Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS

Filtry

wszystkich: 2708
wybranych: 2038

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS

  • Communication Networks in the Service of the Environmental Monitoring

    In the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multisensor System for the Protection of Critical Infrastructure of Seaport

    Publikacja
    • M. Kastek
    • R. Dulski
    • M. Życzkowski
    • M. Szustakowski
    • P. Trzaskawka
    • W. Ciurapiński
    • P. Markowski
    • M. Karol
    • G. Grelowska
    • I. Gloza... i 2 innych

    - Rok 2013

    There are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...

  • A survey of strategies for communication networks to protect against large-scale natural disasters

    Publikacja
    • T. Gomes
    • J. Tapolcai
    • C. Esposito
    • D. Hutchison
    • F. Kuipers
    • J. Rak
    • D. Amaro
    • A. Iossifides
    • R. Travanca
    • J. Andre... i 8 innych

    - Rok 2016

    Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks

    Deep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...

    Pełny tekst do pobrania w portalu

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities

    Publikacja
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Rok 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Pełny tekst do pobrania w portalu

  • Cost minimization in wireless networks with a bounded and unbounded number of interfaces

    Publikacja

    - NETWORKS - Rok 2009

    Praca dotyczy problemu minimalizacji energii poprzez selektywne odłączanie urządzeń komunikacyjnych w wielointerfejsowych sieciach bezprzewodowych w taki sposób, by zapewnić realizację wymaganego grafu połączeń. Sformułowano problem optymalizacyjny, podano wyniki dotyczące jego trudności i zaproponowano algorytmy optymalizacyjne. Rozważono zarówno wariant, w którym liczba interfejsów komunikacyjnych jest parametrem stałym (narzuconym...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance analysis of mobility protocols and handover algorithms for IP-based networks

    Publikacja

    A rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...

  • Availability of UAV Fleet Evaluation Based on Multi-State System

    Publikacja
    • E. Zaitseva
    • V. Levashenko
    • V. Mysko
    • S. Czapp
    • D. Zhaxybayev

    - IEEE Access - Rok 2024

    Unmanned Aerial Vehicle (UAV) applications are extended extremely. Some applications need to use several UAVs for a general mission which can be considered a UAV fleet. One of the important characteristics for the evaluation of a UAV or UAV fleet is reliability. There are studies in which methods for analysis of their reliability are considered. Reliability analysis of UAV fleets is less frequently studied, although a single UAV...

    Pełny tekst do pobrania w portalu

  • Museum Institutions in Monuments - Positive and Negative Aspects of Adaptation: The New Amber Museum and Museum of Science in Gdansk, Poland

    The issue of the creation and location of new museums is a current topic. The decision of where and how to create new museum facilities will impact successful function in the future. Museums are either located in newly designed buildings or in existing buildings. In general, existing buildings adapted for museum use are either formally under conservational protection or not. With regard to museum location in preserved monuments,...

    Pełny tekst do pobrania w portalu

  • Open-source software (OSS) and hardware (OSH) in UAVs

    Publikacja

    - Rok 2020

    The popularity of the Open Source Tool (OST) has expanded significantly. This is the case for Unmanned Aerial Vehicles (UAVs) based on open-source hardware (OSH) as well. Open-source software (OSS) and OSH can be applied in a wide range of applications and can improve several technologies. The chapter begins with an introduction to OSS depicting its rationale, description of fundamental differences between OSS and proprietary software...

    Pełny tekst do pobrania w portalu

  • The culture of excellence and its dimensions in higher education

    Publikacja

    - The TQM Journal - Rok 2024

    Purpose To recognize the existing state of knowledge on a culture of excellence (CoE) in higher education institutions (HEIs) and to define the CoE in HEI and the dimensions that make up that culture. A subsidiary goal is to propose a qualitative tool to measure CoE maturity. Design/methodology/approach The study was based on the qualitative method, the preferred reporting system of systematic reviews and meta-analysis (PRISMA)....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Knowledge Management Critical Success Factors and the Innovativeness of KIBS Companies

    The purpose of this paper is to examine the influence of two critical success factors for knowledge management (i.e. leadership and support by the management, motivational practices) on the innovativeness of knowledge-intensive business service (KIBS) companies in the SMEs sector. A sample of 400 companies (KIBS SMEs) located in the Pomeranian District in Poland was selected. The questionnaire was designed to measure knowledge...

    Pełny tekst do pobrania w portalu

  • Overview of Scalability and Reliability Problem in SDN Networks

    In the paper an overview of scalability and reliability in the SDN (Software Defined Networks) networks has been presented. Problems and limitations for guaranteeing scalability and reliability in SDN networks have been indicated. Known methods for assuring scalability and reliability in SDN networks have been described. Projects from research communities for resolving issues with scalability and reliability in SDN networks have...

  • The reliability of tree and star networks

    This paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Protection in elastic optical networks

    Publikacja
    • R. Goścień
    • K. Walkowiak
    • M. Klinkowski
    • J. Rak

    - IEEE NETWORK - Rok 2015

    In this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publikacja

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Pełny tekst do pobrania w portalu

  • The effect of a belt position in the spindle driving system on critical rotational speeds

    Publikacja

    The aim of this paper was to examine how the belt pulley position affects critical rotational speeds of the modernized spindle of the sliding table saw Fx3. Methodology of determination of critical rotational speeds of the spindle in a function of the spindle design features and its driving system is presented. Spindles in these kind of machine tools are mainly driven with V-belts, and the pulleys on the spindles might be positioned:...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths

    Publikacja

    - WIRELESS NETWORKS - Rok 2009

    Rozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An efficient approach to optimization of semi‐stable routing in multicommodity flow networks

    Publikacja

    - NETWORKS - Rok 2021

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rearrangeability in multicast Clos networks is NP-complete

    Publikacja

    Przestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform

    Publikacja

    - Demonstratio Mathematica - Rok 2014

    Birth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...

    Pełny tekst do pobrania w portalu

  • Hydrological signals in polar motion excitation – Evidence after fifteen years of the GRACE mission

    Publikacja
    • J. Nastula
    • M. Wińska
    • J. Śliwińska
    • D. Salstein

    - JOURNAL OF GEODYNAMICS - Rok 2019

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Cooperative Data Transmission in Wireless Vehicular Networks

    Publikacja

    - Rok 2017

    The paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.

  • Sensitivity analysis of critical forces of trusses with side bracing

    The present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publikacja
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Rok 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Topology recognition and leader election in colored networks

    Publikacja

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Pełny tekst do pobrania w portalu

  • CRVG - a new model for wireless networks topology generation

    Publikacja

    This paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.

  • Modeling the Influence of Salts on the Critical Micelle Concentration of Ionic Surfactants

    Publikacja

    We show for the first time that a phenomenological, augmented volume-based thermodynamics (aVBT) model is capable to predict the critical micelle concentrations of ionic surfactants, including ionic liquids, with added salts. The model also adjusts for the type of salt added by including its molecular volume, which might form a connection to the Hofmeister effect. The other physico-chemically relevant quantities included in the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publikacja

    - Rok 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w portalu

  • Integrated safety and security analysis of hazardous plants and systems of critical infrastructure

    This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Regulatory approach to competition law in the practice of the Polish Competition Authority – critical assessment

    Publikacja

    - Rok 2015

    The text provides a critical analysis of the Polish practice of using competition law provisions as regulation provisions

  • Systems of Public Higher Education in Poland and Germany. Evidence from Institution Level Data

    Publikacja

    The chapter presents a comparative analysis of public higher education systems (HES) in Germany and Poland. Instead of limiting our study to macro indicators such as gross expenditure on higher education or R&D as per cent of GDP, we draw on the evidence based on micro data especially collected for this study and concerning individual higher education institutions (HEIs). Comparative analysis is based on a sample of 71 public...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Whither the need and motivation for open government data (OGD) promotional strategies?

    Publikacja
    • C. H. Alexopoulos
    • S. Saxena
    • M. Janssen
    • N. Rizun

    - Digital Policy Regulation and Governance - Rok 2023

    Purpose It has been underscored in the extant literature that open government data (OGD) has not percolated across the length and breadth of any country, let alone the awareness of the OGD among the stakeholders themselves. In this vein, this study aims to underline the reasons as to why OGD promotion merits consideration apart from underlining the manner in which OGD promotion may be done. Design/methodology/approach Based on...

    Pełny tekst do pobrania w portalu

  • Integrated approach for functional safety and cyber security management in maritime critical infrastructures

    The work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...

    Pełny tekst do pobrania w portalu

  • The networking of the justice system as part of public court networks

    Publikacja

    - Rok 2015

    The goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...

  • Statistical significance of displacements in heterogeneous control networks

    Publikacja

    - Geodesy and Cartography - Rok 2013

    This paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...

    Pełny tekst do pobrania w portalu

  • Trust Management Method for Wireless Sensor Networks

    Publikacja

    - Rok 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Pełny tekst do pobrania w portalu

  • Method of selecting programming practices for the safety-critical software development projects

    Publikacja

    - Rok 2019

    In recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...

    Pełny tekst do pobrania w portalu

  • Application of wavelength division multiplexing in sensor networks

    Publikacja

    - Rok 2012

    Over the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...

  • Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures

    This article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...

    Pełny tekst do pobrania w portalu

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Introducing agile practices into development processes of safety critical software

    Publikacja

    In this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...

    Pełny tekst do pobrania w portalu

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publikacja

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Pełny tekst do pobrania w portalu

  • The impact of institutions on innovation networks: empirical evidence from Poland

    Publikacja

    - Technological and Economic Development of Economy - Rok 2022

    Innovation networks may accelerate and improve the innovation process, while institutional pathologies may hamper it. This study employs the Kruskal-Wallis H test and regression analysis to determine if the relationship between institutions and innovation networks does exist among the investigated variables. The purpose of the study was to find out whether cooperation with special local institutions influences the innovative behaviour...

    Pełny tekst do pobrania w portalu

  • Traffic Modeling in IMS-based NGN Networks

    In the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Pełny tekst do pobrania w portalu