Filters
total: 274
filtered: 241
Search results for: MALWARE TAXONOMY
-
Performance/energy aware optimization of parallel applications on GPUs under power capping
PublicationIn the paper we present an approach and results from application of the modern power capping mechanism available for NVIDIA GPUs to the bench- marks such as NAS Parallel Benchmarks BT, SP and LU as well as cublasgemm- benchmark which are widely used for assessment of high performance computing systems’ performance. Specifically, depending on the benchmarks, various power cap configurations are best for desired trade-off of performance...
-
Multi-domain and Context-Aware Recommendations Using Contextual Ontological User Profile
PublicationRecommender Systems (RS) became popular tools in many Web services like Netflix, Amazon, or YouTube, because they help a~user to avoid an information overload problem. One of the types of RS are Context-Aware RS (CARS) which exploit contextual information to provide more adequate recommendations. Cross-Domain RS (CDRS) were created as a response to the data sparsity problem which occurs when only few users can provide reviews or...
-
Energy-Aware High-Performance Computing: Survey of State-of-the-Art Tools, Techniques, and Environments
PublicationThe paper presents state of the art of energy-aware high-performance computing (HPC), in particular identification and classification of approaches by system and device types, optimization metrics, and energy/power control methods. System types include single device, clusters, grids, and clouds while considered device types include CPUs, GPUs, multiprocessor, and hybrid systems. Optimization goals include various combinations of...
-
1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type
PublicationA network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....
-
Rapid tolerance‐aware design of miniaturized microwave passives by means of confined‐domain surrogates
PublicationThe effects of uncertainties, primarily manufacturing tolerances but also incomplete information about operating conditions or material parameters, can be detrimental to the performance of microwave components. Quantification of such effects is essential to ensure a meaningful evaluation of the structure, in particular, its reliability under imperfect fabrication procedures. The improvement of the circuit robustness can be achieved...
-
Tolerance-Aware Multi-Objective Optimization of Antennas by Means of Feature-Based Regression Surrogates
PublicationAssessing the immunity of antenna design to fabrication tolerances is an important consideration, especially when the manufacturing process has not been predetermined. At the same time, the antenna parameter tuning should be oriented toward improving the performance figures pertinent to both electrical (e.g., input matching) and field properties (e.g., axial ratio bandwidth) as much as possible. Identification of available trade-offs...
-
Tolerance-Aware Optimization of Microwave Circuits by Means of Principal Directions and Domain-Restricted Metamodels
PublicationPractical microwave design is most often carried out in the nominal sense. Yet, in some cases, performance degradation due to uncertainties may lead to the system failing to meet the prescribed specifications. Reliable uncertainty quantification (UQ) is therefore important yet intricate from numerical standpoint, especially when the circuit at hand is to be evaluated using electromagnetic (EM) simulation tools. Tolerance-aware...
-
Nowe podejście do gwarancji QoS w sieciach IP - Flow Aware Networking (FAN)
PublicationArtykuł przedstawia nowy sposób gwarantowania jakości w sieciach IP zaproponowany przez dział R&D France Telecom. W oparciu o istotne cechy ruchu internetowego opisane zostały problemy napotykane przez dotychczasowe architektury QoS. Przybliżono założenia FAN oraz przykład praktycznej implementacji - ruter Cross-protect. FAN realizuje gwarancje QoS poprzez sterowanie przyjęciem do obsługi oparte o przepływy i pomiary ruchu na...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
A multithreaded CUDA and OpenMP based power‐aware programming framework for multi‐node GPU systems
PublicationIn the paper, we have proposed a framework that allows programming a parallel application for a multi-node system, with one or more GPUs per node, using an OpenMP+extended CUDA API. OpenMP is used for launching threads responsible for management of particular GPUs and extended CUDA calls allow to manage CUDA objects, data and launch kernels. The framework hides inter-node MPI communication from the programmer who can benefit from...
-
Orientation-aware ship detection via a rotation feature decoupling supported deep learning approach
PublicationShip imaging position plays an important role in visual navigation, and thus significant focuses have been paid to accurately extract ship imaging positions in maritime videos. Previous studies are mainly conducted in the horizontal ship detection manner from maritime image sequences. This can lead to unsatisfied ship detection performance due to that some background pixels maybe wrongly identified as ship contours. To address...
-
Performance and Energy Aware Training of a Deep Neural Network in a Multi-GPU Environment with Power Capping
PublicationIn this paper we demonstrate that it is possible to obtain considerable improvement of performance and energy aware metrics for training of deep neural networks using a modern parallel multi-GPU system, by enforcing selected, non-default power caps on the GPUs. We measure the power and energy consumption of the whole node using a professional, certified hardware power meter. For a high performance workstation with 8 GPUs, we were...
-
Analysis of Learning Outcomes in Medical Education with the Use of Fuzzy Logic
PublicationThe national curricula of the EU member states are structured around learning outcomes, selected according to Bloom’s Taxonomy. The authors of this paper claim that using Bloom’s Taxonomy to phrase learning outcomes in medical education in terms of students’ achievements is difficult and unclear. This paper presents an efficient method of assessing course learning outcomes using Fuzzy Logic.
-
Fast tolerance-aware design optimization of miniaturized microstrip couplers using variable-fidelity EM simulations and re-sponse features
PublicationManufacturing tolerances and other types of uncertainties may considerably affect operation and performance of microwave components and systems. Quantification of these effects is therefore an important part of the design process. It is even more important to obtain designs whose sensitivity to parameter deviations is reduced as much as possible. All of these require statistical analysis carried out at the level of electromagnetic...
-
Umysł kontra umysł - zagrożenia i metody walki ze złośliwym oprogramowaniem
PublicationZaprezentowano aktualny stan wiedzy na temat malware – złośliwego oprogramowania. Na początku przedstawiane są definicje malware oraz motywacja osób rozwijających takie oprogramowanie, a następnie klasyfikacja malware. W dalszej części referatu zaprezentowano autorski, możliwie kompletny, cykl życia złośliwego oprogramowania. Kolejny fragment poświęcony jest technikom, jakie stosują twórcy złośliwego oprogramowania w celu utrudnienia...
-
Wielokryterialna analiza porównawcza lokalizacji źródeł wytwórczych energii elektrycznej
PublicationArtykuł przedstawia ranking lokalizacji czterech źródeł wytwórczych energii elektrycznej: biogazowni rolniczej, biogazowni utylizacyjnej oraz dwóch elektrowni fotowoltaicznych, wykonany przy użyciu połączonych metod Analitycznego Procesu Hierarchicznego (AHP) oraz taksonomii numerycznej. Omówiono zalety połączenia metod, przedstawiono przykład zastosowania oraz wskazano kryteria o największym i najmniejszym wpływie na realizację...
-
Mapping knowledge risks: towards a better understanding of knowledge management
PublicationThis conceptual paper aims to identify, present, and analyze potential knowledge risks organizations might face. With the growing complexity of organizational environments and the plethora of new knowledge risks emerging, this critical but under-researched field of knowledge management (KM) deserves closer attention. The study is based on a critical analysis of the extant literature devoted to knowledge risks, discusses potential...
-
Method of Decision-Making Logic Discovery in the Business Process Textual Data
PublicationGrowing amount of complexity and enterprise data creates a need for novel business process (BP) analysis methods to assess the process optimization opportunities. This paper proposes a method of BP analysis while extracting the knowledge about Decision-Making Logic (DML) in a form of taxonomy. In this taxonomy, researchers consider the routine, semi-cognitive and cognitive DML levels as functions of BP conceptual aspects of Resources,...
-
Social Convergence in Nordic NUTS-3 Regions
PublicationGeographical proximity, common historical roots and collaboration within the Nordic Council make the Nordic countries, often wrongly treated as monoliths. However, in reality, Nordic regions differ in terms of broadly defined social and economic development. Issues concerning the standard of living are one of the priorities of the Helsinki Treaty signed by Nordic countries. The main goal of this paper is to analyze the existence...
-
Machining process sequencing and machine assignment in generative feature-based CAPP for mill-turn parts
PublicationProcess selection and sequencing, as one of the most complex issues when evaluated from a mathematical point of view and crucial in CAPP, still attract research attention. For the current trend of intelligent manufacturing, machining features (MFs) are the information carriers for workpiece geometry and topology representation. They are basically derived from CAD models and are used by downstream engineering applications. A feature-based...
-
A Comprehensive Investigation of Knowledge Management Publications
PublicationRecent trends in knowledge management (KM) have increasingly indicated a lack of agreement, integration and classification between different KM domains. As such, experts are inadequately equipped when attempting to classify KM into their specific areas that could effectively contribute to a technocratic approach behind the organizational strategy. This paper illustrates a method of classifying KM publications by using a scheme...
-
Aiming at methods’ wider adoption: Applicability determinants and metrics
PublicationNumerous computer science methods and techniques have been proposed by the scientific community. However, depending on the domain, only their minor fraction has met wider adoption. This paper brings attention to the concept of applicability - the notion that is well acknowledged in the scientific field but have not been analysed with respect to determinants, metrics and systematisation. The primary objective of the study was to...
-
Where Did Knowledge Management Go?: A Comprehensive Survey
PublicationKnowledge Management (KM) research outputs have been expanding exponentially in the past years, generating diversified topics, which lack integration and classification. It has been challenging for experts to classify KM because of its versatile open fields, and in our view, it contributes to the technocratic approach remaining behind the organizational approach. This paper highlights a way to classify KM publications through a...
-
Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method
PublicationThe paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...
-
LABOUR SHARE IN THE DOMESTIC INCOME COMPARED TO DIFFERENT LABOUR MARKETS
PublicationThe purpose of this paper is to examine the changes in the share of labour in the domestic income in the years 1995-2010 in the Visegrád Group states, taking into account the level of development of the domestic labour markets. The study involves a review of the literature relating to the labour market issues, collecting sources and their use in the empirical part. The study used the induction method, the elements of descriptive...
-
Parallel tabu search for graph coloring problem
PublicationTabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Przewidywane kierunki rozwoju technologii utrzymania dróg szynowych z uwzględnieniem linii dużych prędkości. Materiały Ogólnopolskiej Konferencji Naukowo-Technicznej Nowoczesne Technologie i Systemy Usprawniające Zarządzanie w Transporcie Kolejowym.
PublicationOgraniczenie nakładów na utrzymanie przy jednoczesnym zapewnieniu wysokiej jakości drogi kolejowej wymaga minimalizowania ilości podbić realizowanych w ramach napraw interwencyjnych oraz doboru, odpowiednich do warunków Polskich Linii Kolejowych, maszyn torowych
-
Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?
PublicationPositive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...
-
Interdisciplinarity in Smart Sustainable City education: exploring educational offerings and competencies worldwide
PublicationMore and more higher education institutions are offering specialized study programs for current and future managers of Smart Sustainable Cities (SSCs). In the process, they try to reconcile the interdisciplinary nature of such studies, covering at least the technical and social aspects of SSC management, with their own traditionally discipline-based organization. However, there is little guidance on how such interdisciplinarity...
-
Zagrożenia bezpieczeństwa IT/OT
PublicationZłośliwe oprogramowanie, obok ataków rozproszonej odmowy świadczenia usług (ang. Distributed Denial of Servi-ce – DDoS), podszywania, SPAMu oraz ogólnie niechcianej komunikacji, stanowi aktualnie jedną z najważniejszych kwestii bezpieczeństwa. Sam termin (Malicious Software – Malware) określa zbiorczo między innymi wirusy, konie trojańskie i robaki komputerowe. Ostateczne rozwiązanie wspomnianych zagrożeń bezpieczeństwa wymaga...
-
Competitiveness of the Visegrad Countries - Paths for Competitiveness Growth
PublicationThe article includes two objectives: 1) to determine competitiveness of V4 countries in terms of 12 pillars of competitiveness used by The Global Competitiveness Report of the WEF, 2) to propose taxonomic method to appoint a path of competitiveness growth of economies.
-
Structure and the Biochemical Potential of the Bacterial Community in Wastewater Treatment Plant Effluent and in Receiving Waters: Northern Poland Case Study
PublicationWastewater treatment processes are monitored mainly in terms of biogenic substance removal efficiency. Little is known about the treated wastewater microbiome and its influence on the recipient. In this study, a wide range of methods (cultivation, microscopic analysis, New Generation Sequencing and Real Time PCR) were employed to determine the bacterial community composition of the treated wastewater and its receiver. Preliminary...
-
Bringing Common Sense to WordNet with a Word Game
PublicationWe present a tool for common sense knowledge acquisition in form of a twenty questions game. The described approach uses WordNet dictionary, which rich taxonomy allows to keep cognitive economy and accelerate knowledge propagation, although sometimes inferences made on hierarchical relations result in noise. We extend the dictionary with common sense assertions acquired during the games played with humans. The facts added to the...
-
The use of Markov chains in the social convergence analysis
PublicationThe main goal of this article is to analyze the social convergence process using Markov chains. In this research, term social convergence refers to the reduction of dispersion in the standard of living among countries. The use of Markov chains in the social convergence analysis allowed describing movements of observational units within the distribution and providing more details about the mechanism of the convergence process. A...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Decision-Making Models of the Human-Operator as an Element of the Socio-Technical Systems
PublicationThe authors of the chapter proved that the fundamental intellectual processes, which lie on the basis of decision-making behavior of the human-operator, could be identified on the bases on the analogies with the devices (elements). The basic intellectual processes of the Rational decision-making models can be adequately identified by the transient processes of the PID-controller; the intellectual processes of the Bounded Rationality...
-
Spatial differences in sustainable development components in Nordic regions
PublicationGeographical proximity, common historical roots and collaboration within the Nordic Council make the Nordic countries, often wrongly treated as monoliths. How ever, in reality, Nordic regions differ in terms of broadly defined socio - economic development. The aim of this study is to analyze the spatial differences in sustainable development components in Nordic NUTS - 3 regions in the period 2006 - 2014....
-
Structural Heterogeneity Between EU15 and 12 New EU Members – the Obstacle to Lisbon Strategy Implementation
PublicationThe aim of this article is to identify diversity between the EU-15 and the New Members in their implementation of the Lisbon Strategy in the period 2000-2010. By analyzing a set of structural indicators, we aim to fill a gap in the literature: a lack of publications providing complex evaluation of the implementation of the Lisbon Strategy using measurable indicators. Given their suitability for international comparisons, we use...
-
The Indication Methods and Techniques of Urban Light Pollution
PublicationThe goal of this study is to review and categorize approaches and methods of facing urban light pollution. Probing various references and documents, the current practice focus on extracting and reviewing different types of urban light pollution detection, survey, and measurement to define a taxonomy of methods by instant comparison. The means of measurement and detecting this pollution include 14 most cited techniques that have...
-
Mapping of the Covid-19 Vaccine Uptake Determinants From Mining Twitter Data
PublicationOpinion polls on vaccine uptake clearly show that Covid-19 vaccine hesitancy is increasing worldwide. Thus, reaching herd immunity not only depends on the efficacy of the vaccine itself, but also on overcoming this hesitancy of uptake in the population. In this study, we revealed the determinants regarding vaccination directly from people’s opinions on Twitter, based on the framework of the 6As taxonomy. Covid-19 vaccine acceptance...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
PublicationIn order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...
-
The experience of movement in the built form and space: A framework for movement evaluation in architecture
Publication“Movement in architecture” is an organized system of various types of movements stimulated by specific architectural elements. This research was conducted through a qualitative-analytical method and empirical and bibliographical research methods with the aim to categorize different types of movements based on the explorer and observer relationships with the built space and form. So far, most of the related studies have focused...
-
Digital divide - inequalities in level of implementation of new information and telecommunication technologies. Cross country study
PublicationTekst stanowi analizę nierówności stopnia wdrożenia oraz implementacji ICTs w różnych krajach świata. Autor szacuje wskaźnik GINI dla możliwych krajów świata.In the paper presented, the author considers few aspects of the so-called "digital divide". It is easily noticeable worldwide, that new information and communication technologies (ICTs) "possess" a great ability to spread, at high pace, among countries from all around the...
-
The experience of movement in the built form and space: A framework for movement evaluation in architecture
Publication“Movement in architecture” is an organized system of various types of movements stimulated by specific architectural elements. This research was conducted through a qualitative-analytical method and empirical and bibliographical research methods with the aim to categorize different types of movements based on the explorer and observer relationships with the built space and form. So far, most of the related studies have focused...
-
The Application of a Multi-Criteria Decision-Making for Indication of Directions of the Development of Renewable Energy Sources in the Context of Energy Policy
PublicationThis paper presents the application of multi-criteria decision-making (MCDM) for evaluating what technologies using renewable energy sources (RES) for electricity production have the chance to develop in Poland under the current socio-economic conditions. First, the Analytical Hierarchy Process (AHP) method was used to determine the weights of the optimization criteria. Five main criteria and 30 sub-criteria were identified. Next,...
-
Bacterial Community Structures in Freshwater Polar Environments of Svalbard
PublicationTwo thirds of Svalbard archipelago islands in the High Arctic are permanently covered with glacial ice and snow. Polar bacterial communities in the southern part of Svalbard were characterized using an amplicon sequencing approach. A total of 52,928 pyrosequencing reads were analyzed in order to reveal bacterial community structures in stream and lake surface water samples from the Fuglebekken and Revvatnet...
-
Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model
PublicationTries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...