Filtry
wszystkich: 1857
wybranych: 1170
-
Katalog
- Publikacje 1170 wyników po odfiltrowaniu
- Czasopisma 433 wyników po odfiltrowaniu
- Konferencje 53 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 97 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 53 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 35 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: scholarly communication
-
To meet or to connect? Face-to-face contacts vs ICT in cluster organisations
PublikacjaThe main purpose of the paper is to explore how cluster organisations (COs) take advantage of direct (F2F) and indirect (ICT) contacts in fulfilling their main roles. The paper addresses the research question: “How important are Information and Communication Technologies at each level of advancement of cluster cooperation?” The research was conducted in 2016 in four purposefully selected cluster organisations representing metal...
-
A multithreaded CUDA and OpenMP based power‐aware programming framework for multi‐node GPU systems
PublikacjaIn the paper, we have proposed a framework that allows programming a parallel application for a multi-node system, with one or more GPUs per node, using an OpenMP+extended CUDA API. OpenMP is used for launching threads responsible for management of particular GPUs and extended CUDA calls allow to manage CUDA objects, data and launch kernels. The framework hides inter-node MPI communication from the programmer who can benefit from...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublikacjaOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Wybrane aspekty zachowań internautów a skuteczny proces komunikacji marketingowej
PublikacjaCelem artykułu jest przedstawienie sposobów pozyskiwania internetowych treści związanych z organizacjami lub produktami oraz dzielenia się nimi z innymi. W publikacji zwrócono uwagę na potrzebę zmiany postrzegania roli internautów w procesie komunikacji marketingowej. Ponadto, artykuł nawiązuje do koncepcji inbound marketing. Koncepcja ta dotyczy nie tylko przyciągania klientów do firmy i jej produktów. Chodzi w niej o by poprzez...
-
CENTRUM w systemie STRADAR – funkcje, architektura i realizacja
PublikacjaSystem STRADAR jest rozwiązaniem umożliwiającym utworzenie infrastruktury komunikacyjno-teleinformatycznej przeznaczonej dla Morskiego Oddziału Straży Granicznej. Artykuł ten jest kolejną z cyklu publikacji opisujących architekturę i rozwiązanie systemu i dotyczy jego centralnego elementu, jakim jest CENTRUM. Przedstawiono i opisano funkcje, architekturę i realizację oprogramowania CENTRUM, które może być zainstalowane na dowolnym...
-
Uniwersalny Kontroler Radiowy w systemie STRADAR
PublikacjaOpisano praktyczne rozwiązanie uniwersalnego kontrolera radiowego UKR – jednego z podstawowych elementów funkcjonalnych systemu STRADAR – który obsługuje sensory wykorzystywane na granicy morskiej państwa. Jest on także odpowiedzialny za komunikację personelu Straży Granicznej. UKR ma dwie wersje, jedną mobilną – na jednostki pływające, pojazdy lądowe i jednostki latające, drugą stacjonarną – na stałe punkty obserwacyjne rozmieszczone...
-
Application of BAN Network to Increase Security in Transport Systems
PublikacjaIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublikacjaThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublikacjaThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Assessment of User Mobility’s Influence on System Loss in Several Body-to-Body Scenarios
PublikacjaIn this paper, Body-to-Body communications in indoor and outdoor environments for different on-body antenna configurations and different mobility scenarios were studied, based on system loss measurements at 2.45 GHz. The main objective is to properly characterise the influence of the Transmitter-Receiver configuration on system loss and fast fading behaviour, the latter being modelled by the Rice Distribution. Globally, it is observed...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Uncertainty in emotion recognition
PublikacjaPurpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...
-
Erosion of privacy in computer vision systems
PublikacjaW pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.
-
Sustainability of Civil Structures through the Application of Smart Materials: A Review
PublikacjaEvery year, structural flaws or breakdowns cause thousands of people to be harmed and cost billions of dollars owing to the limitations of design methods and materials to withstand extreme earthquakes. Since earthquakes have a significant effect on sustainability factors, there is a contradiction between these constraints and the growing need for more sustainable structures. There has been a significant attempt to circumvent...
-
How to enhance perception of reassembled but incomplete works of ancient art? Eye-tracking study of virtual anastylosis.
Publikacjan 1964 the Venice Charter described anastylosis as the only acceptable method of reassembly of architectural remains. Although the scientific community has agreed with the Charter’s decision, many questions pertaining to the technical and aesthetic aspects of anastylosis remain unanswered. Virtual anastylosis seems one of the most promising digital solutions to finding at least some answers, as it permits testing various solutions...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublikacjaOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Rapid development of custom web application with ruby on rails framework on the example of group project system
PublikacjaTechnology industry labor market requires engineers with a good preparation for work with project's tasks and team cooperation skills. One of the way for achieve that abilities during technical university education are students group projects. Running of group projects at university brings new challenges, from recruitment of students with required skills for par-ticular project, to lack of industrial procedures and ready to use...
-
Mobile wireless measurement system for potatoes storage management
PublikacjaThe paper discusses the idea and the design of a remote control system for a storage management of agricultural products which temperature may rise in a result of biological processes during the storage. Exemplary potatoes storehouse is discussed as an application of the automation system. Because of existing buildings and infrastructure in the farm, wireless data transfer system has been proposed for both sensors to data acquisition...
-
A Developer's View of Application Servers Interoperability
PublikacjaThe paper describes analysis of application servers interoperability that considers both the available level of integration and the required level of development complexity. Development complexity ranges from simple GUI operations to changes of undocumented features in configuration files. We verify if an integration can be established on a given level of development complexity, rather than verify if it is objectively feasible....
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Agricultural products' storage control system
PublikacjaThe paper discusses the idea and the design of a remote control system for storage management of agricultural products which temperature may rise as the result of biological processes during the storage. An actual potatoes storehouse is discussed as an application for the proposed automation system. Because of existing buildings and infrastructure at the farm, wireless data transfer system has been proposed for communication between...
-
A new quaternion-based encryption method for DICOM images
PublikacjaIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
A Regular Expression Matching Application with Configurable Data Intensity for Testing Heterogeneous HPC Systems
PublikacjaModern High Performance Computing (HPC) systems are becoming increasingly heterogeneous in terms of utilized hardware, as well as software solutions. The problems, that we wish to efficiently solve using those systems have different complexity, not only considering magnitude, but also the type of complexity: computation, data or communication intensity. Developing new mechanisms for dealing with those complexities or choosing an...
-
Making agile retrospectives more awesome
PublikacjaAccording to the textbook [23], Scrum exists only in its entirety, where every component is essential to Scrum’s success. However, in many organizational environments some of the components are omitted or modified in a way that is not aligned with the Scrum guidelines. Usually, such deviations result in missing the full benefits of Scrum [24]. Thereby, a Scrum process should be frequently inspected and any deviations should be...
-
Open smart glasses development platform for AAL applications
PublikacjaThis paper describes an open platform for multi sensory electronic glasses that supports new and enhanced methods for intelligent interaction with patients, with smart objects, or to be used as new data input modalities like proximity sensor or smart textile interfaces. All the activities have been developed, investigated and evaluated within EU CHIST-ERA eGlasses project...
-
Big Data Analytics for ICT Monitoring and Development
PublikacjaThe expanded growth of information and communication technology has opened new era of digitization which is proving to be a great challenge for researchers and scientists around the globe. The utmost paradigm is to handle and process the explosion of data with minimal cost and discover relevant hidden information in the least amount of time. The buzz word “BIG DATA” is a widely anticipated term with the potential to handle heterogeneous,...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublikacjaWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublikacjaThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji = TAKING ADVANTAGE OF WEB 2.0 AND THE INFORMATION ARCHITECTURE IN THE INFORMATION BROKER’S WORK
PublikacjaThe development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical...
-
Smart Document-Centric Processing of Human Oriented Information Flows
PublikacjaUsually people prefer to focus on creative rather than repetitive and schematic work patterns. Still, they must spend a lot of time complying with the procedures, selecting the information they receive and repeatedly restoring the previous state of work. This paper proposes the Mobile INteractive Document architecture (MIND) - a document-centric uniform interface to provide both effective communication of content and coordination...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublikacjaIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
Microfluidic SIW-Based Tunable Self-Diplexing Antenna for Sub-6 GHz Band Applications
PublikacjaThis work introduces a novel frequency tunable self-diplexing antenna (SDA) design based on substrate integrated waveguide (SIW) technology. A modified A-shaped slot is employed on the cavity’s top plane, which is excited by two independent 50 Ω microstrip feed lines to operate at each resonant frequency. The frequency flexibility of the proposed antenna allows for fine-tuning at each resonance frequency. The frequency flexibility...
-
Shielded HMSIW-Based Self-Triplexing Antenna With High Isolation for WiFi/WLAN/ISM Band
PublikacjaThis article presents a novel design of a miniaturized self-triplexing antenna (STA) based on the shielded half-mode substrate integrated waveguide (S-HMSIW) for WiFi/WLAN/ISM-band applications. The S-HMSIW is constructed by assembling one row of vias and an open slot at the open-ended side of the conventional HMSIW. This configuration increases the quality factor and minimizes unwanted radiation loss, which allows for achieving...
-
HCI-Based Wireless System for Measuring the Concentration of Mining Machinery and Equipment Operators
PublikacjaMaintaining stable and reliable working conditions is a matter of vital importance for various companies, especially those involving heavy machinery. Due to human exhaustion, as well as unpredicted hazards and dangerous situations, the personnel has to take actions and wisely plan each move. This paper presents a human–computer interaction (HCI)-based system that uses a concentration level measurement function to increase the safety...
-
CyberEye: New Eye-Tracking Interfaces for Assessment and Modulation of Cognitive Functions beyond the Brain
PublikacjaThe emergence of innovative neurotechnologies in global brain projects has accelerated research and clinical applications of BCIs beyond sensory and motor functions. Both invasive and noninvasive sensors are developed to interface with cognitive functions engaged in thinking, communication, or remembering. The detection of eye movements by a camera offers a particularly attractive external sensor for computer interfaces to monitor,...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Design and Performance Evaluation of the Energy Subsystem of a Hybrid Light andWave Energy Harvester
PublikacjaThe paper presents the design and performance of an energy subsystem (ES) dedicated to hybrid energy harvesters (HEHs): wave energy converters (WECs) combined with photovoltaic panels (PVPs). The considered ES is intended for compact HEHs powering autonomous end-node devices in distributed IoT networks. The designed ES was tested experimentally and evaluated in relation to the mobile and wireless distributed communication use case....
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
Influence of User Mobility on System Loss and Depolarization in a BAN Indoor Scenario
PublikacjaIn this article, an analysis of system loss and depolarization in body area networks (BANs) for body-toinfrastructure (B2I) communications based on a measurement campaign in the 5.8 GHz band in an indoor environment is performed. Measurements were performed with an off-body antenna transmitting linearly polarized signals and dual-polarized receiving antennas carried by the user on the body. A normal distribution with a mean of...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
W stronę spersonalizowanego miasta?
PublikacjaOd czasów Platona i Witruwiusza nie ustają wysiłki na rzecz dążenia do prawdy, dobra i piękna skupione wokół miasta jako idei politycznej i przestrzeni fundamentalnie egzystencjalnej. Towarzyszy im od wieków myślenie o idealnej organizacji i kompozycji miasta, o poczuciu podmiotowości mieszkańców i użytkowników, doświadczaniu przez nich czasu i przestrzeni. Szczególnie w ostatnich dekadach, gdy już nie przestrzeń, a czas i jego...
-
Keratinocyte-derived small extracellular vesicles supply antigens for CD1a-resticted T cells and promote their type 2 bias in the context of filaggrin insufficiency
PublikacjaIntroduction: Exosome-enriched small extracellular vesicles (sEVs) are nanosized organelles known to participate in long distance communication between cells, including in the skin. Atopic dermatitis (AD) is a chronic inflammatory skin disease for which filaggrin (FLG) gene mutations are the strongest genetic risk factor. Filaggrin insufficiency affects multiple cellular function, but it is unclear if sEV-mediated cellular communication...
-
Strony WWW bibliotek jako element promocji i narzędzie komunikacji z użytkownikiem
PublikacjaW artykule przedstawiono zasady tworzenia stron WWW bibliotek, ze szczególnym uwzględnieniem bibliotek kościelnych. Zwrócono uwagę na elementy interfejsu i narzędzia służące informacji o zbiorach i usługach, a także promocji działalności biblioteki. Omówiono narzędzia z obszaru Web 2.0, służące komunikacji z użytkownikami w przestrzeni wirtualnej w czasie rzeczywistym (takie jak komunikatory, czaty, formularze zapytań) na przykładzie...
-
Optymalizacja treningu i wnioskowania sieci neuronowych
PublikacjaSieci neuronowe są jedną z najpopularniejszych i najszybciej rozwijających się dziedzin sztucznej inteligencji. Ich praktyczne wykorzystanie umożliwiło szersze użycie komputerów w wielu obszarach komunikacji, przemysłu i transportu. Dowody tego są widoczne w elektronice użytkowej, medycynie, a nawet w zastosowaniach militarnych. Wykorzystanie sztucznej inteligencji w wielu przypadkach wymaga jednak znacznej mocy obliczeniowej,...
-
Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji.
PublikacjaThe development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical skills that...
-
Optimal Placement of Phasor Measurement Unit in Power System using Meta-Heuristic Algorithms
PublikacjaThe phasor measurement units (PMUs) play an important and vital role in power system monitoring and controlling, since they provide the power system phasors stamped with a common real time reference through a global positioning system (GPS). Indeed, from economical point of view it is not possible to set PMUs in all system buses due to the high cost and the requirement of more complex communication...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...