on classification

    Airborne laser scanning (ALS) is one of the LIDAR technologies (Light Detection and Ranging). It provides information about the terrain in form of a point cloud. During measurement is acquired: spatial data (object’s coordinates X, Y, Z) and collateral data such as intensity of reflected signal. The obtained point cloud is typically applied for generating a digital terrain model (DTM) and a digital surface model (DSM). For DTM...

    Full text available to download

  • Phosphorus and nitrogen forms in liquid fraction of digestates from agricultural biogas plants

    The novelty of the presented research is the determination of the nitrogen and phosphorus fraction in the liquid fraction of digestate from agricultural biogas plants. This information is important because it can help in proposing possible further liquid fraction management or developing of new technologies for their purification. The research covered digestates from agricultural biogas plants, obtained from the fermentation of...

    Full text to download in external service

  • 3D Object Shape Reconstruction from Underwater Multibeam Data and Over Ground Lidar Scanning

    The technologies of sonar and laser scanning are an efficient and widely used source of spatial information with regards to underwater and over ground environment respectively. The measurement data are usually available in the form of groups of separate points located irregularly in three-dimensional space, known as point clouds. This data model has known disadvantages, therefore in many applications a different form of representation,...

    Full text available to download

  • Image Representation for Cognitive Systems Using SOEKS and DDNA: A Case Study for PPE Compliance

    Publication

    - Year 2020

    Cognitive Vision Systems have gained significant interest from academia and industry during the past few decade, and one of the main reasons behind this is the potential of such technologies to revolutionize human life as they intend to work under complex visual scenes, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior. The combination of these properties aims to mimic the human capabilities...

    Full text available to download

  • Wykorzystanie mediów społecznościowych do promocji otwartości w badaniach naukowych na przykładzie Biblioteki Politechniki Gdańskiej

    Publication

    - Year 2021

    Media społecznościowe są jednym ze sposobów na skuteczną promocję zasobów oraz usług bibliotecznych w obecnym świecie cyfrowym. Stanowią również niedocenianą możliwość komunikacji pomiędzy naukowcami, bibliotekarzami a czytelnikami. Biblioteka akademicka może aktywnie angażować się w proces upowszechniania dorobku naukowego uczelni, podejmując w tym celu różnorakie działania marketingowe, wykorzystując takie serwisy jak: Facebook,...

    Full text available to download

  • Optymalizacja zasobów chmury obliczeniowej z wykorzystaniem inteligentnych agentów w zdalnym nauczaniu

    Publication

    - Year 2023

    Rozprawa dotyczy optymalizacji zasobów chmury obliczeniowej, w której zastosowano inteligentne agenty w zdalnym nauczaniu. Zagadnienie jest istotne w edukacji, gdzie wykorzystuje się nowoczesne technologie, takie jak Internet Rzeczy, rozszerzoną i wirtualną rzeczywistość oraz deep learning w środowisku chmury obliczeniowej. Zagadnienie jest istotne również w sytuacji, gdy pandemia wymusza stosowanie zdalnego nauczania na dużą skalę...

    Full text available to download

  • Synchronous black hole search in directed graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2011

    The paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...

    Full text available to download

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT

    Publication
    • P. Jagannathan
    • S. Gurumoorthy
    • A. Stateczny
    • P. B. Divakarachar
    • J. Sengupta

    - SENSORS - Year 2021

    In recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...

    Full text available to download

  • Application of Smart IoT Technology in Project Management Scenarios

    Publication
    • K. Rasheed
    • S. Ammad
    • A. Y. Said
    • M. Balbehaith
    • V. K. Oad
    • A. Khan

    - Year 2023

    The report presents a low-cost and flexible solution to control and monitor home and industrial appliances. The popularity of automation devices has increased greatly in recent years due to higher affordability and simplicity through IoT phone and tablet connectivity. For this purpose, we have developed the IoT Outlet: a stand-alone communication unit, used to connect outlets to the internet. The IoT Plug is a power switch which...

    Full text to download in external service

  • Informal Settlements and International Migrants: The city of Rome (Italy) as Case Study

    Publication

    - Year 2021

    Today, urbanization is happening at an unprecedentedly rapid rate, owing heavily to the influx of migrants. Empirical evidence shows the development of informal settlements in cities as a result of migration, including Rome. Furthermore, information on informal settlements is either insufficient or inadequate, which makes it challenging for architects, urban planners, and policymakers to form viable solutions to deal with the situations...

    Full text available to download

  • DATABASE AND BIGDATA PROCESSING SYSTEM FOR ANALYSIS OF AIS MESSAGES IN THE NETBALTIC RESEARCH PROJECT

    Publication

    - TASK Quarterly - Year 2017

    A specialized database and a software tool for graphical and numerical presentation of maritime measurement results has been designed and implemented as part of the research conducted under the netBaltic project (Internet over the Baltic Sea – the implementation of a multi-system, self-organizing broadband communications network over the sea for enhancing navigation safety through the development of e-navigation services.) The...

    Full text available to download

  • Persulfates to degrade a mixture of dyes (rhodamine B, methylene blue) in the presence of glucose and visible light

    Publication

    A treatment process utilizing visible-light-activated (Vis) persulfates (PS) in the presence of an organic promoter (glucose) was developed for the simultaneous decolorization of a rhodamine B (RhB) and methylene blue (MB) mixture. Various doses of glucose, PS concentrations, pH values, initial dye concentrations and process time were tested to find out the most appropriate parameters for degrading the RhB/MB mixture in the...

    Full text to download in external service

  • On design and analysis of flow characteristics of the last stage of gas-steam turbine

    Publication

    - Year 2020

    Research regarding blade design and analysis of flow have been conducted for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics (CFD) and computational flow mechanics (CFM). Currently a combination of mentioned methods is used for design of turbine blades. These methods enabled us to improve flow efficiency...

    Full text available to download

  • Wykorzystanie systemu komputerowego ALEP-PL w planowaniu rozwoju lokalnych systemów energetycznych

    Zaprezentowano autorski system komputerowy ALEP-PL, który wspomaga proces planowania rozwoju lokalnych systemów energetycznych. Narzędzie zostało przygotowane z uwzględnieniem metodyki planowania zaawansowanego. System składa się z serwisu internetowego, bazy danych i modułów logiki biznesowej. Serwis internetowy został stworzony w technologii ASP.NET z użyciem środowiska Visual Studio 2010 i serwera baz danych MS SQL Server 2008...

    Full text available to download

  • Silent Signals The Covert Network Shaping the Future

    Publication

    - Year 2007

    Silent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...

    Full text available to download

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Towards an experience based collective computational intelligence for manufacturing

    Knowledge based support can play a vital role not only in the new fast emerging information and communication technology based industry, but also in traditional manufacturing. In this regard, several domain specific research endeavors have taken place in the past with limited success. Thus, there is a need to develop a flexible domain independent mechanism to capture, store, reuse, and share manufacturing knowledge. Consequently,...

    Full text available to download