Filters
total: 25246
filtered: 3478
-
Catalog
- Publications 3478 available results
- Journals 383 available results
- Conferences 217 available results
- Publishing Houses 2 available results
- People 238 available results
- Projects 16 available results
- Research Teams 1 available results
- e-Learning Courses 115 available results
- Events 5 available results
- Open Research Data 20791 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION-CENTRIC NETWORK
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Network-centric warfare: a strategy for homeland security
PublicationPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Smart Document-Centric Processing of Human Oriented Information Flows
PublicationUsually people prefer to focus on creative rather than repetitive and schematic work patterns. Still, they must spend a lot of time complying with the procedures, selecting the information they receive and repeatedly restoring the previous state of work. This paper proposes the Mobile INteractive Document architecture (MIND) - a document-centric uniform interface to provide both effective communication of content and coordination...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublicationEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Network society: a concept of smart information management
PublicationAutomatic enhancement of Internet broadcasted news has been recently gaining increasing importance and interest. Existing applications and models of textual Event Detection in online media are based on the analysis of news distributed via RSS (Rich Site Summary called also Really Simple Syndication) channels or available at news websites. It assumes that each piece of news is equally available to the reader and, therefore, describes...
-
Information-driven network resilience: Research challenges and perspectives
PublicationInternet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...
-
Taking decisions in the diagnostic intelligent systems on the basis information from an artificial neural network
Publication -
Transfer of charging information between exchanges of different network operators in multi-provider environment.
PublicationW pracy przedstawiono różne konfiguracje systemów taryfikacji i zaliczania w środowisku zdemonopolizowanym. Przeanalizowano różne opcje przepływu danych w takim środowisku i omówiono rozszerzenie sygnalizacji SS7, która jest opracowana przez ETSI i wykorzystywana dla aplikacji zaliczania.
-
Designing of an effective structure of system for the maintenance of a technical object with the using information from an artificial neural network
Publication -
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
System informacji przestrzennej dla morskich rejonów przybrzeżnych. Logistyka i obronność.
PublicationAutorzy wskazują na możliwość poprawienia jakości zarządzania decyzjami oraz dowodzeniem na wypadek działań wojennych lub wypadków morskich poprzez jednoznaczne i metodyczne połączenie cyfrowych map morskich wykonanych w standardzie ENC/S-57 i DNC/VPF oraz danych z zasobu geodezyjnego dotyczącego obszaru lądowego. Aktualnie nie funkcjonuje w Polsce system informacji przestrzennej obejmujący polskie wybrzeże, który mógłby zostać...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
New model of cooperation between logistics center and maritime container terminal
PublicationThe following article presents the innovative concept of logistics centers called “port-centric logistics”, which finds close co-operation with maritime container port. This concept can reduce the costs of logistics operations. In the first part the author focuses on describing the specifics of logistics centers. The following parts include characteristic of “port-centric logistics” concept. The last part of the paper contains...
-
Human Centric Lighting. The New X Factor?
PublicationWe live in challenging times, and one could even claim we’re experiencing a revolution in lighting with LED technology taking over the world. Part of this rapid change involves a concept called Human Centric Lighting (HCL). In Frankfurt this year, during Light+Building, it was the buzzword, with nearly every second manufacturer’s stand claiming they had figured out the special formula necessary to create perfect HCL illumination....
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Uncertainty of mass flow measurement using centric and eccentric orifice for Reynolds number in the range 10,000 ≤ Re ≤ 20,000
PublicationThe article analyses the impact of the Reynolds number on the estimated uncertainty of the mass flow rate measurement using an orifice plate. The objects of the research were two types of orifices: centric (ISA) and eccentric, with the diameter ratio β = 0.5. Studies were performed by Monte Carlo simulation and experiments for Reynolds numbers in the range 10,000 ≤ Re ≤ 20,000. The obtained results have shown that for both orifice...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Fuzzy Sets in the GIS Environment in the Location of Objects on the Surface of Water Bodies
PublicationThe issue presented here focuses on concerns about the localization of the object on water surface. The article shows how to facilitate localization process by applying mathematical solutions characterized by simplicity, rapid action and delivering credible results. The paper shows the results of background experiments, which enabled to collect technical parameters needed for conducting simulation testing. The research has been...
-
Network on Chip implementation using FPGAs resources
PublicationW artykule przedstawiono implementację sieci typu ''Network on Chip'' w układach FPGA. Sieci typu ''Network on Chip'' stały się bardzo interesującym i obiecującym rozwiązaniem dla systemów typu ''System on Chip'' które charakteryzują się intensywną komunikacją wewnętrzną. Ze względu na inne paradygmaty projektowania nie ma obecnie dostępnych efektywnych platform do budowy prototypów sieci typu ''Network on Chip'' i ich weryfikacji....
-
Ocena efektywności monitoringu obiektów inżynierskich za pomocą sieci Bayesa
PublicationW swojej pracy autorzy zaproponowali zastosowanie sieci Bayesa do projektowania monitoringu i podejmowania decyzji w działaniach eksploatacyjnych. Ponadto pokazano dwie metody oceny wartości informacji diagnostycznych. Pierwszą z nich jest wartość oczekiwana EVSI (ang. Expected Value of Sample Information), która stanowi podstawę do wyboru spośród alternatywnych obserwacji symptomów zmiennej diagnostycznej. Natomiast drugą metodą...
-
Quality 5.0: A Paradigm Shift Towards Proactive Quality Control in Industry 5.0
PublicationIndustry 5.0, the latest wave of industrial revolution, is redefining the traditional manufacturing and production landscapes by leveraging advanced technologies, promoting sustainability, and fostering a human-centric approach. An inevitable consequence of this progression is Quality 5.0, the next phase of quality control and assurance. Quality 5.0 aims to transcend the limitations of conventional quality control techniques, which...
-
In Search for Answers: Light4Health Online Course of Health Research for Interior Lighting Design
PublicationThree years ago, when I wrote an article in arc called: Human Centric Lighting. The New X Factor? (arc no. 108 Feb/Mar 2019), my intention was to raise questions in relation to the new topic and to find solid, research-based answers in the years to come. Today, I am happy to report that the lighting community, with the Light4Health Online Course of Health Research for Interior Lighting Design, has a useful tool, and consortium...
-
Algorithmic Human Resources Management
PublicationThe rapid evolution of Digital Human Resources Management has introduced a transformative era where algorithms play a pivotal role in reshaping the landscape of workforce management. This transformation is encapsulated in the concepts of algorithmic management and algorithmic Human Resource Management (HRM). The integration of advanced analytics, predictive and prescriptive analytics and the power of Artificial Intelligence (AI)...
-
A numerical and experimental analysis of multi-hole orifice in turbulent flow
PublicationIn this research study, the comprehensive metrological analysis is investigated for a 4-hole orifice with module m = 0.25 installed in the pipeline with an internal diameter of 50 mm. A detailed numerical simulation was performed for the turbulence models: k-ε-realizable and k-ω-BSL. The novelties of the research include model validation by comparing the results of numerical studies with the experiment conducted in the area of...
-
Design thinking (DT) for the design and planning education of engineer-architects
PublicationEngineers are facing new challenges connected with globalisation, digitisation and the increased complexity of the design process. This calls for new, more interdisciplinary and user-oriented approaches to problem- solving. In this article, the authors analyse design thinking (DT) as a method to support the education of engineers specialising in architecture and urban planning. Identified in this study are the opportunities this...
-
Uncertainty of the liquid mass flow measurement using the orifice plate
PublicationThe article presents an estimation of measurement uncertainty of a liquid mass flow using the orifice plate. This subject is essential because of the widespread use of this type of flow meters. Not only the quantitative estimation but also the qualitative results of those measurements are important. To achieve these results the authors of the paper propose to use the theory of uncertainty. The article shows the analysis of the...
-
Początek Gdyńskiego Systemu Wodociągowego Wodociąg wiejski w gminie Oksywie w latach 1911 – 1929. Część I.
PublicationPrzedmiotem badań był wodociąg wiejski na Oksywiu z początku XX wieku, jako najstarszy na ziemiach polskich pod zaborami. Po przeprowadzeniu żmudnej kwerendy odtworzono przebieg procesu decyzyjnego jego budowy i eksploatacji. Szczególnie ważkie informacje odkryto w protokołach z posiedzeń Rady Gminnej Oksywia napisanych w języku staroniemieckim w latach 1911 – 1920. W rezultacie ustalono parametry techniczne sieci i urządzeń wodociągowych...
-
Information Logistics as a Paradigm
PublicationThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...
-
Disciplines and measures of information resilience
PublicationCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Document centric knowledge processes
Publication.
-
How to achieve sustainability?-Employee's point of view on company's culture and CSR practice
PublicationThe people are the company. This study aims to examine the structure of relationships between company culture, performance, corporate social responsibility (CSR), and reputation, as seen from the employee's perspective, to determine which company culture factors most influence CSR practice and, as a result, sustain a company's development and improve its performance. To accomplish this goal, we conducted a survey among employees...
-
Badanie i analiza efektywności alokacji strumieni danych w heterogenicznej sieci WBAN
PublicationW niniejszej dysertacji doktorskiej poddano dyskusji efektywność alokacji strumieni danych w heterogenicznej radiowej sieci WBAN (Wireless Body Area Networks). Biorąc pod uwagę dynamiczny rozwój nowoczesnych sieci radiokomunikacyjnych piątej generacji (5G), którego część stanowią radiowe sieci działające w obrębie ciała człowieka, bardzo ważnym aspektem są metody maksymalizujące wykorzystanie dostępnych zasobów czasowo –częstotliwościowych...
-
Relating Information Culture to Information Policies and Management Strategies
PublicationBusiness and information managers have struggled to meet several challenges in aligning information strategies and business cultures. The consequences of a misalignment or misfit of strategy and culture are well known in business literature, and better guidance on how to better align strategy and culture is needed. This means expanding the puzzle to align business and information cultures, align business and information strategies,...
-
Damage of a post-tensioned concrete bridge – Unwanted cracks of the girders
PublicationThe cracking of a post-tensioned T-beam superstructure, which was built using the incremental launching method, is analyzed in the paper. The problem is studied in detail, as specific damage was observed in the form of longitudinal cracks, especially in the mid-height zone of the girder at the interface of two assembly sections. The paper is a case study. A detailed inspection is done and non-destructive testing results of the...
-
Using Isolation Forest and Alternative Data Products to Overcome Ground Truth Data Scarcity for Improved Deep Learning-based Agricultural Land Use Classification Models
PublicationHigh-quality labelled datasets represent a cornerstone in the development of deep learning models for land use classification. The high cost of data collection, the inherent errors introduced during data mapping efforts, the lack of local knowledge, and the spatial variability of the data hinder the development of accurate and spatially-transferable deep learning models in the context of agriculture. In this paper, we investigate...
-
Digital Transformation and Its Influence on Sustainable Manufacturing and Business Practices
PublicationThe paper focuses on the relationship between businesses and digital transformation, and how digital transformation has changed manufacturing in several ways. Aspects like Cloud Computing, vertical and horizontal integration, data communication, and the internet have contributed to sustainable manufacturing by decentralizing supply chains. In addition, digital transformation inventions such as predictive analysis and big data analytics...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
A document-centric processing paradigm for collaborative computing
PublicationKlasyczne modele przetwarzania rozproszonego zakładają, że dokumenty są biernymi obiektami, które rozsyła się w formie komunikatów lub pobiera z serwerów do przetwarzania jako pliki.W artykule przedstawiono koncepcję dokumentu jako aktywnego obiektu, zdolnego do samodzielnej migracji miedzy węzłami sieci i interakcji z użytkownikami w ich lokalnym środowisku. Takie podejście jest szczególnie przydatne do realizacji procesów biznesowych...
-
Human Centric Lighting w miejscach pracy
PublicationWyniki badań wskazują na poszerzenie zakresu efektów odziaływania światła dziennego na człowieka od komfortu pracy wzrokowej po jakość snu, czujność, nastrój, wydajność i stan zdrowia [1]. Ta złożoność wiąże się z nakładami finansowymi ponoszonymi przez społeczeństwo na badania, ale również na tworzenie optymalnego środowiska oświetleniowego w miejscach pracy. HCL to termin, który wywołuje wiele dyskusji w branży oświetleniowej....
-
Maritime Communications Network Development Using Virtualised Network Slicing of 5G Network
PublicationThe paper presents the review on perspectives of maritime systems development at the context of 5G systems implementation and their main properties. Firstly, 5G systems requirements and principles are discussed, which can be important for maritime applications. Secondly, the problems of network softwarisation, virtualisation and slicing, and possible types of services for potential implementation in 5G marine applications are described....
-
Distributed representation of information on cyclic events
PublicationA representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...
-
Management Information Base module for electrical power system configuration and use
PublicationInternet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.
-
Model of control plane of ASON/GMPLS network
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Uczenie maszynowe do samoorganizacji systemów rozproszonych w zastosowaniach gospodarczych
PublicationW pracy omówiono uczenie maszynowe do samoorganizacji systemów rozproszonych w zastosowaniach gospodarczych ze szczególnym uwzględnieniem sieci neuronowych do predykcji finansowych oraz szacowania ratingu przedsiębiorstw. Oprócz sieci neuronowych, istotną rolę w przygotowaniu i testowaniu informatycznych systemów finansowych może pełnić programowanie genetyczne. Z tego powodu omówiono uczenie maszynowe w aplikacjach konstruowanych...
-
Data Model Development for Security Information Sharing in Smart Grids
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Information retrieval with semantic memory model
PublicationPsycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Elastic scattering of electrons by water: An ab initio study
PublicationIn this work we devise a theoretical and computational method to compute the elastic scattering of electrons from a non-spherical potential, such as in the case of molecules and molecular aggregates. Its main feature is represented by the ability of calculating accurate wave functions for continuum states of polycentric systems via the solution of the Lippmann-Schwinger equation, including both the correlation effects and multi-scattering...