Search results for: COMPUTER COMMUNICATION NETWORKS - Bridge of Knowledge

Search

Search results for: COMPUTER COMMUNICATION NETWORKS

Search results for: COMPUTER COMMUNICATION NETWORKS

  • Expedited EM-Driven Design of Miniaturized Microwave Hybrid Couplers Using Surrogate-Based Optimization

    Publication

    - Year 2017

    Miniaturization of microwave hybrid couplers is important for contemporary wireless communication engineering. Using standard computer-aided design methods for development of compact structures is extremely challenging due to a general lack of computationally efficient and accurate simulation models. Poor accuracy of available equivalent circuits results from neglecting parasitic cross-couplings that greatly affect the performance...

    Full text available to download

  • KM Challenges in Small KIBS Companies: Multi-case Analysis in Two Countries

    Publication

    - Year 2023

    Knowledge Intensive Business Services (KIBS) – i.e. companies like e.g. computer services, consulting, engineering, business communication, and R&D support - are key players in the modern economies. They stimulate the innovativeness of businesses and societies. Their competitiveness is based on knowledge, which is their key production factor and also the kind of “goods” they sell. The large majority of KIBS companies have a small...

    Full text available to download

  • Milena Marycz dr inż.

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Jolanta Kowal dr hab.

    People

    Jolanta Kowal has a Post-doctoral Degree in Social Sciences (dr hab., DSc) in the field of economics and finance, an assistant professor, researcher, and lecturer in the Institute of Psychology of Wroclaw University, and a professor of the Gdańsk University of Technology, Poland, a Jungian analyst. Jolanta from 2014 held functions in the Board of the Polish Chapter of the Association for Information Systems (PLAIS) (President 2015-2018,...

  • Adrian Bekasiewicz dr hab. inż.

    Adrian Bekasiewicz received the MSc, PhD, and DSc degrees in electronic engineering from Gdansk University of Technology, Poland, in 2011, 2016, and 2020, respectively. In 2014, he joined Engineering Optimization & Modeling Center at Reykjavik University, Iceland, where he held a Research Associate and a Postdoctoral Fellow positions, respectively. Currently, he is an Associate Professor and the head of Teleinformation Networks...

  • Modelling of wastewater treatment plant for monitoring and control purposes by state - space wavelet networks

    Publication

    Most of industrial processes are nonlinear, not stationary, and dynamical with at least few different time scales in their internal dynamics and hardly measured states. A biological wastewater treatment plant falls into this category. The paper considers modelling such processes for monitorning and control purposes by using State - Space Wavelet Neural Networks (SSWN). The modelling method is illustrated based on bioreactors of...

    Full text to download in external service

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Measures of region failure survivability for wireless mesh networks

    Publication

    - WIRELESS NETWORKS - Year 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Full text available to download

  • Intranet and internal communication in an organization

    Publication

    - Year 2006

    One of the conditions of an organizational effectiveness is acommunication. However, communication meets some obstacles. Newtechnological opportunities, such as Intranet support enterprise communication process and bring some benefits. This paper includes: the description of communication process and its barriers, the analyze of relationships between communication and an organizational effectiveness, advantages from implementing...

  • Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010

    Open Research Data
    open access

    A university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...

  • Min-max optimization of node‐targeted attacks in service networks

    Publication

    - NETWORKS - Year 2024

    This article considers resilience of service networks that are composed of service and control nodes to node-targeted attacks. Two complementary problems of selecting attacked nodes and placing control nodes reflect the interaction between the network operator and the network attacker. This interaction can be analyzed within the framework of game theory. Considering the limited performance of the previously introduced iterative...

    Full text to download in external service

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Communication as a Factor Limiting University-Business Cooperation

    Objective - Despite the broad extent of the scientific activity dealing with university-business cooperation, Poland has yet to develop a satisfactory cooperation strategy that takes business needs into account. This issue is still relevant due to the need for continuous improvement and resulting benefits aimed at improving enterprise competitiveness. Methodology/Technique - Authors of this article attempt to select an overriding...

    Full text to download in external service

  • Deep neural networks for data analysis 24/25

    e-Learning Courses
    • J. Cychnerski
    • K. Draszawka

    This course covers introduction to supervised machine learning, construction of basic artificial deep neural networks (DNNs) and basic training algorithms, as well as the overview of popular DNNs architectures (convolutional networks, recurrent networks, transformers). The course introduces students to popular regularization techniques for deep models. Besides theory, large part of the course is the project in which students apply...

  • Entanglement-swapping boxes and their communication properties

    Publication

    - PHYSICAL REVIEW A - Year 2008

    We pose the fundamental question of communication properties of primitives irrespectively of their implementation. To illustrate the idea we introduce the concept of entanglement-swapping boxes, i.e., we consider any quantum operations which perform entanglement swapping, not necessarily via simple quantum teleportation. We ask a question about the properties of such boxes, i.e., what local operations and how much classical communication...

    Full text available to download

  • Smart Knowledge Engineering for Cognitive Systems: A Brief Overview

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2022

    Cognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...

    Full text available to download

  • Transmission parameters of underwater communication channels

    Publication

    The underwater environment is tough and demanding as a communication channel for ultrasonic signals. The channel transmission characteristics in marine and inland waters depend much on local bathymetry and changing weather conditions. The architecture and performance of a reliable underwater acoustic communication (UAC) system should allow real-time adaptation of its transmission parameters to a large variety of possible channel...

    Full text available to download

  • Fashion communication research: A way ahead

    Publication
    • L. Cantoni
    • F. Cominelli
    • N. Kalbaska
    • M. Ornati
    • T. Sádaba
    • P. SanMiguel

    - Studies in Communication Sciences - Year 2020

    Full text to download in external service

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles

    Publication

    As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...

    Full text available to download

  • Information and Communication Technologies for Economic Development

    Publication

    - Year 2017

    This chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...

    Full text to download in external service

  • BPL-PLC Voice Communication System for the Oil and Mining Industry

    Publication
    • G. Debita
    • P. Falkowski-Gilski
    • M. Habrych
    • G. Wiśniewski
    • B. Miedziński
    • P. Jedlikowski
    • A. Waniewska
    • J. Wandzio
    • B. Polnik

    - ENERGIES - Year 2020

    Application of a high-efficiency voice communication systems based on broadband over power line-power line communication (BPL-PLC) technology in medium voltage networks, including hazardous areas (like the oil and mining industry), as a redundant mean of wired communication (apart from traditional fiber optics and electrical wires) can be beneficial. Due to the possibility of utilizing existing electrical infrastructure, it can...

    Full text available to download

  • Origami Antennas for Wireless Communication Systems

    Publication

    - Year 2024

    This book discusses the lightweight, reconfigurable, and deployable origami antennas for adaptive communication systems. Traditional antennas, with their fixed characteristics, struggle to meet the evolving needs of modern communication systems. Reconfigurable antennas, on the other hand, can dynamically adjust their operating parameters, offering significant advantages in terms of performance, size, and cost. Origami technology...

    Full text to download in external service

  • Exploiting multi-interface networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2010

    Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...

    Full text to download in external service

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Full text to download in external service

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download

  • The Diffusion of Information and Communication Technologies

    Publication

    - Year 2018

    This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the ‘critical mass’ and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis...

    Full text to download in external service

  • KRYTERIA STOSOWANE W WIELOKRYTERIALNYM PLANOWANIU ROZWOJU SYSTEMU ELEKTROENERGETYCZNEGO

    Publication

    Problematyka planowania rozwoju systemów elektroenergetycznych jest zagadnieniem często podejmowanym w badaniach optymalizacyjnych ze względu na wagę i zasięg problemu. Rozwój techniki komputerowej pozwolił na połączenie tematyki optymalizacji struktury wytwarzania i planowania sieci elektroenergetycznej, co jest zagadnieniem wielowątkowym oraz wielowymiarowym. W prezentowanym artykule przedstawiono kryteria stosowane w analizach...

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publication

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Full text available to download

  • Decision making techniques for electronic communication: an example for Turkey

    Publication

    - Year 2017

    Communication is the way for people exchanging information with each other by using various tools. Electronic communication or Ecommunication is the process of sending, receiving and processing information or messages electronically. Electronic communication that is closely related to the development levels of countries, has made considerable progress especially in terms technology, innovation and entrepreneur. In this study, it...

    Full text to download in external service

  • Modeling the Networks - ed. 2021/2022

    e-Learning Courses

    The goal of this course is to present optimization problems for road networks, where the road network is a set of n distinct lines, or n distinct (open or closed) line segments, in the plane, such that their union is a connected region.

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities

    Publication
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Year 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Full text available to download

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Erosion of privacy in computer vision systems

    W pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.

  • Measurements of transmission properties of Acoustic Communication Channels

    Publication

    Tough transmission properties of shallow water acoustic channels (SWAC) highly limit the use of underwater acoustic communication (UAC) systems. An adaptive matching of modulation and signaling schemes to instantaneous channel conditions is needed for reliabledata communications. This creates, however, unique challenges for designers when compared to radio transmission systems. When communication system elements are in move, the...

    Full text available to download

  • Directed percolation effects emerging from superadditivity of quantum networks

    Entanglement-induced nonadditivity of classical communication capacity in networks consisting of quantum channels is considered. Communication lattices consisting of butterfly-type entanglement-breaking channels augmented, with some probability, by identity channels are analyzed. The capacity superadditivity in the network is manifested in directed correlated bond percolation which we consider in two flavors: simply directed and...

    Full text available to download

  • Unbounded quantum advantage in communication complexity measured by distinguishability

    Publication

    - Physical Review Research - Year 2024

    Communication complexity is a fundamental aspect of information science, concerned with the amount of communication required to solve a problem distributed among multiple parties. The standard quantification of one-way communication complexity relies on the minimal dimension of the communicated systems. In this paper, we measure the communication complexity of a task by the minimal distinguishability required to accomplish it,...

    Full text available to download

  • InSIK Intelligent Monitoring, Control and Security of Critical Infrastructure Systems

    Projects

    Project manager: prof. dr hab. inż. Mieczysław Brdyś   Financial Program Name: COST

    Project realized in Faculty of Electrical and Control Engineering according to 638/N-COST/09/2010/0 agreement from 2009-12-22

  • The impact of brand communication on brand equity through Facebook

    Purpose The purpose of this study is to fill the gap in the discussion of the ways in which firm-created and user-generated social media brand communication impacts consumer-based brand equity metrics through Facebook. Design/methodology/approach We evaluated 302 data sets that were generated through a standardized online-survey to investigate the impact of firm-created and user-generated social media brand communication on brand...

    Full text to download in external service

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • The development of an underwater telephone for digital communication purposes

    Publication

    - HYDROACOUSTICS - Year 2016

    The underwater telephone HTL-10 has been designed to provide voice and data communication between helicopter and submarines using acoustic waves. It works in a half-duplex mode and uses analogue power-efficient modulation in the form of a single side-band, suppressed carrier, in a wide range of frequencies. It generates the transmitted signal, and processes the received signals. It is implemented with the use of digital signal...

    Full text available to download

  • Next generation ITS implementation aspects in 5G wireless communication network

    Publication

    - Year 2017

    In the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...

    Full text to download in external service

  • The Latest Advances in Wireless Communication in Aviation, Wind Turbines and Bridges

    Publication

    - Inventions - Year 2022

    Present-day technologies used in SHM (Structural Health Monitoring) systems in many implementations are based on wireless sensor networks (WSN). In the context of the continuous development of these systems, the costs of the elements that form the monitoring system are decreasing. In this situation, the challenge is to select the optimal number of sensors and the network architecture, depending on the wireless system’s other parameters...

    Full text available to download

  • Communication Platform for Evaluation of Transmitted Speech Quality

    A voice communication system designed and implemented is described. The purpose of the presented platform was to enable a series of experiments related to the quality assessment of algorithms used in the coding and transmitting of speech. The system is equipped with tools for recording signals at each stage of processing, making it possible to subject them to subjective assessments by listening tests or, objective evaluation employing...

    Full text available to download

  • Deep learning approach on surface EEG based Brain Computer Interface

    Publication

    - Year 2022

    In this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...

    Full text to download in external service

  • Computer application for railway track realignment

    Publication

    - Year 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Full text to download in external service

  • The effect of social media communication on consumer perceptions of brands

    Researchers and brand managers have limited understanding of the effects social media communication has on how consumers perceive brands. We investigated 504 Facebook users in order to observe the impact of firm-created and user-generated (UG) social media communication on brand equity (BE), brand attitude (BA) and purchase intention (PI) by using a standardized online survey throughout Poland. To test the conceptual model, we...

    Full text to download in external service

  • The Analysis and Solutions to the Problems of IPv6 Configuration Migration of Small Networks

    The paper analyzes the problems of IPv4 to IPv6 migration processes and indicates the areas in which migration can be done without expensive replacement of hardware, software and organizational changes. This paper presents the migration tools developed for the SOHO network administrators. The tools provide theoretical knowledge and practical advices on migrating to IPv6 and enable automation of the migration process. The article...

    Full text to download in external service