Search results for: ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) - Bridge of Knowledge

Search

Search results for: ICT (INFORMATION AND COMMUNICATION TECHNOLOGY)

Search results for: ICT (INFORMATION AND COMMUNICATION TECHNOLOGY)

  • Bus bays inventory using a terrestrial laser scanning system

    This article presents the use of laser scanning technology for the assessment of bus bay geo-location. Ground laser scanning is an effective tool for collecting three-dimensional data. Moreover, the analysis of a point cloud dataset can be a source of a lot of information. The authors have outlined an innovative use of data collection and analysis using the TLS regarding information on the flatness of bus bays. The results were...

    Full text available to download

  • Quantifying Contextuality

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • P. Joshi
    • W. Kłobus
    • A. Wójcik

    - PHYSICAL REVIEW LETTERS - Year 2014

    Contextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...

    Full text to download in external service

  • Study on Speech Transmission under Varying QoS Parameters in a OFDM Communication System

    Publication

    - Year 2021

    Although there has been an outbreak of multiple multimedia platforms worldwide, speech communication is still the most essential and important type of service. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission, based most often on multi-valued modulations, multiple...

    Full text to download in external service

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities

    Publication
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Year 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Full text available to download

  • Rapid development of custom web application with ruby on rails framework on the example of group project system

    Publication

    - Year 2010

    Technology industry labor market requires engineers with a good preparation for work with project's tasks and team cooperation skills. One of the way for achieve that abilities during technical university education are students group projects. Running of group projects at university brings new challenges, from recruitment of students with required skills for par-ticular project, to lack of industrial procedures and ready to use...

  • Validation of a virtual test environment for C2X communication under radio jamming conditions

    Publication

    - Year 2020

    In this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...

    Full text available to download

  • Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    In this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...

    Full text to download in external service

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Full text available to download

  • Fast Collaborative Graph Exploration

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2013

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text to download in external service

  • Fast collaborative graph exploration

    Publication

    - INFORMATION AND COMPUTATION - Year 2015

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text available to download

  • Evolution of End-User Participation in IT Projects.

    Publication

    - Year 2013

    This chapter is aimed at presenting a review of evolutionary design paradigms which determine the end-user’s role in IT (Information Technology) projects across recent decades. This review covers different perspectives starting from technology-oriented sequential software development lifecycles, through user-centred approaches, ending finally in contemporary service design approaches supported by e-business and social media. Finally,...

  • Smart Document-Centric Processing of Human Oriented Information Flows

    Publication

    Usually people prefer to focus on creative rather than repetitive and schematic work patterns. Still, they must spend a lot of time complying with the procedures, selecting the information they receive and repeatedly restoring the previous state of work. This paper proposes the Mobile INteractive Document architecture (MIND) - a document-centric uniform interface to provide both effective communication of content and coordination...

    Full text available to download

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Full text to download in external service

  • As- built inventory of the office building with the use of terrestrial laser scanning

    Publication

    Terrestrial Laser Scanning (TLS) is an efficient tool for building inventories. Based on the red- laser beam technology it is possible to provide the high accuracy data with complete spatial information about a scanned object. In this article, authors present the solution of use a TLS in as-built inventory of the office building. Based on the provided data, it is possible to evaluate the correctness of built details of a building...

    Full text available to download

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Full text available to download

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Identification of Emotions Based on Human Facial Expressions Using a Color-Space Approach

    Publication

    HCI technology improves human-computer interaction. Such communication can be carried out with the use of emotions that are visible on the human face since birth. In this paper the Emotion system for detecting and recognizing facial expressions, developed in the MSc work, is presented. The system recognizes emotion from webcam video in real time. It is based on color segmentation and morphological operations. The system uses a...

    Full text available to download

  • IEEE/IFIP International Conference on Information Technology for Balanced Automation Systems

    Conferences

  • Jakub Jan Chabik dr inż.

    About Jakub Chabik graduated in Computing from Wrocław University of Technology as well as from MBA studies at Poznan University of Economics / Georgia State University Atlanta. He has a doctoral degree in management. Professional career For almost 30 years he's been working in international companies, taking positions in technology and management in IT. In the past he led the structural and cultural change in the bank during its...

  • Knowledge work and knowledge workers in knowledge-based economy - theoretical considerations

    It is often claimed that an organization is as good as people working in it and that talented workers are the driving force of an organization. To cope with the growing requirements of knowledge-based economy, organizations need a special type of workers - knowledge workers. This is especially important in organizations building their competitive advantage on innovations and the application of information and communication technologies...

  • Visual Management as the support in building the concept of continuous improvement in the enterprise

    The following article presents one of the selected tools of the Lean Management concept – visual management. This method enables enterprises to strengthen their process of continuous improvement. Due to the support of visual management, it is possible to manage information more effectively by the managerial board and to improve communication process within in the particular company. In the first part, the author describes the concept...

    Full text available to download

  • Blogi jako platforma komunikowania na przykładzie blogów uczelnianych

    W artykule stawiam tezę o istotnej roli blogów jako niezwykle skutecznej platformie komunikacyjnej w dobie konwergencji mediów. Szczególnie ważną rolę to specyficzne narzędzie komunikacyjne może odegrać w działaniach public relations uczelni: jako narzędzie za pomocą którego można najpełniej realizować funkcje uczelni i te, które realizuje najwyższy poziom rozwoju PR - w komunikacji dwukierunkowej symetrycznej zgodnie z modelem...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Open Strategy for Digital Business. Managing in ICT-Driven Environments

    Publication

    - Year 2024

    This book offers the reader a novel perspective on how digital contexts and open strategy approaches – the act of opening up strategic initiatives beyond company managers to involve front-line employees, stakeholders, and entrepreneurs – are related. Going beyond the claim that digital media drives open strategy by containing a detailed analyses of the interrelations between the two, the authors examine how ICT have diffused globally...

    Full text to download in external service

  • Communication Networks in the Service of the Environmental Monitoring

    In the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...

  • RNDM 2016 Workshop and 2nd Meeting of COST CA15127-RECODIS: Highlights from the Resilience Week in Halmstad, Sweden

    Publication
    • M. Jonsson
    • J. Rak
    • D. Papadimitriou
    • A. Somani

    - IEEE COMMUNICATIONS MAGAZINE - Year 2017

    Leading network resilience researchers took part in the Resilience Week on Sept. 12-15, 2016 at Halmstad University, SE by Prof. Magnus Jonsson from the Centre for Research on Embedded Systems (CERES), Halmstad University, SE, and Prof. Jacek Rak from Gdansk University of Technology, PL. It included two major events: - The 2nd Meeting of COST CA15127–RECODIS Action (Resilient Communication Services Protecting End-user Applications...

    Full text to download in external service

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publication

    - TASK Quarterly - Year 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Full text available to download

  • Implementation of Hierarchical Control of Drinking Water Supply System

    Publication

    The paper presents the outline of the didactical project of a complex computer controlled system realized by the first degree students of the Automatics and Robotics on the Faculty of Electrical and Control Engineering (FoEaCE) in Gdansk University of Technology (GUT). The synthesis, implementation and analysis of a multilayer hierarchical control system for drinking water supply system (DWSS) are main topics of that project. The...

    Full text to download in external service

  • Elektroniczne instrumenty komunikacji marketingowej w marketingu usług medycznych

    Nie ma wątpliwości, że wielu polskich świadczeniodawców usług zdrowotnych korzysta z Internetu do komunikowania się z pacjentami. Jednocześnie chcą oni stworzyć wizerunek marki jako bardziej nowoczesnej i atrakcyjnej. Elektroniczna komunikacja marketingowa (szczególnie serwisy informacyjne, serwisy społecznościowe, blogi, fora, microblogi, wyszukiwarki, marketing mobilny) ma coraz większe znaczenie w marketingu usług medycznych,...

    Full text available to download

  • The Conception of Decision-Making Support System for ComplexEnergetic System on Example of Ship Propulsion System

    Publication

    In paper, the conception of decision-making support system for complex energetic system on example of ship propulsion system has been presented. Diversity of conditions, information overload and very often contradiction of decision-making criteria and time constraints result in difficulties in making right (rational) decision without using more or less expanded information processing systems (eg. database systems, expert systems,...

    Full text available to download

  • Towards Resource Theory of Coherence in Distributed Scenarios

    Publication

    - Physical Review X - Year 2017

    The search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....

    Full text available to download

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Full text available to download

  • The role of governance to support smart community development: a systematic literature review

    Publication

    - Year 2024

    This paper studies the interaction between the smart community and smart governance concepts to elaborate on the role of governance to support local governments in developing smart communities’ strategies and solutions. We perform a systematic literature review to analyse how the concept of smart community has advanced in terms of its definitions, context, benefits, challenges, and enablers and propose a unified term with a focus...

    Full text available to download

  • Critical perspectives on media architecture: is it still possible to design projects without negatively affecting urban nighttime environments and will the future remain dynamic, bright and multi-colored?

    Publication

    Nowadays, due to advances in electrical devices, new digital media, lighting, information and communication technologies, cities are being used 24/7. The paper discusses critical aspects of Media Architecture in the context of public spaces as well as urban nighttime environments from the perspective of a practising lighting architect. The author examines recent issues of negative design approaches and presents proposals for improving...

    Full text to download in external service

  • Ariel Dzwonkowski dr inż.

  • Is Digitalization Improving Governance Quality? Correlating Analog and Digital Benchmarks

    Publication

    The digitalization of public governance and the resulting concept of electronic governance is a characteristic feature of contemporary information society. Both can be defined as the process and outcome of digital transformation: transformation of the “analog” version of governance into “digital” governance. Measuring both versions of governance against typical performance measures of efficiency, effectiveness, equity, openness...

    Full text available to download

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Symbiosis of Art and Technology – From Renaissance to Interactive Art,

    Publication

    The article presents the mutual relations between art and technology from the Renaissance to the interactive art of today. It indicates important factors influencing the possibilities of imaging and interpreting reality by artists, ranging from the development of oil painting techniques, linear perspective, the invention of printing and photography, to achievements related to the development of information technologies (computers,...

    Full text to download in external service

  • Decisional DNA and Optimization Problem

    Publication

    - Year 2013

    Many researchers have proved that Decisional DNA (DDNA) and Set of Experience Knowledge Structure (SOEKS or SOE) is a technology capable of gathering information and converting it into knowledge to help decision-makers to make precise decisions in many ways. These techniques have a feature to combine with different tools, such as data mining techniques and web crawlers, helping organization collect information from different sources...

  • Wirtualne sieci 5G, NGN i następne. Radioinformatyczna metamorfoza sieci komórkowych

    Przedstawiono problematykę ewolucyjnej, a w zasadzie rewolucyjnej, metamorfozy komórkowych systemów radiokomunikacyjnych w kontekście architektury sieci 5G, zasad jej działania oraz nowych możliwości implementacyjnych usług sieci NGN. Artykuł dotyczy w szczególności istoty działania sieci 5G, łączącej w sobie cechy sieci radiokomunikacyjnych poprzednich generacji, zwłaszcza 4G, oraz nowe właściwości charakterystyczne dla 5G. Dotyczą...

    Full text to download in external service

  • Freelance technical writing application for a job which I did not get.

    Publication

    - Year 2019

    In this essay I am going to explore the different ways in which developments in engineering technology and materials science have improved the quality of learning and at the same time somewhat diminished students innate intellectual ability which came as the result of what we know as A.I.   According to wikipedia.org the word "education" comes from the conjunction of a Latin words "I lead" or "duco" meaning "I...

  • Political Parties in the Digital World

    Publication

    - Year 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • Wojciech Gumiński dr inż.

    Wojciech Gumiński received his M.Sc. ad Ph.D. degrees from Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Poland in 1991 and 2003 respectively. His scientific and research interest include computer network architectures, communication protocols and digital signal processing. Hi participated as principal investigator in several projects including Future Internet Engineering, PL-LAB...

  • Analyzing and Visualizing Government-Citizen Interactions on Twitter to Support Public Policy-making

    Publication

    - Digital Government: Research and Practice - Year 2020

    Twitter is widely adopted by governments to communicate with citizens. It has become a major source of data for analyzing how governments communicate with citizens and how citizens respond to such communication, uncovering important insights about government-citizen interactions that could be used to support public policy-making. This article presents research that aims at developing a software tool called Twitter Analytics for...

    Full text available to download

  • Text Mining Algorithms for Extracting Brand Knowledge; The fashion Industry Case

    Publication

    - Year 2018

    Brand knowledge is determined by customer knowledge. The opportunity to develop brands based on customer knowledge management has never been greater. Social media as a set of leading communication platforms enable peer to peer interplays between customers and brands. A large stream of such interactions is a great source of information which, when thoroughly analyzed, can become a source of innovation and lead to competitive advantage....

    Full text available to download

  • Overcoming Challenges of Virtual Scrum Teams: Lessons Learned Through an Action Research Study

    Publication

    - Year 2023

    After the COVID-19 breakout, agile teams found themselves in situations that “pure agilists” and textbooks on agile methods had preferred to ignore. Whereas agile mindsets helped them to quickly shift to remote work, mere virtualization of agile practices often proved insufficient, and several challenges emerged. This paper reports on an Action Research project carried out in Lufthansa Systems Poland with the aim of (1) revisiting...

    Full text to download in external service

  • Cognitive engineering and functional safety technology for reducing risks in hazardous plants

    Cognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...

    Full text to download in external service

  • COOPERATION BETWEEN UNIVERSITY AND EXTERNAL COMPANY IN ARCHITECTURAL INVENTORY USING INNOVATIVE MEASURING TECHNOLOGY

    Publication

    - Year 2017

    Architectural inventories are the main field for using innovative technology ( remote sensing). The main purpose of using ie. Laser scanning or photogrammetry is to capture all of the important details of structure. Regarding the extents of inventory works, it may only apply to external details, such as facades, supporting structures and surroundings, whilst in terms of advanced inventory, the building's interior is also expected...

    Full text available to download

  • Bio-inspired Decisional DNA in Machinas and other Man-made Systems: The Way Forward

    Publication

    - Year 2014

    Artificial bio-inspired intelligent techniques and systems supporting smart, knowledge-based solutions of real world problems which are currently researched very extensively by research teams around the world, have enormous potential to enhance automation of decision making and problem solving for a number of diverse areas including design, manufacturing, Information Technology (IT), social communities of practice, and economics...

  • IoT for healthcare applications

    Publication
    • K. Sayrafian
    • S. J. Ambroziak
    • D. Bajic
    • L. Berbakov
    • L. M. Correia
    • K. Cwalina
    • C. Garcia-pardo
    • G. Gardašević
    • K. Katzis
    • P. Kulakowski
    • K. Turbic

    - Year 2021

    This chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...

    Full text available to download