Filtry
wszystkich: 2708
wybranych: 2038
-
Katalog
- Publikacje 2038 wyników po odfiltrowaniu
- Czasopisma 194 wyników po odfiltrowaniu
- Konferencje 63 wyników po odfiltrowaniu
- Osoby 81 wyników po odfiltrowaniu
- Projekty 4 wyników po odfiltrowaniu
- Kursy Online 43 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 282 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS
-
Communication Networks in the Service of the Environmental Monitoring
PublikacjaIn the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublikacjaThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublikacjaRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
Service-based Resilience for Embedded IoT Networks
PublikacjaEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublikacjaDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
PublikacjaFor several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...
-
Cost minimization in wireless networks with a bounded and unbounded number of interfaces
PublikacjaPraca dotyczy problemu minimalizacji energii poprzez selektywne odłączanie urządzeń komunikacyjnych w wielointerfejsowych sieciach bezprzewodowych w taki sposób, by zapewnić realizację wymaganego grafu połączeń. Sformułowano problem optymalizacyjny, podano wyniki dotyczące jego trudności i zaproponowano algorytmy optymalizacyjne. Rozważono zarówno wariant, w którym liczba interfejsów komunikacyjnych jest parametrem stałym (narzuconym...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublikacjaA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
Availability of UAV Fleet Evaluation Based on Multi-State System
PublikacjaUnmanned Aerial Vehicle (UAV) applications are extended extremely. Some applications need to use several UAVs for a general mission which can be considered a UAV fleet. One of the important characteristics for the evaluation of a UAV or UAV fleet is reliability. There are studies in which methods for analysis of their reliability are considered. Reliability analysis of UAV fleets is less frequently studied, although a single UAV...
-
Museum Institutions in Monuments - Positive and Negative Aspects of Adaptation: The New Amber Museum and Museum of Science in Gdansk, Poland
PublikacjaThe issue of the creation and location of new museums is a current topic. The decision of where and how to create new museum facilities will impact successful function in the future. Museums are either located in newly designed buildings or in existing buildings. In general, existing buildings adapted for museum use are either formally under conservational protection or not. With regard to museum location in preserved monuments,...
-
Open-source software (OSS) and hardware (OSH) in UAVs
PublikacjaThe popularity of the Open Source Tool (OST) has expanded significantly. This is the case for Unmanned Aerial Vehicles (UAVs) based on open-source hardware (OSH) as well. Open-source software (OSS) and OSH can be applied in a wide range of applications and can improve several technologies. The chapter begins with an introduction to OSS depicting its rationale, description of fundamental differences between OSS and proprietary software...
-
The culture of excellence and its dimensions in higher education
PublikacjaPurpose To recognize the existing state of knowledge on a culture of excellence (CoE) in higher education institutions (HEIs) and to define the CoE in HEI and the dimensions that make up that culture. A subsidiary goal is to propose a qualitative tool to measure CoE maturity. Design/methodology/approach The study was based on the qualitative method, the preferred reporting system of systematic reviews and meta-analysis (PRISMA)....
-
Knowledge Management Critical Success Factors and the Innovativeness of KIBS Companies
PublikacjaThe purpose of this paper is to examine the influence of two critical success factors for knowledge management (i.e. leadership and support by the management, motivational practices) on the innovativeness of knowledge-intensive business service (KIBS) companies in the SMEs sector. A sample of 400 companies (KIBS SMEs) located in the Pomeranian District in Poland was selected. The questionnaire was designed to measure knowledge...
-
Overview of Scalability and Reliability Problem in SDN Networks
PublikacjaIn the paper an overview of scalability and reliability in the SDN (Software Defined Networks) networks has been presented. Problems and limitations for guaranteeing scalability and reliability in SDN networks have been indicated. Known methods for assuring scalability and reliability in SDN networks have been described. Projects from research communities for resolving issues with scalability and reliability in SDN networks have...
-
The reliability of tree and star networks
PublikacjaThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
Protection in elastic optical networks
PublikacjaIn this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....
-
THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS
PublikacjaPurpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...
-
The effect of a belt position in the spindle driving system on critical rotational speeds
PublikacjaThe aim of this paper was to examine how the belt pulley position affects critical rotational speeds of the modernized spindle of the sliding table saw Fx3. Methodology of determination of critical rotational speeds of the spindle in a function of the spindle design features and its driving system is presented. Spindles in these kind of machine tools are mainly driven with V-belts, and the pulleys on the spindles might be positioned:...
-
Exploiting Multi-Interface Networks: Connectivity and Cheapest Paths
PublikacjaRozważano zagadnienie minimalizacji energii w sieciach bezprzewodowych bez infrastruktury, w których niektóre węzły są wyposażone w więcej, niż jeden interfejs. W przyjętym modelu sieci podano nowe algorytmy przybliżone oraz wyniki dotyczące złożoności obliczeniowej dla dwóch problemów: aktywacji najtańszej spójnej podsieci spinającej oraz aktywacji ścieżki pomiędzy ustaloną parą węzłów.
-
An efficient approach to optimization of semi‐stable routing in multicommodity flow networks
Publikacja -
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rearrangeability in multicast Clos networks is NP-complete
PublikacjaPrzestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...
-
Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform
PublikacjaBirth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...
-
Hydrological signals in polar motion excitation – Evidence after fifteen years of the GRACE mission
Publikacja -
Cooperative Data Transmission in Wireless Vehicular Networks
PublikacjaThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
Sensitivity analysis of critical forces of trusses with side bracing
PublikacjaThe present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublikacjaIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
CRVG - a new model for wireless networks topology generation
PublikacjaThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
Modeling the Influence of Salts on the Critical Micelle Concentration of Ionic Surfactants
PublikacjaWe show for the first time that a phenomenological, augmented volume-based thermodynamics (aVBT) model is capable to predict the critical micelle concentrations of ionic surfactants, including ionic liquids, with added salts. The model also adjusts for the type of salt added by including its molecular volume, which might form a connection to the Hofmeister effect. The other physico-chemically relevant quantities included in the...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Regulatory approach to competition law in the practice of the Polish Competition Authority – critical assessment
PublikacjaThe text provides a critical analysis of the Polish practice of using competition law provisions as regulation provisions
-
Systems of Public Higher Education in Poland and Germany. Evidence from Institution Level Data
PublikacjaThe chapter presents a comparative analysis of public higher education systems (HES) in Germany and Poland. Instead of limiting our study to macro indicators such as gross expenditure on higher education or R&D as per cent of GDP, we draw on the evidence based on micro data especially collected for this study and concerning individual higher education institutions (HEIs). Comparative analysis is based on a sample of 71 public...
-
Whither the need and motivation for open government data (OGD) promotional strategies?
PublikacjaPurpose It has been underscored in the extant literature that open government data (OGD) has not percolated across the length and breadth of any country, let alone the awareness of the OGD among the stakeholders themselves. In this vein, this study aims to underline the reasons as to why OGD promotion merits consideration apart from underlining the manner in which OGD promotion may be done. Design/methodology/approach Based on...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
The networking of the justice system as part of public court networks
PublikacjaThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
Statistical significance of displacements in heterogeneous control networks
PublikacjaThis paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Method of selecting programming practices for the safety-critical software development projects
PublikacjaIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
Application of wavelength division multiplexing in sensor networks
PublikacjaOver the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublikacjaThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Introducing agile practices into development processes of safety critical software
PublikacjaIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublikacjaAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
The impact of institutions on innovation networks: empirical evidence from Poland
PublikacjaInnovation networks may accelerate and improve the innovation process, while institutional pathologies may hamper it. This study employs the Kruskal-Wallis H test and regression analysis to determine if the relationship between institutions and innovation networks does exist among the investigated variables. The purpose of the study was to find out whether cooperation with special local institutions influences the innovative behaviour...
-
Traffic Modeling in IMS-based NGN Networks
PublikacjaIn the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...