Filtry
wszystkich: 2708
-
Katalog
- Publikacje 2038 wyników po odfiltrowaniu
- Czasopisma 194 wyników po odfiltrowaniu
- Konferencje 63 wyników po odfiltrowaniu
- Osoby 81 wyników po odfiltrowaniu
- Projekty 4 wyników po odfiltrowaniu
- Kursy Online 43 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 282 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MISSION-CRITICAL NETWORKS
-
Rearrangeability in multicast Clos networks is NP-complete
PublikacjaPrzestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...
-
Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform
PublikacjaBirth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...
-
Hydrological signals in polar motion excitation – Evidence after fifteen years of the GRACE mission
Publikacja -
Cooperative Data Transmission in Wireless Vehicular Networks
PublikacjaThe paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.
-
IET Networks
Czasopisma -
NEURAL NETWORKS
Czasopisma -
SOCIAL NETWORKS
Czasopisma -
Sensitivity analysis of critical forces of trusses with side bracing
PublikacjaThe present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublikacjaIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Olgun Aydin dr
OsobyOlgun Aydin finished his PhD by publishing a thesis about Deep Neural Networks. He works as a Principal Machine Learning Engineer in Nike, and works as Assistant Professor in Gdansk University of Technology in Poland. Dr. Aydin is part of editorial board of "Journal of Artificial Intelligence and Data Science" Dr. Aydin served as Vice-Chairman of Why R? Foundation and is member of Polish Artificial Intelligence Society. Olgun is...
-
CRVG - a new model for wireless networks topology generation
PublikacjaThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Modeling the Influence of Salts on the Critical Micelle Concentration of Ionic Surfactants
PublikacjaWe show for the first time that a phenomenological, augmented volume-based thermodynamics (aVBT) model is capable to predict the critical micelle concentrations of ionic surfactants, including ionic liquids, with added salts. The model also adjusts for the type of salt added by including its molecular volume, which might form a connection to the Hofmeister effect. The other physico-chemically relevant quantities included in the...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Systems of Public Higher Education in Poland and Germany. Evidence from Institution Level Data
PublikacjaThe chapter presents a comparative analysis of public higher education systems (HES) in Germany and Poland. Instead of limiting our study to macro indicators such as gross expenditure on higher education or R&D as per cent of GDP, we draw on the evidence based on micro data especially collected for this study and concerning individual higher education institutions (HEIs). Comparative analysis is based on a sample of 71 public...
-
Whither the need and motivation for open government data (OGD) promotional strategies?
PublikacjaPurpose It has been underscored in the extant literature that open government data (OGD) has not percolated across the length and breadth of any country, let alone the awareness of the OGD among the stakeholders themselves. In this vein, this study aims to underline the reasons as to why OGD promotion merits consideration apart from underlining the manner in which OGD promotion may be done. Design/methodology/approach Based on...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Regulatory approach to competition law in the practice of the Polish Competition Authority – critical assessment
PublikacjaThe text provides a critical analysis of the Polish practice of using competition law provisions as regulation provisions
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
The networking of the justice system as part of public court networks
PublikacjaThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
Statistical significance of displacements in heterogeneous control networks
PublikacjaThis paper proposes a modification of the classical process for evaluating the statistical significance of displacements in the case of heterogeneous (e.g. linear-angular) control networks established to deformation measurements and analysis. The basis for the proposed solution is the idea of local variance factors. The theoretical discussion was complemented with an example of its application on a simulated horizontal control...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Dane BadawczeNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Method of selecting programming practices for the safety-critical software development projects
PublikacjaIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
Jarosław Sadowski dr hab. inż.
Osoby -
Application of wavelength division multiplexing in sensor networks
PublikacjaOver the past few years the need to acquire data on various parameters from a number of sensors grew. The need that led to the development of a network of sensors which enables simultaneous control and measurement in a wide range of applications. The aim of this article is to discuss a possibility of connecting a variety of sensors in a network that would utilize WDM technology. Wavelength Division Multiplexing is commonly used...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublikacjaThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Introducing agile practices into development processes of safety critical software
PublikacjaIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublikacjaAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
The impact of institutions on innovation networks: empirical evidence from Poland
PublikacjaInnovation networks may accelerate and improve the innovation process, while institutional pathologies may hamper it. This study employs the Kruskal-Wallis H test and regression analysis to determine if the relationship between institutions and innovation networks does exist among the investigated variables. The purpose of the study was to find out whether cooperation with special local institutions influences the innovative behaviour...
-
Traffic Modeling in IMS-based NGN Networks
PublikacjaIn the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Computations of critical load value of composite shell with random geometric imperfections
PublikacjaThe work presents the numerical analysis of composite shell with geometric imperfections subjected to compression along its generatrix. The imperfections are described as single indentations and random fields with random parameters of shape and correlation. The fields are generated with the use of the authors made program. Using the authors’ FEM software as well as commercial package Femap with NX Nastran, the critical load values...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...
-
Critical perspectives on media architecture
Publikacja -
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Critical Success Factors for Knowledge Management in SMEs in the KIBS Sector
PublikacjaThe purpose of this paper is to examine knowledge management practices and critical success factors (CSFs) for their introduction in small and medium-sized enterprises (SMEs) in the knowledge-intensive business services (KIBS) sector. Methodology: The paper is based on the results of an exploratory qualitative survey involving owners and managers of small and medium-sized companies operating in the KIBS sector. In the survey, eight...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublikacjaIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
Performance Analysis of Convolutional Neural Networks on Embedded Systems
PublikacjaMachine learning is no longer confined to cloud and high-end server systems and has been successfully deployed on devices that are part of Internet of Things. This paper presents the analysis of performance of convolutional neural networks deployed on an ARM microcontroller. Inference time is measured for different core frequencies, with and without DSP instructions and disabled access to cache. Networks use both real-valued and...
-
Polysaccharide-based Nanocomposites for Biomedical Applications: A Critical Review
PublikacjaPolysaccharides (PSA) are taking specific position among biomaterials for advanced applications in medicine. Nevertheless, poor mechanical properties is known as the main drawback of PSA, which highlights need for PSA modification. Nanocomposites PSA (NPSA) are a class of biomaterials widely used as biomedical platforms, but despite their importance and worldwide use have not been reviewed. Herein we critically reviewed application...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublikacjaUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Artificial intelligence for biomedical engineering of polysaccharides: A short overview.
PublikacjaThe advent of computer-aided concepts and cognitive algorithms, along with fuzzy sets and fuzzy logic thoughts, supported the idea of ‘making computers think like people’ (Lotfi A. Zadeh, IEEE Spectrum, 21 (26–32), 1984). Such a school of thought enabled the sophistication of mission-oriented...
-
Shore Construction Detection by Automotive Radar for the Needs of Autonomous Surface Vehicle Navigation
PublikacjaAutonomous surface vehicles (ASVs) are becoming more and more popular for performing hydrographic and navigational tasks. One of the key aspects of autonomous navigation is the need to avoid collisions with other objects, including shore structures. During a mission, an ASV should be able to automatically detect obstacles and perform suitable maneuvers. This situation also arises in near-coastal areas, where shore structures like...
-
Integration Data Model of the Bathymetric Monitoring System for Shallow Waterbodies Using UAV and USV Platforms
PublikacjaChanges in the seafloor relief are particularly noticeable in shallow waterbodies (at depths up to several metres), where they are of significance for human safety and environmental protection, as well as for which the highest measurement accuracy is required. The aim of this publication is to present the integration data model of the bathymetric monitoring system for shallow waterbodies using Unmanned Aerial Vehicles (UAV) and...