Filters
total: 2732
displaying 1000 best results Help
Search results for: MISSION-CRITICAL NETWORKS
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rearrangeability in multicast Clos networks is NP-complete
PublicationPrzestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...
-
Olgun Aydin dr
PeopleOlgun Aydin finished his PhD by publishing a thesis about Deep Neural Networks. He works as a Principal Machine Learning Engineer in Nike, and works as Assistant Professor in Gdansk University of Technology in Poland. Dr. Aydin is part of editorial board of "Journal of Artificial Intelligence and Data Science" Dr. Aydin served as Vice-Chairman of Why R? Foundation and is member of Polish Artificial Intelligence Society. Olgun is...
-
Hydrological signals in polar motion excitation – Evidence after fifteen years of the GRACE mission
Publication -
Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform
PublicationBirth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...
-
Cooperative Data Transmission in Wireless Vehicular Networks
PublicationThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
IET Networks
Journals -
NEURAL NETWORKS
Journals -
SOCIAL NETWORKS
Journals -
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublicationIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Sensitivity analysis of critical forces of trusses with side bracing
PublicationThe present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
CRVG - a new model for wireless networks topology generation
PublicationThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
Modeling the Influence of Salts on the Critical Micelle Concentration of Ionic Surfactants
PublicationWe show for the first time that a phenomenological, augmented volume-based thermodynamics (aVBT) model is capable to predict the critical micelle concentrations of ionic surfactants, including ionic liquids, with added salts. The model also adjusts for the type of salt added by including its molecular volume, which might form a connection to the Hofmeister effect. The other physico-chemically relevant quantities included in the...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Systems of Public Higher Education in Poland and Germany. Evidence from Institution Level Data
PublicationThe chapter presents a comparative analysis of public higher education systems (HES) in Germany and Poland. Instead of limiting our study to macro indicators such as gross expenditure on higher education or R&D as per cent of GDP, we draw on the evidence based on micro data especially collected for this study and concerning individual higher education institutions (HEIs). Comparative analysis is based on a sample of 71 public...
-
Whither the need and motivation for open government data (OGD) promotional strategies?
PublicationPurpose It has been underscored in the extant literature that open government data (OGD) has not percolated across the length and breadth of any country, let alone the awareness of the OGD among the stakeholders themselves. In this vein, this study aims to underline the reasons as to why OGD promotion merits consideration apart from underlining the manner in which OGD promotion may be done. Design/methodology/approach Based on...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Regulatory approach to competition law in the practice of the Polish Competition Authority – critical assessment
PublicationThe text provides a critical analysis of the Polish practice of using competition law provisions as regulation provisions
-
The networking of the justice system as part of public court networks
PublicationThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
Statistical significance of displacements in heterogeneous control networks
PublicationThis paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Open Research DataNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Application of wavelength division multiplexing in sensor networks
PublicationOver the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...
-
Method of selecting programming practices for the safety-critical software development projects
PublicationIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublicationThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Introducing agile practices into development processes of safety critical software
PublicationIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
The impact of institutions on innovation networks: empirical evidence from Poland
PublicationInnovation networks may accelerate and improve the innovation process, while institutional pathologies may hamper it. This study employs the Kruskal-Wallis H test and regression analysis to determine if the relationship between institutions and innovation networks does exist among the investigated variables. The purpose of the study was to find out whether cooperation with special local institutions influences the innovative behaviour...
-
Vitamin D kinetics in the acute phase of critical illness: A prospective observational study
Publication -
Jarosław Sadowski dr hab. inż.
People -
Traffic Modeling in IMS-based NGN Networks
PublicationIn the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Computations of critical load value of composite shell with random geometric imperfections
PublicationThe work presents the numerical analysis of composite shell with geometric imperfections subjected to compression along its generatrix. The imperfections are described as single indentations and random fields with random parameters of shape and correlation. The fields are generated with the use of the authors made program. Using the authors’ FEM software as well as commercial package Femap with NX Nastran, the critical load values...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublicationThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...
-
Critical perspectives on media architecture
Publication -
Critical Success Factors for Knowledge Management in SMEs in the KIBS Sector
PublicationThe purpose of this paper is to examine knowledge management practices and critical success factors (CSFs) for their introduction in small and medium-sized enterprises (SMEs) in the knowledge-intensive business services (KIBS) sector. Methodology: The paper is based on the results of an exploratory qualitative survey involving owners and managers of small and medium-sized companies operating in the KIBS sector. In the survey, eight...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublicationIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublicationMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Polysaccharide-based Nanocomposites for Biomedical Applications: A Critical Review
PublicationPolysaccharides (PSA) are taking specific position among biomaterials for advanced applications in medicine. Nevertheless, poor mechanical properties is known as the main drawback of PSA, which highlights need for PSA modification. Nanocomposites PSA (NPSA) are a class of biomaterials widely used as biomedical platforms, but despite their importance and worldwide use have not been reviewed. Herein we critically reviewed application...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublicationUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Artificial intelligence for biomedical engineering of polysaccharides: A short overview.
PublicationThe advent of computer-aided concepts and cognitive algorithms, along with fuzzy sets and fuzzy logic thoughts, supported the idea of ‘making computers think like people’ (Lotfi A. Zadeh, IEEE Spectrum, 21 (26–32), 1984). Such a school of thought enabled the sophistication of mission-oriented...