Search results for: DISTRIBUTED COMMUNICATION FRAMEWORK - Bridge of Knowledge

Search

Search results for: DISTRIBUTED COMMUNICATION FRAMEWORK

Search results for: DISTRIBUTED COMMUNICATION FRAMEWORK

  • Big Data and the Internet of Things in Edge Computing for Smart City

    Publication

    - Year 2019

    Requests expressing collective human expectations and outcomes from city service tasks can be partially satisfied by processing Big Data provided to a city cloud via the Internet of Things. To improve the efficiency of the city clouds an edge computing has been introduced regarding Big Data mining. This intelligent and efficient distributed system can be developed for citizens that are supposed to be informed and educated by the...

    Full text to download in external service

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Full text to download in external service

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Evaluation of multimedia applications in a cluster oriented environment

    In the age of Information and Communication Technology (ICT), Web and the Internet have changed significantly the way applications are developed, deployed and used. One of recent trends is modern design of web-applications based on SOA. This process is based on the composition of existing web services into a single scenario from the point of view of a particular user or client. This allows IT companies to shorten product time-to-market....

    Full text available to download

  • Process arrival pattern aware algorithms for acceleration of scatter and gather operations

    Imbalanced process arrival patterns (PAPs) are ubiquitous in many parallel and distributed systems, especially in HPC ones. The collective operations, e.g. in MPI, are designed for equal process arrival times (PATs), and are not optimized for deviations in their appearance. We propose eight new PAP-aware algorithms for the scatter and gather operations. They are binomial or linear tree adaptations introducing additional process...

    Full text available to download

  • Survey of Methodologies, Approaches, and Challenges in Parallel Programming Using High-Performance Computing Systems

    This paper provides a review of contemporary methodologies and APIs for parallel programming, with representative technologies selected in terms of target system type (shared memory, distributed, and hybrid), communication patterns (one-sided and two-sided), and programming abstraction level. We analyze representatives in terms of many aspects including programming model, languages, supported platforms, license, optimization goals,...

    Full text available to download

  • JUST CULTURE MATURITY QUESTIONNAIRE VALIDATION IN A POLISH HOSPITAL

    Purpose: (To present the results of the statistical validation of just culture maturity questionnaire (JCMQ), used to recognize the maturity level of JC among nurses in the hospital in Poland. Methodology: (The case study and 5-stage research with the use of a 5-point Likert scale questionnaire with 28 statements, distributed among nurses. The results were statistically processed with Statistica 13.1 software. Findings: We confirmed...

    Full text available to download

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • Design and Evaluation of the Compact and Autonomous Energy Subsystem of a Wave Energy Converter

    Publication

    This paper presents the results of the design process focused on the development of the energy subsystem (ES) of a wave energy converter (WEC). The ES is an important electrical part that significantly affects the energy reliability and energy efficiency of the entire WEC device. The designed ES was intended for compact WECs powering IoT network devices working in the distributed grid. The developed ES is an electronic circuit...

    Full text available to download

  • Scanning networks with cactus topology

    Publication
    • Ł. Wrona

    - Year 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • A family of new generation miniaturized impedance analyzers for technical object diagnostics

    The paper presents the family of three analyzers allowing to measure impedance in range of 10 ohm<|Zx|<10 Gohm in a wide frequency range from 10 mHz up to 100 kHz. The most important features of the analyzers family are: miniaturization, low power consumption, low production cost, telemetric controlling and the use of impedance measurement method based on digital signal processing DSP. The miniaturization and other above mentioned...

    Full text available to download

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Microgrid Energy Management System

    Publication

    In the era of rapid development of "green energy” and storage devices, microgrids implemented in line with the concept of distributed generation can be an effective form of power management. There is a need for an efficient, optimal and reliable control of the combined infrastructure. The article presents a flexible, configurable microgrid's resources control system, which executes the task of meeting the electricity demand of...

    Full text to download in external service

  • E-Learning Service Management System For Migration Towards Future Internet Architectures

    As access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...

  • The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego

    It can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...

    Full text available to download

  • Optimization of parallel implementation of UNRES package for coarse‐grained simulations to treat large proteins

    Publication

    - JOURNAL OF COMPUTATIONAL CHEMISTRY - Year 2023

    We report major algorithmic improvements of the UNRES package for physics-based coarse-grained simulations of proteins. These include (i) introduction of interaction lists to optimize computations, (ii) transforming the inertia matrix to a pentadiagonal form to reduce computing and memory requirements, (iii) removing explicit angles and dihedral angles from energy expressions and recoding the most time-consuming energy/force terms...

    Full text available to download

  • Oprogramowanie Systemów Elektronicznych 2023/2024

    e-Learning Courses
    • M. Kowalewski

    {mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...

  • Oprogramowanie Systemów Elektronicznych 2021/2022

    e-Learning Courses
    • M. Kowalewski

    {mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...

  • Infosystemy Elektroniczne 2023/2024

    e-Learning Courses
    • M. Kowalewski

    {mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...

  • Infosystemy Elektroniczne 2021/2022

    e-Learning Courses
    • M. Kowalewski

    {mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...

  • Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks

    Publication

    - ENTROPY - Year 2023

    The rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....

    Full text available to download

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • An integrated e-learning services management system providing HD videoconferencing and CAA services

    Publication

    - Year 2012

    In this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...

    Full text to download in external service

  • Distributed graph searching with a sense of direction

    In this work we consider the edge searching problem for vertex-weighted graphs with arbitrarily fast and invisible fugitive. The weight function w provides for each vertex v the minimum number of searchers required to guard v, i.e., the fugitive may not pass through v without being detected only if at least w(v) searchers are present at v. This problem is a generalization of the classical edge searching problem, in which one has...

    Full text available to download

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publication

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Testy platformy SAN dla sektora elektroenergetycznego

    Współczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...

    Full text available to download

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publication
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Year 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Full text to download in external service

  • Distributed Databases

    e-Learning Courses
    • P. Szpryngier

  • Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT

    Publication
    • P. Jagannathan
    • S. Gurumoorthy
    • A. Stateczny
    • P. B. Divakarachar
    • J. Sengupta

    - SENSORS - Year 2021

    In recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...

    Full text available to download

  • Maritime Communication and Sea Safety of the Future - Machnine-type 5G Communication Concept

    The article presents the concept of a system based on 5G network and M2M communication increasing maritime safety. Generally, the focus was on presenting a proposal for a hierarchical, hybrid, cooperative system with M2M communication coordinated with BAN networks. The possi-ble applications of M2M communication at sea were also presented.

    Full text available to download

  • Vehicular Communication Environments

    Publication
    • E. G. Ström
    • L. Ekiz
    • T. Abbas
    • R. He
    • S. J. Ambroziak
    • V. Shivaldova
    • J. Nuckelt

    - Year 2016

    Communication to and between road vehicles (cars, truck, buses, trains, etc.) are of growing interest. This is partly due to the attractive services that cooperative intelligent transport systems (C-ITSs) provides, mainly in the areas of traffic safety and traffic efficiency. An enabler for C-ITS is wireless vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, collectively referred to as vehicle-to-X (V2X)...

    Full text to download in external service

  • Improving flexibility and performance of PVM applications by distributed partial evaluation

    A new framework for developing both flexible and efficient PVM applications is described. We propose Architecture Templates Interface (ATI) that allows to control application granularity and parallelism. To ensure high application efficiency we extend partial evaluation strategy into domain of distributed applications obtaining Distributed Partial Evaluation (DPE). Both ATI and DPE were implemented using a new distributed programming...

  • Intranet and internal communication in an organization

    Publication

    - Year 2006

    One of the conditions of an organizational effectiveness is acommunication. However, communication meets some obstacles. Newtechnological opportunities, such as Intranet support enterprise communication process and bring some benefits. This paper includes: the description of communication process and its barriers, the analyze of relationships between communication and an organizational effectiveness, advantages from implementing...

  • Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010

    Open Research Data
    open access

    A university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...

  • DISTRIBUTED COMPUTING

    Journals

    ISSN: 0178-2770 , eISSN: 1432-0452

  • A framework for detection of selfishness in multihop mobile ad hoc networks

    The paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...

    Full text available to download

  • Framework Reuse - Heaven or Hell

    Publication

    - Year 2014

    Object-oriented frameworks have almost completely dominated the world of business applications. Frameworks are widely considered to be helpful and are designed to speed up creation of applications. However, when trying to apply a framework for a particular application, it often turns out that this is not as easy as it seemed at the beginning. It takes time to become familiar with the framework, with its concepts and the standard...

    Full text to download in external service

  • Overview of cooperative communication methods

    The paper presents issues related to the cooperative communication in wireless networks. Cooperative com-munication involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. It is also possible to use several different data transmission standards. The paper presents the methods used to implement cooperative communication. The types of cooperative...

    Full text available to download

  • Distributed VoIP telecommunication system

    Publication

    - Year 2009

    In the paper a distributed VoIP telecommunication system architecture with load balancing is described. Important features of this architecture are the high level of system reliability and the possibility of using lowcost hardware solutions.

  • Multichannel Human Body Communication

    Publication

    Human Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...

    Full text to download in external service

  • Entanglement-swapping boxes and their communication properties

    Publication

    - PHYSICAL REVIEW A - Year 2008

    We pose the fundamental question of communication properties of primitives irrespectively of their implementation. To illustrate the idea we introduce the concept of entanglement-swapping boxes, i.e., we consider any quantum operations which perform entanglement swapping, not necessarily via simple quantum teleportation. We ask a question about the properties of such boxes, i.e., what local operations and how much classical communication...

    Full text available to download

  • Transmission parameters of underwater communication channels

    Publication

    The underwater environment is tough and demanding as a communication channel for ultrasonic signals. The channel transmission characteristics in marine and inland waters depend much on local bathymetry and changing weather conditions. The architecture and performance of a reliable underwater acoustic communication (UAC) system should allow real-time adaptation of its transmission parameters to a large variety of possible channel...

    Full text available to download

  • Fashion communication research: A way ahead

    Publication
    • L. Cantoni
    • F. Cominelli
    • N. Kalbaska
    • M. Ornati
    • T. Sádaba
    • P. SanMiguel

    - Studies in Communication Sciences - Year 2020

    Full text to download in external service

  • Telemetric Distributed Systems - 2022

    e-Learning Courses
    • M. Gnyba

  • Telemetric Distributed Systems - 2023

    e-Learning Courses
    • M. Gnyba

  • Distributed representation of information on cyclic events

    A representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...

    Full text available to download

  • Information and Communication Technologies for Economic Development

    Publication

    - Year 2017

    This chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...

    Full text to download in external service

  • Modelling of Mechatronic Systems with Distributed Parameter Components

    Publication

    - Year 2010

    The paper presents an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of distributed system has been defined by application of the bond graph methodology and the distributed transfer function method (DTFM). The proposed method of modelling enables to formulate input data for computer analysis by application of the DTFM. The computational package for the analysis of complex...

  • Port-based approach to distributed transfer function method

    Publication

    In the paper there is presented an uniform, port-based approach to modeling of both lumped and distributed parameter systems. Port-based model of distributed system has been defined by application of distributed transfer function method (DTFM). The approach proposed combines versatility of port - based modeling and accuracy of distributed transfer function method. It enables to formulate appropriate input data for computer analysis...

    Full text to download in external service

  • Port-Based Modelling of Distributed-Lumped Parameter Systems

    Publication

    There in the paper is presented an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of the distributed system has been defined by application of bond graph methodology and distributed transfer function method (DTFM). The approach proposed combines versatility of port-based modelling and accuracy of distributed transfer function method. The concise representation of lumped-distributed...

    Full text to download in external service