Abstract is missing.
- Water Quality Monitoring System Using WSN in Tanga LakeAli Al-Dahoud, Mohamed Fezari, Hanene Mehamdia. 1-9 [doi]
- A Comparative Study of Statistical and Neural Network Models for PLC Network Traffic Anomaly DetectionTomasz Andrysiak, Lukasz Saganowski. 10-20 [doi]
- Spreading Information in Distributed Systems Using Gossip AlgorithmAndrzej Barczak, Michal Barczak. 21-32 [doi]
- Structurization of the Common Criteria Vulnerability Assessment ProcessAndrzej Bialas. 33-45 [doi]
- Anomaly Detection in Network Traffic Security AssuranceAndrzej Bialas, Marcin Michalak, Barbara Flisiuk. 46-56 [doi]
- Development of the Multi-platform Human-Computer Interaction for Mobile and Wearable DevicesAgnieszka Bier, Zdzislaw Sroczynski. 57-68 [doi]
- Tool for Assessment of Testing EffortIlona Bluemke, Agnieszka Malanowska. 69-79 [doi]
- Flow Shop Problem with Machine Time CouplingsWojciech Bozejko, Radoslaw Idzikowski, Mieczyslaw Wodecki. 80-89 [doi]
- Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication ChannelRafal Chalupnik, Michal Kedziora, Piotr Józwiak, Ireneusz J. Józwiak. 90-98 [doi]
- Numerical Analysis of the Building Materials Electrical Properties Influence on the Electric Field IntensityAgnieszka Choroszucho, Adam Steckiewicz. 99-109 [doi]
- Framework to Verify Distributed IoT Solutions for Traffic Analysis in ATN StationsBogdan D. Czejdo, Wiktor B. Daszczuk. 110-122 [doi]
- The Picking Process Model in e-Commerce IndustryAlicja Dabrowska, Robert Giel, Marcin Plewa. 123-131 [doi]
- Evaluation of Design Pattern Utilization and Software Metrics in C# ProgramsAnna Derezinska, Mateusz Byczkowski. 132-142 [doi]
- Scheduling Tasks in a System with a Higher Level of DependabilityDariusz Dorota. 143-153 [doi]
- Comparison of Parallel and Non-parallel Approaches in Algorithms for CAD of Complex Systems with Higher Degree of DependabilityMieczyslaw Drabowski. 154-165 [doi]
- Examples of Applications of CAD Methods in the Design of Fault Tolerant SystemsMieczyslaw Drabowski. 166-176 [doi]
- The Concept of the ALMM Solver Knowledge Base Retrieval Using Protégé EnvironmentEwa Dudek-Dyduch, Zbigniew Gomolka, Boguslaw Twarog, Ewa Zeslawska. 177-185 [doi]
- Graph-Based Vehicle Traffic Modelling for More Efficient Road LightingSebastian Ernst, Konrad Komnata, Marek Labuz, Kamila Sroda. 186-194 [doi]
- A Fuzzy Approach for Evaluation of Reconfiguration Actions After Unwanted Events in the Railway SystemJohannes Friedrich, Franciszek J. Restel. 195-204 [doi]
- On Some Computational and Security Aspects of the Blom SchemeAlexander Frolov. 205-214 [doi]
- Registration and Analysis of a Pilot's Attention Using a Mobile Eyetracking SystemZbigniew Gomolka, Boguslaw Twarog, Ewa Zeslawska, Damian Kordos. 215-224 [doi]
- Minimization Problem Subject to Constraint of Availability in Semi-Markov Reliability ModelsFranciszek Grabski. 225-234 [doi]
- Method for Railway Timetable Evaluation in Terms of Random Infrastructure LoadSzymon Haladyn, Franciszek J. Restel, Lukasz Wolniewicz. 235-244 [doi]
- Representing Process Characteristics to Increase Confidence in Assurance Case ArgumentsAleksander Jarzebowicz, Szymon Markiewicz. 245-255 [doi]
- Dependability of Multichannel Communication System with Maintenance Operations for Air Traffic ManagementIgor Kabashkin. 256-263 [doi]
- Modelling and Safety Assessment of Programmable Platform Based Information and Control Systems Considering Hidden Physical and Design FaultsVyacheslav Kharchenko, Yuriy Ponochovnyi, Anton Andrashov, Eugene Brezhniev, Eugene Bulba. 264-273 [doi]
- Dependability of Service of Substation Electrical Equipment: Estimation of the Technical Condition State with the Use of Software and Information ToolsAlexander Yu. Khrennikov, Nikolay M. Aleksandrov, Pavel S. Radin. 274-283 [doi]
- Reliability Modeling of Technical Objects in the Airport Security CheckpointTomasz Kisiel, Maria Pawlak. 284-292 [doi]
- Multi-clustering Used as Neighbourhood Identification Strategy in Recommender SystemsUrszula Kuzelewska. 293-302 [doi]
- Assessment of the Potential of the Waterway in the City Using a Fuzzy Inference ModelMichal Lower, Anna Lower. 303-310 [doi]
- The SCIP Interoperability Tests in Realistic Heterogeneous EnvironmentPiotr Lubkowski, Robert Sierzputowski, Rafal Polak, Dariusz Laskowski, Grzegorz Rozanski. 311-320 [doi]
- Softcomputing Art Style Identification SystemJacek Mazurkiewicz, Aleksandra Cybulska. 321-330 [doi]
- Intelligent Agent for Weather Parameters PredictionJacek Mazurkiewicz, Tomasz Walkowiak, Jaroslaw Sugier, Przemyslaw Sliwinski, Krzysztof Helt. 331-340 [doi]
- Mathematical Modeling of the Hot Steam-Water Mixture Flow in an Injection WellNail Musakaev, Stanislav Borodin, Sergey Rodionov, Evgeniy Schesnyak. 341-348 [doi]
- Concept of Preventive Maintenance in the Operation of Mining Transportation MachinesDinara Myrzabekova, Mikhail Dudkin, Marek Mlynczak, Alfiya Muzdybayeva, Murat Muzdybayev. 349-357 [doi]
- Capabilities of ARCore and ARKit Platforms for AR/VR ApplicationsPawel Nowacki, Marek Woda. 358-370 [doi]
- Log Based Analysis of Software Application OperationDaniel Obrebski, Janusz Sosnowski. 371-382 [doi]
- The Impact of Strong Electromagnetic Pulses on the Operation Process of Electronic Equipment and Systems Used in Intelligent BuildingsJacek Pas, Adam Rosinski, Jaroslaw Lukasiak, Marek Szulim. 383-392 [doi]
- Modelling the Safety Levels of ICT Equipment Exposed to Strong Electromagnetic PulsesJacek Pas, Adam Rosinski, Marek Szulim, Jaroslaw Lukasiak. 393-401 [doi]
- Prioritization of Tasks in the Strategy Evaluation ProcedureHenryk Piech, Grzegorz Grodzki. 402-410 [doi]
- Cost Analysis of Water Pipe FailureKatarzyna Pietrucha-Urbanik, Barbara Tchórzewska-Cieslak. 411-424 [doi]
- Attack on Students' Passwords, Findings and RecommendationsPrzemyslaw Rodwald. 425-434 [doi]
- Algorithm-Aware Makespan Minimisation for Software Testing Under UncertaintyJaroslaw Rudy. 435-445 [doi]
- Identifying Factors Affecting the Activities of Technology ParksElena V. Savenkova, Alexander Y. Bystryakov, Oksana A. Karpenko, Tatiana K. Blokhina. 446-455 [doi]
- Security Analysis of Information Transmission in Intelligent Transport Telecommunications NetworkMiroslaw Siergiejczyk. 456-465 [doi]
- Semi-Markov Reliability Model of Internal Electrical Collection Grid of On-Shore Wind FarmRobert Adam Sobolewski. 466-477 [doi]
- Cracking the DES Cipher with Cost-Optimized FPGA DevicesJaroslaw Sugier. 478-487 [doi]
- Maintaining Railway Operational Requirements in the Context of the GSM-R User Interface CapacityMarek Sumila. 488-497 [doi]
- Benchmarking Comparison of Swish vs. Other Activation Functions on CIFAR-10 ImagesetTomasz Szandala. 498-505 [doi]
- An Impact of Different Images Color Spaces on the Efficiency of Convolutional Neural NetworksKamil Szyc. 506-514 [doi]
- Coordinated Resources Allocation for Dependable Scheduling in Distributed ComputingVictor V. Toporkov, Dmitry Yemelyanov. 515-524 [doi]
- Information Needs of Decision Makers for Risk Assessment in Road TransportAgnieszka Tubis. 525-533 [doi]
- Low-Dimensional Classification of Text DocumentsTomasz Walkowiak, Szymon Datko, Henryk Maciejewski. 534-543 [doi]
- Distance Measures for Clustering of Documents in a Topic SpaceTomasz Walkowiak, Mateusz Gniewkowski. 544-552 [doi]