Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 9

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  computer networks
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
In the article the author studies and analyzes the general theoretical writings of experts in the field of criminal law, criminology and criminal executive law related to the study of determinants of property crime, and information and statistics in the sphere of the global Internet and computer and telecommunication devices. A classification of computers as communication tools for the achievement of the information society in terms of its global contemporary possibilities is presented. Appropriateconclusions are drawn. The Council of Europe Convention on Cybercrime of 23 November 2001, the legislation of Ukraine, Russian Federation and United States are analyzed. The questions of prevention of fraud, perpetrated with the use of computer networks, the issues of cyber security were discussed. Concrete proposals on how to eliminate conditions conducive to the commission of cyber fraud are made and ways of effectively countering fraud committed through computer and telecommunications devices and computer networks are proposed. The prerequisites for the birth and development of the World Wide Web are studied, and the dynamics of the growth in the number of users in the world, Europe, Asia, USA, Ukraine are analyzed. Conclusions about the credibility of statistics on the number of active users of computer and telecommunication networks are drawn, the way they are counted, factors affecting data corruption, along with consideration for their most effective use. The reasons for passivity, lack of effectiveness of the security structures of the private sector in the fight against criminal encroachments using computer networks and technologies are identified.
EN
In this article the European scientific e-infrastructure is described with special emphasis on the contribution of the Polish scientific community. Examples of this infrastructure for radioastronomy, high-energy physics and medicine are presented. Directions of further development in the field are pointed out.
EN
A lot of companies have a problem with the selection of the type of computer network, because each of them has different characteristics and specifications. A businessman often does not know what he can expect from them and which type of network will allow him to fully exploit the potential of its business. The main objective of the work is to build a decision support system in this area. Intermediate target is to specify the characteristics or criteria which will be guided by a businessman in this selection. A comparative analysis of the type of access to the network using a case study was made in the work. The paper also developed the concept of a decision support system on the issue in question. As a result, six benchmarking criteria were specified and analyzed: security, data integrity, price, mobility, performance and configuration. As a result of the analysis, the final ranking was presented. Having used AHP method it showed which type of access to the network according to the given criteria provided by a businessman was the most suitable for him.
EN
In parallel with developments in technology, home automation systems are being increasingly used. In this study, computer networks and the power system can be controlled by Internet for a remote device. This application was carried out in two stages of software and hardware. The software is developed in C # programming language. This software is connected to the computer using a remote server devices, performed the required information has been sent. The second part of the application is prepared in the hardware. The information that come to the server Usb can handled and performed by Usb 1208LS. This circuit design performed and connected to the server Usb. After the coming data has been processed, target device which connected to the circuit making power control and commands sent to the device peaks and the application process has been completed the desired
PL
W artykule zaprezentowano problematykę związaną z programowymi generatorami ruchu i ich wykorzystaniem w procesach dydaktycznych, jak również w obszarze prac badawczo-rozwojowych. Przedstawiono ich możliwości oraz ograniczenia funkcjonale w zakresie definiowanie ruchu sieciowego.
EN
The article presents issues related to programming traffic generators and their use in the processes of teaching and in the area of research and development as well. Their capabilities and functional limitations of network traffic definition are presented.
PL
W artykule zaprezentowano możliwości wykorzystania środowiska open source Scilab do projektowania oraz modelowania sieci komputerowych. Środowisko to może być alternatywą dla komercyjnych rozwiązań w zakresie symulacji protokołów i algorytmów wykorzystywanych w sieciach komputerowych.
EN
The article presents the possibilities of using the Scilab open source environment for designing and modeling computer networks. This environment can be an alternative to commercial solutions in the field of simulation of protocols and algorithms used in computer networks.
PL
W dniach 1–2 lipca 2014 r. odbywała się na Wydziale Matematyki i Informatyki Uniwersytetu Mikołaja Kopernika w Toruniu jedenasta edycja corocznej konferencji „Informatyka w Edukacji”. Organizatorami tegorocznej edycji był Wydział Matematyki i Informatyki UMK wraz z kujawsko-pomorskim oddziałem Polskiego Towarzystwa Informatycznego. Konferencja miała charakter naukowo-metodyczny. Jak co roku kierowano ją przede wszystkim do nauczycieli (od szkół podstawowych po uczelnie wyższe) i instytucji związanych z edukacją. Uzupełnieniem oferty referatów konferencyjnych była cześć warsztatowo-seminaryjna. Artykuł podsumowuje konferencję i zawiera podstawowe informacje na temat wygłoszonych w jej ramach referatów.
EN
On 1st–2nd July 2014 the eleventh edition of the annual conference “Computers in Education” was held in Torun. The conference had both a research and methodical character. It was mainly intended for teachers (from primary schools to higher education) and educational institutions. The practical part of the conference was the workshop. The article summarizes the conference and contains basic information about the presented papers.
EN
The purpose of the article is to carry out analyses of how Poland-based enterprises from the non-financial sector employing at least 10 employees make use of information technologies and how this use has changed if compared with the period 2008-2010. The comparison is done against the background of firms from the European Union, Denmark, Norway, Sweden and Finland. In the introduction, the author puts forward a hypothesis – which is verified further In the article, thanks to the analysis of statistical data concerning the chosen countries. In that part, the choice of countries has also been justified. Next, the definitions of the analysed phenomena are cited. Further on, the research methods are shown, along with the specification and justification of the choice of research instruments and the time-span of the analysis. The largest part of the study is devoted the analysis of the chosen indicators concerning purchases and sales in enterprises. After describing each of them, the research results are shown. The findings are revealed in the conclusion.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.