Search results for: computer networks - Bridge of Knowledge

Search

Search results for: computer networks

Search results for: computer networks

  • Industrial computer networks and functional safety

    Publication

    W rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.

  • Journal of Computer Networks and Communications

    Journals

    ISSN: 2090-7141 , eISSN: 2090-715X

  • Computer Networks

    Journals

    ISSN: 1389-1286 , eISSN: 1872-7069

  • International Journal of Computer Networks and Applications

    Journals

    eISSN: 2395-0455

  • Computer Networks-laboratories - 2023

    e-Learning Courses
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Computer Networks laboratories 2024

    e-Learning Courses
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Computer Networks EN 2022

    e-Learning Courses
    • J. Woźniak
    • J. Grochowski
    • K. Gierłowski

    The student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.

  • Computer Networks EN 2023

    e-Learning Courses
    • M. Hoeft
    • J. Woźniak
    • J. Grochowski
    • K. Gierłowski

    The student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.

  • Computer Networks - lectures 2024/2025

    e-Learning Courses
    • M. Hoeft
    • A. Tomaszewski
    • J. Grochowski
    • K. Gierłowski

    Student uczy się: jak mówić o sieciach komputerowych - poznaje podstawowe pojęcia (np. protokół komunikacyjny), ich znaczenie i związki; jak sieci komuterowe są zbudowane i wykorzystywne - uczy się podstaw działania sieci (np. komutacja pakietów) i architektury sieci (np. płaszczyzny sieci) oraz poznaje podstawowe technologie sieciowe (np. protokół IP); jak sieci komputerowe ewoluują - poznaje historię rozwoju sieci, ewolucję wymagań,...

  • International Journal of Computer Networks & Communications (IJCNC)

    Journals

    ISSN: 0975-2293

  • Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs

    Publication

    A rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...

    Full text available to download

  • Knowledge management in the IPv6 migration process

    There are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most obvious. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed an application that supports the migration process. Its main purpose is to help less experienced network administrators to facilitate the migration process with a particular target...

    Full text available to download

  • IEEE Conference on Local Computer Networks

    Conferences

  • Conference on Software in Telecommunications and Computer Networks

    Conferences

  • International Science Conference on Computer Networks

    Conferences

  • International Conference on Computer Communication and Networks [IC3N]

    Conferences

  • Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks

    Publication
    • A. Ijjeh
    • A. Ijjeh
    • H. Al-Issa
    • S. Thuneibat

    - International Journal of Computer Networks & Communications (IJCNC) - Year 2015

    Full text to download in external service

  • Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...

    Full text available to download

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Józef Woźniak prof. dr hab. inż.

    People

    Professor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...

  • Distributed protection against non-cooperative node behavior in multi-hop wireless networks

    Publication

    An important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...

  • Deep learning approach on surface EEG based Brain Computer Interface

    Publication

    - Year 2022

    In this work we analysed the application of con-volutional neural networks in motor imagery classification for the Brain Computer Interface (BCI) purposes. To increase the accuracy of classification we proposed the solution that combines the Common Spatial Pattern (CSP) with convolutional network (ConvNet). The electroencephalography (EEG) is one of the modalities we try to use for controlling the prosthetic arm. Therefor in this...

    Full text to download in external service

  • A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks

    In the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...

  • A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks

    In the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...

    Full text available to download

  • Clothes Detection and Classification Using Convolutional Neural Networks

    Publication

    In this paper we describe development of a computer vision system for accurate detection and classification of clothes for e-commerce images. We present a set of experiments on well established architectures of convolutional neural networks, including Residual networks, SqueezeNet and Single Shot MultiBox Detector (SSD). The clothes detection network was trained and tested on DeepFashion dataset, which contains box annotations...

    Full text to download in external service

  • The reliability of any-hop star networks with respect to failures of communication nodes.

    Publication

    - Year 2009

    This paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...

  • Assessment of Therapeutic Progress After Acquired Brain Injury Employing Electroencephalography and Autoencoder Neural Networks

    Publication

    A method developed for parametrization of EEG signals gathered from participants with acquired brain injuries is shown. Signals were recorded during therapeutic session consisting of a series of computer assisted exercises. Data acquisition was performed in a neurorehabilitation center located in Poland. The presented method may be used for comparing the performance of subjects with acquired brain injuries (ABI) who are involved...

    Full text to download in external service

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publication
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Year 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Full text to download in external service

  • Piotr Szczuko dr hab. inż.

    Piotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...

  • Deep Learning Basics 2023/24

    e-Learning Courses
    • K. Draszawka

    A course about the basics of deep learning intended for students of Computer Science. It includes an introduction to supervised machine learning, the architecture of basic artificial neural networks and their training algorithms, as well as more advanced architectures (convolutional networks, recurrent networks, transformers) and regularization and optimization techniques.

  • From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition

    Publication

    Recently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...

    Full text available to download

  • A review on computer‐aided chemogenomics and drug repositioning for rational COVID ‐19 drug discovery

    Publication
    • S. Maghsoudi
    • B. Taghavi Shahraki
    • F. Rameh
    • M. Nazarabi
    • Y. Fatahi
    • O. Akhavan
    • M. Rabiee
    • E. Mostafavi
    • E. C. Lima
    • M. Saeb
    • N. Rabiee

    - Chemical Biology & Drug Design - Year 2022

    Application of materials capable of energy harvesting to increase the efficiency and environmental adaptability is sometimes reflected in the ability of discovery of some traces in an environment―either experimentally or computationally―to enlarge practical application window. The emergence of computational methods, particularly computer-aided drug discovery (CADD), provides ample opportunities for the rapid discovery and development...

    Full text available to download

  • Computer-assisted pronunciation training—Speech synthesis is almost all you need

    Publication

    - SPEECH COMMUNICATION - Year 2022

    The research community has long studied computer-assisted pronunciation training (CAPT) methods in non-native speech. Researchers focused on studying various model architectures, such as Bayesian networks and deep learning methods, as well as on the analysis of different representations of the speech signal. Despite significant progress in recent years, existing CAPT methods are not able to detect pronunciation errors with high...

    Full text available to download

  • Paweł Czarnul dr hab. inż.

    Paweł Czarnul obtained a D.Sc. degree in computer science in 2015, a Ph.D. in computer science granted by a council at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology in 2003. His research interests include:parallel and distributed processing including clusters, accelerators, coprocessors; distributed information systems; architectures of distributed systems; programming mobile devices....

  • Towards neural knowledge DNA

    Publication

    - JOURNAL OF INTELLIGENT & FUZZY SYSTEMS - Year 2017

    In this paper, we propose the Neural Knowledge DNA, a framework that tailors the ideas underlying the success of neural networks to the scope of knowledge representation. Knowledge representation is a fundamental field that dedicates to representing information about the world in a form that computer systems can utilize to solve complex tasks. The proposed Neural Knowledge DNA is designed to support discovering, storing, reusing,...

    Full text available to download

  • More Just Measure of Fairness for Sharing Network Resources

    Publication

    - Year 2016

    A more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...

    Full text to download in external service

  • Radio Simulcasting at a Glance: a New Look at Broadcasting and Streaming Services

    Publication

    - Year 2018

    Radio is by far one of the most popular and accessible medium. With its availability it attracts listeners all around the world. There are numerous ways of delivering content to consumers. The present situation is characterized by the convergence of acoustics, computer science and telecommunications. This paper reviews the current status of radio broadcasting and streaming services. It describes a subjective study concerning different...

    Full text to download in external service

  • Diagnosis of damages in family buildings using neural networks

    Publication

    The article concerns a problem of damages in family buildings, which result from traffic-induced vibrations. These vibrations arise from various causes and their size is influenced by many factors. The most important is the type of a road, type and weight of vehicles that run on the road, type and condition of the road surface, the distance from the house to the source of vibrations and many others which should be taken into account....

  • Minimising the Churn Out of the Service by Using a Fairness Mechanism

    Publication

    The paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...

    Full text to download in external service

  • Combining Road Network Data from OpenStreetMap with an Authoritative Database

    Computer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...

    Full text available to download

  • Machine Learning Algorithm-Based Tool and Digital Framework for Substituting Daylight Simulations In Early- Stage Architectural Design Evaluation

    Publication

    The aim of this paper is to examine the new method of obtaining the simulation-based results using backpropagation of errors artificial neural networks. The primary motivation to conduct the research was to determine an alternative, more efficient and less timeconsuming method which would serve to achieve the results of daylight simulations. Three daylight metrics: Daylight Factor, Daylight Autonomy and Daylight Glare Probability have...

  • Artificial intelligence support for disease detection in wireless capsule endoscopy images of human large bowel

    Publication

    - Year 2011

    In the work the chosen algorithms of disease recognition in endoscopy images were described and compared for theirs efficiency. The algorithms were estimated with regard to utility for application in computer system's support for digestive system's diagnostics. Estimations were achieved in an advanced testing environment, which was built with use of the large collection of endoscopy movies received from Medical University in Gdańsk....

  • New trends in development of micro heat exchangers for ORC's

    Publication

    - Year 2014

    In the paper, new trends in development of micro heat exchangers for CHP are presented. Main attention is concentrated on the question, how channels size and thermal development lenght affect the heat transfer. New types of micro heat exchangers developed at the Institute of Fluid-Flow Machinery PAS and the methoda of their design are presented. The new experimental testing methods of the micro-channel heat exchangers, new algorithms...

  • Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks

    Publication

    Rendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...

    Full text available to download

  • The searchlight problem for road networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the problem of searching for a mobile intruder hiding in a road network given as the union of two or more lines, or two or more line segments, in the plane. Some of the intersections of the road network are occupied by stationary guards equipped with a number of searchlights, each of which can emit a single ray of light in any direction along the lines (or line segments) it is on. The goal is to detect the intruder,...

    Full text available to download

  • Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions

    Publication

    - Year 2018

    With the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...

    Full text to download in external service

  • Sztuczne sieci neuronowe oraz metoda wektorów wspierających w bankowych systemach informatycznych

    W artykule zaprezentowano wybrane metod sztucznej inteligencji do zwiększania efektywności bankowych systemów informatycznych. Wykorzystanie metody wektorów wspierających czy sztucznych sieci neuronowych w połączeniu z nowoczesną technologią mikroprocesorową umożliwia znaczący wzrost konkurencyjności banku poprzez dodanie nowych funkcjonalności. W rezultacie możliwe jest także złagodzenie skutków kryzysu finansowego.

    Full text available to download