2016, Tom 24 Nr 3
Stały URI dla kolekcjihttp://hdl.handle.net/11652/3825
Przeglądaj
4 wyniki
collection.search.results.head
Pozycja Interval Model of Dynamics of Dispersion of Harmful Pollution from Vehicular Traffic(Wydawnictwo Politechniki Łódzkiej, 2016) Dyvak, Mykola; Stakhiv, Petro; Pukas, Andriy; Voytyuk, Iryna; Porplytsya, Natalia; Maslyiak, YuriiThe method of structure identification of interval discrete dynamic models, based on principles of the bee colonies functioning is represented. An example of the implementation of method for modeling of air pollution by harmful vehicle emissions is considered.Pozycja Geometric Transformations Embedded into Convolutional Neural Networks(Wydawnictwo Politechniki Łódzkiej, 2016) Tarasiuk, Paweł; Pryczek, MichałThis paper presents a novel extension to convolutional neural networks. While CNNs are known for invariance to object translation, changes to the other parameters could make the image recognition tasks diffcult – that includes rotations and scaling. Some improvement in this area could be achieved with embedded geometric transformations used inside the CNNs. In order to provide a practical solution, which allows fast propagation and learning of the modified networks, “fast geometric transformations” are introduced.Pozycja Integrity Rules for Multiargument Relationships in Possibilistic Databases(Wydawnictwo Politechniki Łódzkiej, 2016) Myszkorowski, KrzysztofThe paper contains an analysis of multiargument relationships in possibilistic databases. A multiargument relationship may be formally presented using the relational notation R(X1, X2,...,Xn), where R is the name of the relationship and attributes Xi denote keys of entity sets which participate in it. The dependencies between all n attributes describe the integrity constraints and must not be infringed. They constitute a restriction for relationships of fewer attributes. In the paper it is considered a possible coexistence of associations between k < n attributes of the n-ary relationship. The analysis is carried out using the theory of fuzzy functional dependencies. The notion of functional dependency has been appropriately extended according to the representation of data.Pozycja Medical-Grade Network Security - Air-Gap Isolation and PossibleWeak Points(Wydawnictwo Politechniki Łódzkiej, 2016) Arendt, DanielModern medical imaging devices (MID) are usually connected to the network. Transfer of digital data to the Picture Archiving and Communication Systems (PACS) and then to Hospital Information Systems (HIS) without the internal network is not technically nor economically reasonable. It is estimated that by the interconnection of medical devices and providing remote access to them, health care costs will be cut by $ 63 billion till 2030. Sharing MID’s over public network by remote access can dramatically cut costs of medical care but creates risks well known from oce networks. The firewall/IDS and the air gap isolation techniques are there applicable. Medical society ask for advice what to choose or what are the threats of network operation of medical devices. Here will be given description of known attacks on the security of air gapped networks and cases of disorder operation of systems and ecient data transfer from networks traditionally known as invulnerable and impermeable. Analyzing the presented cases of successful attacks allows to identify weak points of the air-gap mechanism. In conclusion opinion how to straighten security of isolated networks will be given, on the other hand an eective IDS has advantage and many strong points.