Filters
total: 4407
-
Catalog
- Publications 2949 available results
- Journals 466 available results
- Conferences 198 available results
- People 337 available results
- Inventions 1 available results
- Projects 6 available results
- Research Teams 1 available results
- e-Learning Courses 162 available results
- Events 6 available results
- Open Research Data 281 available results
displaying 1000 best results Help
Search results for: COMPUTER COMMUNICATION NETWORKS
-
Expedited EM-Driven Design of Miniaturized Microwave Hybrid Couplers Using Surrogate-Based Optimization
PublicationMiniaturization of microwave hybrid couplers is important for contemporary wireless communication engineering. Using standard computer-aided design methods for development of compact structures is extremely challenging due to a general lack of computationally efficient and accurate simulation models. Poor accuracy of available equivalent circuits results from neglecting parasitic cross-couplings that greatly affect the performance...
-
KM Challenges in Small KIBS Companies: Multi-case Analysis in Two Countries
PublicationKnowledge Intensive Business Services (KIBS) – i.e. companies like e.g. computer services, consulting, engineering, business communication, and R&D support - are key players in the modern economies. They stimulate the innovativeness of businesses and societies. Their competitiveness is based on knowledge, which is their key production factor and also the kind of “goods” they sell. The large majority of KIBS companies have a small...
-
Milena Marycz dr inż.
People -
Toward Fast Calculation of Communication Paths for Resilient Routing
PublicationUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Jolanta Kowal dr hab.
PeopleJolanta Kowal has a Post-doctoral Degree in Social Sciences (dr hab., DSc) in the field of economics and finance, an assistant professor, researcher, and lecturer in the Institute of Psychology of Wroclaw University, and a professor of the Gdańsk University of Technology, Poland, a Jungian analyst. Jolanta from 2014 held functions in the Board of the Polish Chapter of the Association for Information Systems (PLAIS) (President 2015-2018,...
-
Adrian Bekasiewicz dr hab. inż.
PeopleAdrian Bekasiewicz received the MSc, PhD, and DSc degrees in electronic engineering from Gdansk University of Technology, Poland, in 2011, 2016, and 2020, respectively. In 2014, he joined Engineering Optimization & Modeling Center at Reykjavik University, Iceland, where he held a Research Associate and a Postdoctoral Fellow positions, respectively. Currently, he is an Associate Professor and the head of Teleinformation Networks...
-
Modelling of wastewater treatment plant for monitoring and control purposes by state - space wavelet networks
PublicationMost of industrial processes are nonlinear, not stationary, and dynamical with at least few different time scales in their internal dynamics and hardly measured states. A biological wastewater treatment plant falls into this category. The paper considers modelling such processes for monitorning and control purposes by using State - Space Wavelet Neural Networks (SSWN). The modelling method is illustrated based on bioreactors of...
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Measures of region failure survivability for wireless mesh networks
PublicationWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Intranet and internal communication in an organization
PublicationOne of the conditions of an organizational effectiveness is acommunication. However, communication meets some obstacles. Newtechnological opportunities, such as Intranet support enterprise communication process and bring some benefits. This paper includes: the description of communication process and its barriers, the analyze of relationships between communication and an organizational effectiveness, advantages from implementing...
-
Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010
Open Research DataA university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...
-
Min-max optimization of node‐targeted attacks in service networks
PublicationThis article considers resilience of service networks that are composed of service and control nodes to node-targeted attacks. Two complementary problems of selecting attacked nodes and placing control nodes reflect the interaction between the network operator and the network attacker. This interaction can be analyzed within the framework of game theory. Considering the limited performance of the previously introduced iterative...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublicationW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Communication as a Factor Limiting University-Business Cooperation
PublicationObjective - Despite the broad extent of the scientific activity dealing with university-business cooperation, Poland has yet to develop a satisfactory cooperation strategy that takes business needs into account. This issue is still relevant due to the need for continuous improvement and resulting benefits aimed at improving enterprise competitiveness. Methodology/Technique - Authors of this article attempt to select an overriding...
-
Deep neural networks for data analysis 24/25
e-Learning CoursesThis course covers introduction to supervised machine learning, construction of basic artificial deep neural networks (DNNs) and basic training algorithms, as well as the overview of popular DNNs architectures (convolutional networks, recurrent networks, transformers). The course introduces students to popular regularization techniques for deep models. Besides theory, large part of the course is the project in which students apply...
-
Entanglement-swapping boxes and their communication properties
PublicationWe pose the fundamental question of communication properties of primitives irrespectively of their implementation. To illustrate the idea we introduce the concept of entanglement-swapping boxes, i.e., we consider any quantum operations which perform entanglement swapping, not necessarily via simple quantum teleportation. We ask a question about the properties of such boxes, i.e., what local operations and how much classical communication...
-
Smart Knowledge Engineering for Cognitive Systems: A Brief Overview
PublicationCognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...
-
Transmission parameters of underwater communication channels
PublicationThe underwater environment is tough and demanding as a communication channel for ultrasonic signals. The channel transmission characteristics in marine and inland waters depend much on local bathymetry and changing weather conditions. The architecture and performance of a reliable underwater acoustic communication (UAC) system should allow real-time adaptation of its transmission parameters to a large variety of possible channel...
-
Fashion communication research: A way ahead
Publication -
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles
PublicationAs the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...
-
Information and Communication Technologies for Economic Development
PublicationThis chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...
-
BPL-PLC Voice Communication System for the Oil and Mining Industry
PublicationApplication of a high-efficiency voice communication systems based on broadband over power line-power line communication (BPL-PLC) technology in medium voltage networks, including hazardous areas (like the oil and mining industry), as a redundant mean of wired communication (apart from traditional fiber optics and electrical wires) can be beneficial. Due to the possibility of utilizing existing electrical infrastructure, it can...
-
Origami Antennas for Wireless Communication Systems
PublicationThis book discusses the lightweight, reconfigurable, and deployable origami antennas for adaptive communication systems. Traditional antennas, with their fixed characteristics, struggle to meet the evolving needs of modern communication systems. Reconfigurable antennas, on the other hand, can dynamically adjust their operating parameters, offering significant advantages in terms of performance, size, and cost. Origami technology...
-
Exploiting multi-interface networks: Connectivity and Cheapest Paths
PublicationLet G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Gesture-based computer control system
PublicationIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
The Diffusion of Information and Communication Technologies
PublicationThis book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the ‘critical mass’ and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis...
-
KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO
PublicationProblematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...
-
THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS
PublicationPurpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...
-
Decision making techniques for electronic communication: an example for Turkey
PublicationCommunication is the way for people exchanging information with each other by using various tools. Electronic communication or Ecommunication is the process of sending, receiving and processing information or messages electronically. Electronic communication that is closely related to the development levels of countries, has made considerable progress especially in terms technology, innovation and entrepreneur. In this study, it...
-
Modeling the Networks - ed. 2021/2022
e-Learning CoursesThe goal of this course is to present optimization problems for road networks, where the road network is a set of n distinct lines, or n distinct (open or closed) line segments, in the plane, such that their union is a connected region.
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublicationFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Erosion of privacy in computer vision systems
PublicationW pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.
-
Measurements of transmission properties of Acoustic Communication Channels
PublicationTough transmission properties of shallow water acoustic channels (SWAC) highly limit the use of underwater acoustic communication (UAC) systems. An adaptive matching of modulation and signaling schemes to instantaneous channel conditions is needed for reliabledata communications. This creates, however, unique challenges for designers when compared to radio transmission systems. When communication system elements are in move, the...
-
Directed percolation effects emerging from superadditivity of quantum networks
PublicationEntanglement-induced nonadditivity of classical communication capacity in networks consisting of quantum channels is considered. Communication lattices consisting of butterfly-type entanglement-breaking channels augmented, with some probability, by identity channels are analyzed. The capacity superadditivity in the network is manifested in directed correlated bond percolation which we consider in two flavors: simply directed and...
-
Unbounded quantum advantage in communication complexity measured by distinguishability
PublicationCommunication complexity is a fundamental aspect of information science, concerned with the amount of communication required to solve a problem distributed among multiple parties. The standard quantification of one-way communication complexity relies on the minimal dimension of the communicated systems. In this paper, we measure the communication complexity of a task by the minimal distinguishability required to accomplish it,...
-
InSIK Intelligent Monitoring, Control and Security of Critical Infrastructure Systems
ProjectsProject realized in Faculty of Electrical and Control Engineering according to 638/N-COST/09/2010/0 agreement from 2009-12-22
-
The impact of brand communication on brand equity through Facebook
PublicationPurpose The purpose of this study is to fill the gap in the discussion of the ways in which firm-created and user-generated social media brand communication impacts consumer-based brand equity metrics through Facebook. Design/methodology/approach We evaluated 302 data sets that were generated through a standardized online-survey to investigate the impact of firm-created and user-generated social media brand communication on brand...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
The development of an underwater telephone for digital communication purposes
PublicationThe underwater telephone HTL-10 has been designed to provide voice and data communication between helicopter and submarines using acoustic waves. It works in a half-duplex mode and uses analogue power-efficient modulation in the form of a single side-band, suppressed carrier, in a wide range of frequencies. It generates the transmitted signal, and processes the received signals. It is implemented with the use of digital signal...
-
Next generation ITS implementation aspects in 5G wireless communication network
PublicationIn the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...
-
The Latest Advances in Wireless Communication in Aviation, Wind Turbines and Bridges
PublicationPresent-day technologies used in SHM (Structural Health Monitoring) systems in many implementations are based on wireless sensor networks (WSN). In the context of the continuous development of these systems, the costs of the elements that form the monitoring system are decreasing. In this situation, the challenge is to select the optimal number of sensors and the network architecture, depending on the wireless system’s other parameters...
-
Communication Platform for Evaluation of Transmitted Speech Quality
PublicationA voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...
-
Deep learning approach on surface EEG based Brain Computer Interface
PublicationIn this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...
-
Computer application for railway track realignment
PublicationThe topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...
-
The effect of social media communication on consumer perceptions of brands
PublicationResearchers and brand managers have limited understanding of the effects social media communication has on how consumers perceive brands. We investigated 504 Facebook users in order to observe the impact of firm-created and user-generated (UG) social media communication on brand equity (BE), brand attitude (BA) and purchase intention (PI) by using a standardized online survey throughout Poland. To test the conceptual model, we...
-
The Analysis and Solutions to the Problems of IPv6 Configuration Migration of Small Networks
PublicationThe paper analyzes the problems of IPv4 to IPv6 migration processes and indicates the areas in which migration can be done without expensive replacement of hardware, software and organizational changes. This paper presents the migration tools developed for the SOHO network administrators. The tools provide theoretical knowledge and practical advices on migrating to IPv6 and enable automation of the migration process. The article...