Search results for: MISSION-CRITICAL NETWORKS - Bridge of Knowledge

Search

Search results for: MISSION-CRITICAL NETWORKS

Filters

total: 2645
filtered: 1983

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: MISSION-CRITICAL NETWORKS

  • Wireless Networks as an Infrastructure for Mission-Critical Business Applications

    Publication

    Despite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • The Third Sector in the Universities’ Third Mission

    Publication

    - Year 2017

    The interactions between the today’s university and its environment, as part of the university’s social responsibility, have been subject to many scientific papers. Their authors typically focus on interdependencies between universities, the state and the market. What is lacking are publications related to the interactions between universities and third sector organisations, and more broadly – a civil society, that may play an...

  • Portal of Portals - MISSION (Socrates Minerva 2001-2003).

    Publication

    - Year 2004

    Przedstawiono koncepcję budowy portalu dla projektu Socrates Minerva MISSION. Z powodu dużej ilości partnerów biorących udział w projekcie, dużej ilości różnorodnych zadań do wykonania przez różne kraje, zaproponowano podział portalu na oddzielne części (baza danych, narzędzia, serwisy) i podpiąć tylko linki do menu na stronie głównej zlokalizowanej na serwerze CEN PG.

  • Dynamic GNSS Mission Planning Using DTM for Precise Navigation of Autonomous Vehicles

    Publication

    Nowadays, the most widely used method for estimating location of autonomous vehicles in real time is the use of Global Navigation Satellite Systems (GNSS). However, positioning in urban environments using GNSS is hampered by poor satellite geometry due to signal obstruction created by both man-made and natural features of the urban environment. The presence of obstacles is the reason for the decreased number of observed satellites...

    Full text to download in external service

  • Student Perspectives on the 2017 ESA Concurrent Engineering Challenge

    Publication
    • K. Doerksen
    • T. van‘t Klooster
    • W. Ferguson
    • S. Pepper
    • D. van Paridon
    • R. Amorim
    • R. Chotalal
    • K. Ciechowska
    • A. Dąbrowski
    • V. Kunbrger... and 4 others

    - Year 2018

    In September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...

    Full text available to download

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Determinants of judges’ career choices and productivity: a Polish case study

    Publication
    • P. Banasik
    • K. Metelska-Szaniawska
    • M. Godlewska
    • S. Morawska

    - European Journal of Law and Economics - Year 2022

    The goal of this paper is to identify factors which affect judges’ productivity and career choice motives with the view of increasing judicial efficiency. Specifically, the investigation focuses on such aspects as judges’ remuneration, promotion, threat of judgment revocation, service/mission, periodic assessment, the threat of a complaint about protracted proceedings or of disciplinary proceedings, the threat of destabilization...

    Full text available to download

  • Challenges associated with development of AUV - unmanned autonomous underwater vehicles to be operated using the AI-based control systems

    Publication

    The last decade has been devoted towards further development of the UUV unmanned underwater vehicles which may be of two types. There are the USV unmanned surface vehicles and UUV unmanned underwater vehicles. There is a growing interest to work out and implement the fully advanced AUV autonomous underwater vehicles. The main drivers towards development of such the vehicles are the technologies of autonomous systems, sensors and...

    Full text to download in external service

  • From the Concept to Results: A Case Study on the Collection Development for the ODC–Opening Day Collection at Qatar National Library

    Publication

    - Year 2016

    "A library collection should fit the mission for which it is created. The number of books it holds does not determine its worth." (E. J. Loveland, 2000) If so, how do we create a national library, and how do we build its collection from scratch without making many mistakes? Since 2012, when the plans for the new national library were announced, Qatar National Library (QNL) envisioned as carrying out its mission to "spread knowledge,...

    Full text available to download

  • Hydrauliczna wiarygodność wyników pomiarów terenowych stosowanych do identyfikacji oporności hydraulicznej przewymiarowanych sieci wodociągowych

    Publication

    - Instal - Year 2013

    Publikacja zawiera zalecenia metodyczne dotyczące identyfikacji oporności hydraulicznej w przewymiarowanych sieciach wodociągowych na tle spotykanych nieprawidłowości. Krytycznie oceniono wyniki pomiarów terenowych, które zastosowano do tarowania komputerowych modeli przepływów (KMP) pomimo, że nie spełniały kryterium hydraulicznej wiarygodności. Ponadto zaproponowano spadek hydrauliczny jako obiektywny wskaźnik wiarygodności pomiarów,...

    Full text to download in external service

  • Small rov to detection and identification of dangerous underwater objects

    Publication

    - Year 2011

    A small unmanned underwater vehicle (UUV) to inspection of an undersea space is presented in the paper. Its behavior is controlled by a trained pilot. Correct detection and identification of targets depends on vehicle'sprecise displacement along a predefined route. Nowadays, the UUVs are equipped with an automatic control system to execute some basic maneuvers without constant human interventions. Hence, in the paper, an autopilot...

    Full text to download in external service

  • Systemy bezprzewodowej łączności i transmisji danych dla potrzeb bezpieczeństwa publicznego (studium stanu i rozwiązań)

    W niniejszym rozdziale przedstawiono charakterystyki rozwiązań użytkowych zrealizowanych w Katedrze Systemów i Sieci Radiokomunikacyjnych Politechniki Gdańskiej. Autorzy scharakteryzowali opracowane przez zespół badawczy Katedry, systemy bezprzewodowego monitoringu zagrożeń bezpieczeństwa oraz zarządzania i sterowania infrastrukturami krytycznymi. W tym też kontekście omówiono następujące systemy i aplikacje użytkowe: − globalny...

  • Universal autonomous control and management system for multipurpose unmanned surface vessel

    The paper presents design, structure and architecture of the Universal Autonomous Control and Management System (UACAMS) for multipurpose unmanned surface vessel. The system was designed, installed and implemented on the multipurpose platform - unmanned surface vessel named HydroDron. The platform is designed to execute hydrographic survey missions with multi-variant configuration of the survey system (payload? ) including multi-beam...

    Full text available to download

  • Social Entrepreneurship through Cooperatives: Founder Insights

    Publication
    • B. Huybrechts
    • T. Nelson
    • D. Nelson
    • G. Trasiani
    • K. Harris
    • R. Pashov
    • M. Starnawska
    • G. Esposito
    • A. Carobolante
    • F. Dufays
    • N. O’Shea

    - Year 2013

    In this research we are interested in how social entrepreneurs think about their organizational creation process in the context of cooperatives, and how cooperatives conceptualize and actualize their ‘care for community’ social principles. In this interface of organizational purpose and form, we find a variety of interesting issues presented by our interview sample of founders of young, global organizations from six nations. Discussing...

  • Positive management of the university

    Publication

    - Year 2015

    Abstract: The prevailing view held at contemporary Polish universities is that their main goal is to achieve effects measured by indicators, which applies to each element of their mission: education, research and the third mission, whereas the means to accomplish this goal consists of increasing the requirements and motivating by the “carrot and stick” approach. That approach discounts the importance of building a positive relationship...

    Full text to download in external service

  • AUTOMATYCZNA KLASYFIKACJA MOWY PATOLOGICZNEJ

    Publication

    Aplikacja przedstawiona w niniejszym rozdziale służy do automatycznego wykrywania mowy patologicznej na podstawie bazy nagrań. W pierwszej kolejności przedstawiono założenia leżące u podstaw przeprowadzonych badan wraz z wyborem bazy mowy patologicznej. Zaprezentowano również zastosowane algorytmy oraz cechy sygnału mowy, które pozwalają odróżnić mowę niezaburzoną od mowy patologicznej. Wytrenowane sieci neuronowe zostały następnie...

    Full text to download in external service

  • Tracing of dynamic objects in distributed interactive simulation systems

    Publication

    - Year 2003

    Distributed interactive simulation systems require integration of several areas of computer science and applied mathematics to enable each individual simulation object to visualize effectively dynamic states of other objects. Objects are unpredictable,i.e., controlled by their local operators, and are remote, i.e., must rely on some transmission media to visualize dynamic scene from their local perspectives. The paper...

    Full text available to download

  • Multidimensional GIS for satellite imagery analysis

    Multidimensional Geographical Information System allows storing, querying and processing of multidimensional query data. It is able to process satellite imagery and provide tools for its analysis. In the article authors present the developed system that analyzes a time series of SENTINEL - 1 mission satellite imagery acquired over the coast of Poland. The algorithm used finds and detects changes in the shape...

    Full text available to download

  • A socially responsible university - an attempt to approach the system

    It is the author's thesis that social responsibility of university is an integrated system of both knowledge management (KM), quality management (QM) and organizational development (OD) processes. The author determined that the university "bond" is an institutional culture (IC). An integrated system is the way to create university an open system co-operated and co-opetited with stakeholders. The stakes are high in game - both students...

  • Use of Daylight and Aesthetic Image of Glass Facades in Contemporary Buildings

    Publication

    The paper deals with the architecture of contemporary buildings in respect to their aesthetic image created by the use of natural light. Sustainability is regarded as a principle of contemporary architecture, where daylighting is an important factor as it affects energy consumption and environmental quality of the space inside a building. Environmental awareness of architecture, however, involves a much wider and more holistic...

    Full text available to download

  • The role of low-energy electrons in the charging process of LISA test masses

    Publication
    • S. Taioli
    • M. Dapor
    • F. Dimiccoli
    • M. Fabi
    • V. Ferroni
    • C. Grimani
    • M. Villani
    • W. J. Weber

    - CLASSICAL AND QUANTUM GRAVITY - Year 2023

    The estimate of the total electron yield is fundamental for our understanding of the test-mass charging associated with cosmic rays in the Laser Interferometer Space Antenna (LISA) Pathfinder mission and in the forthcoming gravitational wave observatory LISA. To unveil the role of low energy electrons in this process owing to galactic and solar energetic particle events, in this work we study the interaction of keV and sub-keV...

    Full text available to download

  • Multi-instrument analysis of L-band amplitude scintillation observed over the Eastern Arabian Peninsula

    Publication
    • A. M. Darya
    • M. M. Shaikh
    • G. Nykiel
    • E. Ghamry
    • I. Fernini

    - ADVANCES IN SPACE RESEARCH - Year 2024

    The study of scintillation-causing ionospheric irregularities is important to mitigate their effects on satellite communications. It is also important due to the spatial and temporal variability of these irregularities, given that their characteristics differ from one region to another. This study investigates the spatial and temporal characteristics of L1 amplitude scintillation-causing ionospheric irregularities over the Eastern...

    Full text to download in external service

  • Airborne Laser Scanning Point Cloud Update by Used of the Terrestrial Laser Scanning and the Low-Level Aerial Photogrammetry

    Publication

    - Year 2017

    Laser scanning technology is a spatial information gathering technique which is commonly used all over the world. Systems where the red-light beam are used, are divided into: terrestrial, mobile and airborne scanning systems. The main differences between those are the accuracy, the data acquisition solution (f. e. in ALS and MLS besides of the laser scanner, the inertial navigation system is required) and the covered area in one...

    Full text available to download

  • Managing change through team building in the context of organizing Erasmus+ mobility projects at the Gdańsk Tech Library

    The article discusses managing change through team building in the context of organizing Erasmus+ mobility projects in the Gdańsk University of Technology Library as the main strategy which contributed to the projects’ success. The authors describe the projects realized in the years 2017-2019 within the scope of the Erasmus+ programme. The organizers decided to take a responsible and active approach towards managing change and...

    Full text available to download

  • Modelling of wastewater treatment plant for monitoring and control purposes by state - space wavelet networks

    Publication

    Most of industrial processes are nonlinear, not stationary, and dynamical with at least few different time scales in their internal dynamics and hardly measured states. A biological wastewater treatment plant falls into this category. The paper considers modelling such processes for monitorning and control purposes by using State - Space Wavelet Neural Networks (SSWN). The modelling method is illustrated based on bioreactors of...

    Full text to download in external service

  • Stardust - Investigation of Microbes in the Stratosphere

    The stratospheric microbiome has been investigated several times using the methods of classical microbiology. In this experiment, we have combined them with some novel approaches including whole- metagenome amplification, Maldi TOF mass spectrometry and Sanger DNA sequencing. The results of the experiment may provide the scientists with knowledge about the mechanisms of survivability of microorganisms in stratospheric conditions...

    Full text available to download

  • Measures of region failure survivability for wireless mesh networks

    Publication

    - WIRELESS NETWORKS - Year 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Full text available to download

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Exploiting multi-interface networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2010

    Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...

    Full text to download in external service

  • Improving Patient Compliance with Hypertension Treatment: Mission Possible?

    Publication

    - Current Vascular Pharmacology - Year 2010

    Full text to download in external service

  • Technical Limitations in Merging Secular and Sacred Functions in Monumental Churches

    Publication

    - Year 2017

    The abandonment of churches and their adaptation for secular purposes is a current subject in Europe and worldwide. Most cases involve objects that were desacralized and then rebuilt as a whole object for alternative functions. Thus far, the merging of secular and sacred functions in one monumental Catholic church has not raised any issues. The paper describes the case of St. Catherine’s Church in Gdansk, Poland, where sacred function...

    Full text available to download

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Towards Agile Development of Critical Software

    Publication

    The paper presents a case study aiming at collecting opinions of software en-gineers on the risks related to integration of agile practices to safety-critical software development projects. The study has been performed within the scope of our research targetting at providing critical software developers with a comprehensive solution allowing to incorporate agile practices into software development process while still being conformant...

    Full text to download in external service

  • Sensitivity analysis of critical loads of I-columns

    Publication

    The first order variation of critical buckling load of thin-walled columns with bisymmetric open cross-section due to some variations of the design variables such as: cross-section dimensions, or material characteristics is derived. The influence of the residual welding stresses is taken into account. In the numerical examples dealing with I-column the functions describing the effect of the variation of the dimensions of the flange...

  • Mission of International Agribusiness Insurance: Modern Challenges and Opportunities for Ukraine

    Publication
    • O. VILENCHUK
    • L. NEDILSKA
    • N. KUROVSKA
    • O. VIKARCHUK
    • Y. Klapkiv

    - Scientific Horizons - Year 2022

    Full text to download in external service

  • Motion requirements of single mission mine counter submersible craft.

    Publication

    - Year 2003

    Rozważono własności ruchowe małego obiektu poruszającego się w środowisku wodnym. Urządzenie przeznaczone jest do niszczenia min morskich co wprowadza wymagania odnośnie czasu relokacji oraz orientacji w przestrzeni narzędzia stosowanego do niszczenia min. Funkcje te muszą być realizowane w wodzie stojącej oraz w przepływie. Dla obydwu warunków konieczne jest ustalenie optymalnego układu ruchowego i niezbędnych źródeł...

  • Interdependence between Power Grids and Communication Networks: A Resilience Perspective

    Publication
    • L. Martins
    • R. Girao-Silva
    • L. Jorge
    • A. Gomes
    • F. Musumeci
    • J. Rak

    - Year 2017

    Power network resilience is increasingly dependent on communication networks. Besides traditional generation, power networks need to accommodate increasingly high penetration levels of dispersed micro generation, mostly based on renewable sources, and increasing and challenging demand, such as electric vehicles. At the same time the deployment of enabling technologies throughout the power grid makes available new demand resources...

    Full text to download in external service

  • Agile Development of Critical Software - Can It be Justified?

    Publication

    The paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering...

  • Properties of nano-Fe3O4 incorporated epoxy coatings from Cure Index perspective

    Publication
    • M. Jouyandeh
    • N. Rahmati
    • E. Movahedifar
    • B. Hadavand
    • Z. Karami
    • M. Ghaffari
    • P. Taheri
    • E. Bakhshandeh
    • H. Vahabi
    • M. Ganjali... and 2 others

    - PROGRESS IN ORGANIC COATINGS - Year 2019

    The mission of an advanced epoxy-based nanocomposite coating is to provide a given substrate with protection against an unwelcome guest; e.g. corrosive molecules/media, environmental stress, flame, thermal degradation or microorganisms. In such systems, the degree to which superior properties can be guaranteed depends on the state of network formation in the epoxy in the presence of nanoparticles. For low-filled epoxy nanocomposite coatings,...

    Full text to download in external service

  • Neural networks and deep learning

    Publication

    - Year 2022

    In this chapter we will provide the general and fundamental background related to Neural Networks and Deep Learning techniques. Specifically, we divide the fundamentals of deep learning in three parts, the first one introduces Deep Feed Forward Networks and the main training algorithms in the context of optimization. The second part covers Convolutional Neural Networks (CNN) and discusses their main advantages and shortcomings...

    Full text to download in external service

  • Resilient Routing in Communication Networks

    Publication

    - Year 2015

    This important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...

    Full text to download in external service

  • Rigorous numerics for critical orbits in the quadratic family

    Publication

    - CHAOS - Year 2020

    We develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...

    Full text available to download

  • Applying agiile practices to the development of safety-critical software

    Development of safety critical software is subjected to numerous restrictions and recommendations. To meet these requirements classical software development models (e.g. V-model) are usually applied. Agile methodologies, although rapidly increasing their popularity, were generally regarded as unsuitable for such projects. However, they offer potential benefits which provide a strong incentive to incorporate them into safety-critical...

  • Approach to evaluation of time to the critical degradation of ship pipelines

    Publication

    In the article an approach to the problem of estimating time to the critical degradation of ship pipelines is considered. Such an assessment would consist of six stages. The fundamental idea is to include to the estimation of time to failure of pipelines such elements like: materials that the pipelines are made, destructive physical phenomena taking place in them and applied means of protection. The result of that evaluation should...

    Full text available to download

  • Towards a classification of networks with asymmetric inputs

    Publication

    - NONLINEARITY - Year 2021

    Coupled cell systems associated with a coupled cell network are determined by (smooth) vector fields that are consistent with the network structure. Here, we follow the formalisms of Stewart et al (2003 SIAM J. Appl. Dyn. Syst. 2, 609–646), Golubitsky et al (2005 SIAM J. Appl. Dyn. Syst. 4, 78–100) and Field (2004 Dyn. Syst. 19, 217–243). It is known that two non-isomorphic n-cell coupled networks can determine the same sets of...

    Full text available to download

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • Communication Networks in the Service of the Environmental Monitoring

    In the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Multisensor System for the Protection of Critical Infrastructure of Seaport

    Publication
    • M. Kastek
    • R. Dulski
    • M. Życzkowski
    • M. Szustakowski
    • P. Trzaskawka
    • W. Ciurapiński
    • P. Markowski
    • M. Karol
    • G. Grelowska
    • I. Gloza... and 2 others

    - Year 2013

    There are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...