Search results for: COMPUTER COMMUNICATION NETWORKS - Bridge of Knowledge

Search

Search results for: COMPUTER COMMUNICATION NETWORKS

Search results for: COMPUTER COMMUNICATION NETWORKS

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010

    Open Research Data
    open access

    A university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...

  • Marek Czachor prof. dr hab.

  • Communication as a Factor Limiting University-Business Cooperation

    Objective - Despite the broad extent of the scientific activity dealing with university-business cooperation, Poland has yet to develop a satisfactory cooperation strategy that takes business needs into account. This issue is still relevant due to the need for continuous improvement and resulting benefits aimed at improving enterprise competitiveness. Methodology/Technique - Authors of this article attempt to select an overriding...

    Full text to download in external service

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Entanglement-swapping boxes and their communication properties

    Publication

    - PHYSICAL REVIEW A - Year 2008

    We pose the fundamental question of communication properties of primitives irrespectively of their implementation. To illustrate the idea we introduce the concept of entanglement-swapping boxes, i.e., we consider any quantum operations which perform entanglement swapping, not necessarily via simple quantum teleportation. We ask a question about the properties of such boxes, i.e., what local operations and how much classical communication...

    Full text available to download

  • Transmission parameters of underwater communication channels

    Publication

    The underwater environment is tough and demanding as a communication channel for ultrasonic signals. The channel transmission characteristics in marine and inland waters depend much on local bathymetry and changing weather conditions. The architecture and performance of a reliable underwater acoustic communication (UAC) system should allow real-time adaptation of its transmission parameters to a large variety of possible channel...

    Full text available to download

  • Fashion communication research: A way ahead

    Publication
    • L. Cantoni
    • F. Cominelli
    • N. Kalbaska
    • M. Ornati
    • T. Sádaba
    • P. SanMiguel

    - Studies in Communication Sciences - Year 2020

    Full text to download in external service

  • Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles

    Publication

    As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...

    Full text available to download

  • Smart Knowledge Engineering for Cognitive Systems: A Brief Overview

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2022

    Cognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...

    Full text available to download

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Modeling the Networks - ed. 2021/2022

    e-Learning Courses

    The goal of this course is to present optimization problems for road networks, where the road network is a set of n distinct lines, or n distinct (open or closed) line segments, in the plane, such that their union is a connected region.

  • Information and Communication Technologies for Economic Development

    Publication

    - Year 2017

    This chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...

    Full text to download in external service

  • Milena Marycz dr inż.

  • BPL-PLC Voice Communication System for the Oil and Mining Industry

    Publication
    • G. Debita
    • P. Falkowski-Gilski
    • M. Habrych
    • G. Wiśniewski
    • B. Miedziński
    • P. Jedlikowski
    • A. Waniewska
    • J. Wandzio
    • B. Polnik

    - ENERGIES - Year 2020

    Application of a high-efficiency voice communication systems based on broadband over power line-power line communication (BPL-PLC) technology in medium voltage networks, including hazardous areas (like the oil and mining industry), as a redundant mean of wired communication (apart from traditional fiber optics and electrical wires) can be beneficial. Due to the possibility of utilizing existing electrical infrastructure, it can...

    Full text available to download

  • Exploiting multi-interface networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2010

    Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...

    Full text to download in external service

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Full text to download in external service

  • The Diffusion of Information and Communication Technologies

    Publication

    - Year 2018

    This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the ‘critical mass’ and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis...

    Full text to download in external service

  • Decision making techniques for electronic communication: an example for Turkey

    Publication

    - Year 2017

    Communication is the way for people exchanging information with each other by using various tools. Electronic communication or Ecommunication is the process of sending, receiving and processing information or messages electronically. Electronic communication that is closely related to the development levels of countries, has made considerable progress especially in terms technology, innovation and entrepreneur. In this study, it...

    Full text to download in external service

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publication

    - Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska - Year 2020

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Full text available to download

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities

    Publication
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Year 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Full text available to download

  • KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO

    Publication

    Problematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...

  • InSIK Intelligent Monitoring, Control and Security of Critical Infrastructure Systems

    Projects

    Project manager: prof. dr hab. inż. Mieczysław Brdyś   Financial Program Name: COST

    Project realized in Faculty of Electrical and Control Engineering according to 638/N-COST/09/2010/0 agreement from 2009-12-22

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Erosion of privacy in computer vision systems

    W pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.

  • Measurements of transmission properties of Acoustic Communication Channels

    Publication

    Tough transmission properties of shallow water acoustic channels (SWAC) highly limit the use of underwater acoustic communication (UAC) systems. An adaptive matching of modulation and signaling schemes to instantaneous channel conditions is needed for reliabledata communications. This creates, however, unique challenges for designers when compared to radio transmission systems. When communication system elements are in move, the...

    Full text available to download

  • Directed percolation effects emerging from superadditivity of quantum networks

    Entanglement-induced nonadditivity of classical communication capacity in networks consisting of quantum channels is considered. Communication lattices consisting of butterfly-type entanglement-breaking channels augmented, with some probability, by identity channels are analyzed. The capacity superadditivity in the network is manifested in directed correlated bond percolation which we consider in two flavors: simply directed and...

    Full text available to download

  • The impact of brand communication on brand equity through Facebook

    Purpose The purpose of this study is to fill the gap in the discussion of the ways in which firm-created and user-generated social media brand communication impacts consumer-based brand equity metrics through Facebook. Design/methodology/approach We evaluated 302 data sets that were generated through a standardized online-survey to investigate the impact of firm-created and user-generated social media brand communication on brand...

    Full text to download in external service

  • The development of an underwater telephone for digital communication purposes

    Publication

    - HYDROACOUSTICS - Year 2016

    The underwater telephone HTL-10 has been designed to provide voice and data communication between helicopter and submarines using acoustic waves. It works in a half-duplex mode and uses analogue power-efficient modulation in the form of a single side-band, suppressed carrier, in a wide range of frequencies. It generates the transmitted signal, and processes the received signals. It is implemented with the use of digital signal...

    Full text available to download

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Next generation ITS implementation aspects in 5G wireless communication network

    Publication

    - Year 2017

    In the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...

    Full text to download in external service

  • The Latest Advances in Wireless Communication in Aviation, Wind Turbines and Bridges

    Publication

    - Inventions - Year 2022

    Present-day technologies used in SHM (Structural Health Monitoring) systems in many implementations are based on wireless sensor networks (WSN). In the context of the continuous development of these systems, the costs of the elements that form the monitoring system are decreasing. In this situation, the challenge is to select the optimal number of sensors and the network architecture, depending on the wireless system’s other parameters...

    Full text available to download

  • Communication Platform for Evaluation of Transmitted Speech Quality

    A voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...

    Full text available to download

  • The effect of social media communication on consumer perceptions of brands

    Researchers and brand managers have limited understanding of the effects social media communication has on how consumers perceive brands. We investigated 504 Facebook users in order to observe the impact of firm-created and user-generated (UG) social media communication on brand equity (BE), brand attitude (BA) and purchase intention (PI) by using a standardized online survey throughout Poland. To test the conceptual model, we...

    Full text to download in external service

  • The Analysis and Solutions to the Problems of IPv6 Configuration Migration of Small Networks

    The paper analyzes the problems of IPv4 to IPv6 migration processes and indicates the areas in which migration can be done without expensive replacement of hardware, software and organizational changes. This paper presents the migration tools developed for the SOHO network administrators. The tools provide theoretical knowledge and practical advices on migrating to IPv6 and enable automation of the migration process. The article...

    Full text to download in external service

  • Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G

    Publication

    - Year 2017

    In the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...

    Full text to download in external service

  • Deep learning approach on surface EEG based Brain Computer Interface

    Publication

    - Year 2022

    In this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...

    Full text to download in external service

  • Computer application for railway track realignment

    Publication

    - Year 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Full text to download in external service

  • Communication and Visualisation in Building Automation - 2023/24

    e-Learning Courses
    • P. Fiertek

    Lecture "Communication and Visualisation in Building Automation", Wydział ETI, katedra KSiS, II stopień studiów 

  • Neural networks and deep learning

    Publication

    - Year 2022

    In this chapter we will provide the general and fundamental background related to Neural Networks and Deep Learning techniques. Specifically, we divide the fundamentals of deep learning in three parts, the first one introduces Deep Feed Forward Networks and the main training algorithms in the context of optimization. The second part covers Convolutional Neural Networks (CNN) and discusses their main advantages and shortcomings...

    Full text to download in external service

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Quantum communication complexity advantage implies violation of a Bell inequality

    Publication

    - PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA - Year 2016

    We obtain a general connection between a quantum advantage in communication complexity and non-locality. We show that given any protocol offering a (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics which violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily...

    Full text to download in external service

  • Multimodal Approach For Polysensory Stimulation And Diagnosis Of Subjects With Severe Communication Disorders

    Publication

    is evaluated on 9 patients, data analysis methods are described, and experiments of correlating Glasgow Coma Scale with extracted features describing subjects performance in therapeutic exercises exploiting EEG and eyetracker are presented. Performance metrics are proposed, and k-means clusters used to define concepts for mental states related to EEG and eyetracking activity. Finally, it is shown that the strongest correlations...

    Full text available to download

  • Computer modeling and testing of structural metamaterials

    Publication
    • T. Krolikowski
    • R. Knitter
    • A. Blazejewski

    - Procedia Computer Science - Year 2019

    Full text to download in external service

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publication

    - Year 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Full text to download in external service

  • Reliable underwater communication system for shallow coastal waters

    Publication

    - HYDROACOUSTICS - Year 2014

    This paper presents a reliable and robust low data rate spread spectrum approach which is implemented in the acoustic underwater communication system for shallow coastal waters. It shows operation assumptions of spread spectrum techniques based on the wellknown Shannon equation. It describes two methods of spread spectrum: frequency hopping spread spectrum and direct sequence spread spectrum; their block diagram and their characteristics...

    Full text available to download

  • The Use of Information and Communication Technologies in Cluster Organizations

    Publication

    - Year 2019

    The purpose of the paper is to explore how cluster organizations (COs) take advantage of Information and Communication Technologies (ICT). The paper addresses the research question: “How do cluster organizations take advantage of ICT in fulfilling their main roles?”. The research was carried out in the first half of 2016 in four purposefully selected cluster organizations. The main research strategy involved Grounded Theory; the...

    Full text to download in external service

  • Quality of Satellite Communication in Selected Mobile Android Smartphones

    Today, thanks to mobile devices, satellite communication is available to anyone and everywhere. Gaining information on one’s position using GNSS (Global Navigation Satellite Systems), particularly in unknown urban environments, had become an everyday activity. With the widespread of mobile devices, particularly smartphones, each person can obtain information considering his or her location anytime and everywhere. This paper is...

    Full text available to download