Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Things Network" wg kryterium: Temat


Wyświetlanie 1-15 z 15
Tytuł:
Traffic Modeling in Industrial Ethernet Networks
Autorzy:
Głąbowski, M.
Hanczewski, S.
Stasiak, M.
Weissenberg, M.
Zwierzykowski, P.
Bai, V.
Powiązania:
https://bibliotekanauki.pl/articles/226457.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
internet of things
traffic modeling
industrial Ethernet network
Opis:
This article discusses the traffic types typically used in industrial networks. The authors propose a number of methods of generating traffic that can be used in modeling traffic sources in the networks under consideration. The proposed traffic models have been developed on the basis of the ON/OFF model. The proposed solutions can be applied to model typical traffic types that are used in industrial systems, such as Time-Triggered (TT) traffic, Audio-Video Bridging (AVB) traffic or Best Effort traffic. The article discusses four traffic models with modifications and shows how the proposed models can be used in modeling different traffic types used in industrial networks.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 1; 145-153
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet of Things – An Overview
Autorzy:
Sujithra, M.
Padmavathi, G.
Powiązania:
https://bibliotekanauki.pl/articles/1193571.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Common Operating Picture
Internet of Things
Wireless Sensor Network
Opis:
Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in acommunicating – actuating network creates the Internet of Things (IoT), wherein sensors and actuators blend seamlessly with the environment around us, and the information is shared across platforms in order to develop a common operating picture (COP). Fuelled by the recent adaptation of a variety of enabling wireless technologies such as RFID tags and embedded sensor and actuator nodes, the IoT has stepped out of its infancy and is the next revolutionary technology in transforming the Internet into a fully integrated Future Internet.
Źródło:
World Scientific News; 2016, 41; 208-213
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IOT Security Challenges and Issues – An Overview
Autorzy:
Sujithra, M.
Padmavathi, G.
Powiązania:
https://bibliotekanauki.pl/articles/1193574.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Internet of Things
Network transmission
Privacy protection
RFID
Security
Opis:
A direct interpretation of the term Internet of Things refersto the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Certainly, the IoT security is more than a technicalproblem as it needs series of regulations and faultless securitysystem for common purposes. So, the study of IoT security problem is an emergent issue to be introduced in a research paper. There are many problems in security of Internet of Things (IOT) crying out for solutions, such as RFID tag security, wireless security, network transmission security, privacy protection and information processing security. This article is based on the existing researches of network security technology. And it provides a new approach for researchers in certain IOT application and design, through analyzing and summarizing the security of IOT from various angles. In this paper, the traditional techniques are studied and evaluated, which protect the IoT resources such as devices and data against hacking and stealing.
Źródło:
World Scientific News; 2016, 41; 214-221
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Orchestration of distributed heterogeneous sensor networks and internet of things
Autorzy:
Wilusz, Daniel
Rykowski, Jarogniew
Powiązania:
https://bibliotekanauki.pl/articles/432237.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
Internet of Things
Future Internet
sensor network
REST
OSGi
Opis:
This paper focuses on management of sensor networks and Internet of Things. Two alternative architectures for service management in IoT and sensor networks are analyzed. The first one is based on Open Service Gateway (OSGi) framework and Remote Services for OSGi (R-OSGi) bundle. The second one extends Representational State Transfer (REST) paradigm. The analysis confirms that these two architectures meet the requirements of both sensor networks and IoT management. However, to bypass the disadvantages of these architectures, the new one is proposed being a combination of the analyzed architectures. In our proposition, the OSGi framework is applied to manage local sensor networks and RESTbased architecture allows for managing complex services in Internet of Things. The RESTlet OSGi module integrates the OSGi management system for sensor networks with REST-based management of Internet of Things.
Źródło:
Informatyka Ekonomiczna; 2014, 3(33); 114-129
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intrusion Detection in Heterogeneous Networks of Resource-Limited Things
Autorzy:
Kozakiewicz, A.
Lasota, K.
Marks, M.
Powiązania:
https://bibliotekanauki.pl/articles/307880.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
client honeypot
internet of things (IoT)
intrusion detection
wireless sensor network
Opis:
The paper discusses the threats to networks of resource-limited things such as wireless sensors and the different mechanisms used to deal with them. A novel approach to threat detection is proposed. MOTHON is a movement-assisted threat detection system using mobility to enhance a global threat assessment and provide a separate physical secure channel to deliver collected information.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 4; 10-14
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intelligent algorithms for routing sensory networks operating in explosion hazard zones
Autorzy:
Stankiewicz, Krzysztof
Jagoda, Jerzy
Tonkins, Matthew
Powiązania:
https://bibliotekanauki.pl/articles/2016485.pdf
Data publikacji:
2021
Wydawca:
Politechnika Wrocławska. Wydział Geoinżynierii, Górnictwa i Geologii. Instytut Górnictwa
Tematy:
routing algorithm
Internet of Things
explosion hazardous area
sensor network
swarm intelligence
Opis:
The article presents intelligent routing algorithms currently used in sensory networks, in terms of determining the possibility of their integration into systems working in potentially explosive atmospheres. Selected types of scribing algorithms were characterized. The analysis of simulation tests performed on selected types of scribing algorithms was carried out. The analysis of equipment solutions which can be used to build a network node operating in the conditions of methane and/or coal dust explosion hazard was carried out.
Źródło:
Mining Science; 2021, 28; 103-115
2300-9586
2353-5423
Pojawia się w:
Mining Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges in Integrating Wireless Sensor Network and Internet of Things for Environmental Monitoring
Autorzy:
Vijayalakshmi, S. R.
Muruganand, S.
Powiązania:
https://bibliotekanauki.pl/articles/1193537.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Environmental monitoring
Internet of Things
Temperature and humidity measurement
Wireless Sensor Network
Opis:
Hardware technology developments and wireless communications enables the development of wireless sensor networks (WSNs). WSN will need to be connected to the Internet due to its variety of applications and their importance. This paper discusses the challenges in integrating WSN and IoT (Internet of Things). The best ways of integrating WSN and IoT for environmental monitoring are analyzed. The sensor node is developed to monitor environmental parameters such as temperature and humidity. The sensor SHT75 to sense the temperature and humidity of the environment, XBeePro to communicate with gateway, LCD to display information are interfaced with MSP430 Microcontroller. The microcontroller is used for processing, controlling and communicating the information. The sensor nodes are deployed to measure the parameter in the target area. The information is communicated to the world of Internet in one of the best integrating ways discussed in the paper.
Źródło:
World Scientific News; 2016, 41; 1-8
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet of Things (IoT) and Artificial Neural Networks Towards Water Pollution Forecasting
Autorzy:
Ibrahim, Thaer
Mishra, Alok
Powiązania:
https://bibliotekanauki.pl/articles/1811593.pdf
Data publikacji:
2020
Wydawca:
Politechnika Koszalińska. Wydawnictwo Uczelniane
Tematy:
Internet of Things
E-government
water pollution prediction
Tigris river
Artificial Neural Network
Opis:
Water could be some-times a source of danger on people's lives and property. Although it is one of the most important elements of life on this planet. This article define the threat of water pollution in Tigris River in Iraq. by collecting a data that generated by sensors that installed in a water pollution sensing project in Baghdad city, also this article aimed to detect and analyze the behavior of water environment. It is an effort to predict the threat of pollution by using advanced scientific methods like the technology of Internet of Things (IoT) and Machine learning in order to avoid the threat and/or minimize the possible damages. This can be used as a proactive service provided by E-governments towards their own citizens.
Źródło:
Rocznik Ochrona Środowiska; 2020, Tom 22, cz. 1; 117-129
1506-218X
Pojawia się w:
Rocznik Ochrona Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social Internet of Things
Autorzy:
Geetha, S.
Powiązania:
https://bibliotekanauki.pl/articles/1193546.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Benefits and examples of social internet of things
Gateways and objects
Internet of things
Social communities of smart object
Social network
Opis:
The main objectives of social internet of things is to separate the two levels of people and things to allow objects to have their own socail network, to allow humans to impose rules to protect their privacy and only access the result of autonomous inter- object interactions occouring on the object’s social network. Smart object will not make a difference, but social objects will make it. The main contributions is to identify the apporiate policies for the establishment and the management of social relationsship between objects. To describe a possible architecure for the internet of things that includes the functionalities to intergrate things into socail network.
Źródło:
World Scientific News; 2016, 41; 62-67
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mode selection, caching and physical layer security for fog networks
Autorzy:
Basir, Rabeea
Chughtai, Naveed Ahmad
Ali, Mudassar
Qaisar, Saad
Hashmi, Anas
Powiązania:
https://bibliotekanauki.pl/articles/2173711.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
IoT
Internet of Things
fog network
secrecy
optimization
Internet Rzeczy
mgła obliczeniowa
tajność
optymalizacja
Opis:
Fog networks facilitate ultra-low latency through the use of data availability near the network edge in fog servers. Existing work in fog networks considers the objective of energy efficiency and low latency for internet-of-things (IoT) for resource allocation. These works provide solutions to energy efficiency and low latency resource allocation problem without consideration of secure communication. This article investigates the benefits of fog architecture from the perspective of three promising technologies namely device-to-device (D2D) communication, caching, and physical layer security. We propose security provisioning followed by mode selection for D2D-assisted fog networks. The secrecy rate maximization problem is formulated first, which belongs to mixed-integer nonlinear programming (MINLP) problem. It is NP-hard, that is why an exhaustive search for finding the solution is complex. Keeping in view the complexity, a nonlinear technique namely outer approximation algorithm (OAA) is applied. OAA is a traditional algorithm, whose results are compared with the proposed heuristic algorithm, namely the security heuristic algorithm (SHA). Performance of the network is observed for the different numbers of eavesdroppers, IoT nodes, and fog nodes.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2022, 70, 5; art. no. e142652
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A method for the self-organization of a sensor network in belt conveyor exploitation
Metoda samoorganizacji sieci sensorycznej w eksploatacji przenośnika taśmowego
Autorzy:
Stankiewicz, K.
Powiązania:
https://bibliotekanauki.pl/articles/256187.pdf
Data publikacji:
2016
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Technologii Eksploatacji - Państwowy Instytut Badawczy
Tematy:
monitoring
rollers
sensor network
self-organization
internet of things (IoT)
krążniki
sieć sensoryczna
samoorganizacja
Internet Rzeczy
Opis:
Systems for monitoring, control, and automation, which are capable for learning and adaptation, are increasingly used in the industry. The Internet of Things (IoT) technology and Machine-to-Machine (M2M) direct communication technology have a stronger and stronger impact on the structure and functionality of machine control systems, shaping the Industry 4.0 idea. Control systems that are in accordance with IoT use the communication channels, which are often highly complicated and which combine all subassemblies, modules, actuators, and sensors. The range of using the intelligent systems in the Polish mining industry also increases. The problem of the self-organization of communication routes (routing) in the complex sensor grid monitoring the operation of belt conveyor’s rollers is presented. The sensors creating the grid are independent, and they are equipped with an electronic measuring system and a Measuring and Transmitting Unit (MTU). Swarm Algorithm (SA), based on a swarm behaviour, was suggested for the creation and optimization of transmission routes in the suggested communication structure.
Systemy monitoringu, sterowania i automatyzacji, zdolne do adaptacji i uczenia się, są co raz szerzej stosowane w praktyce przemysłowej. Techniki Internetu Rzeczy (IoT – Internet of Things) oraz komunikacji bezpośredniej Maszyna do Maszyny (M2M – Machine to Machine) coraz mocniej wpływają na strukturę i funkcjonalność systemów sterowania stosowanych w maszynach, kształtując przy tym ideę Przemysłu 4.0 (Industry 4.0). Systemy sterowania zgodne z IoT wykorzystują sieci komunikacyjne, często o dużym stopniu komplikacji, łącząc poszczególne podzespoły, moduły, elementy wykonawcze i sensory.Wzrasta również obszar zastosowań systemów inteligentnych w polskim górnictwie węgla kamiennego. W artykule przedstawiono zagadnienie samoorganizacji ścieżek komunikacyjnych (trasowanie, routing) w złożonej sieci sensorycznej monitorującej działanie krążników przenośnika taśmowego. Poszczególne sensory, tworzące sieć, są niezależne i wyposażone w elektroniczny układ pomiarowy oraz transmisyjny MTU (Measuring and Transmitting Unit). W celu utworzenia i optymalizacji ścieżek transmisyjnych, w proponowanej strukturze komunikacyjnej, zaproponowano algorytm klasy SA (Swarm Algorithm) bazujący na zachowaniu roju.
Źródło:
Problemy Eksploatacji; 2016, 3; 145-154
1232-9312
Pojawia się w:
Problemy Eksploatacji
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Matching-Based Virtual Network Function Embedding for SDN-Enabled Power Distribution IoT
Autorzy:
Li, Xiaoyue
Chen, Xiankai
Zhou, Chaoqun
Liang, Zilong
Liu, Shubo
Yu, Qiao
Powiązania:
https://bibliotekanauki.pl/articles/2055212.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
power distribution internet of things
software defined networking
virtual service orchestration
virtual network function embedding
priority-aware
matching theory
Opis:
The power distribution internet of things (PD-IoT) has the complex network architecture, various emerging services, and the enormous number of terminal devices, which poses rigid requirements on substrate network infrastructure. However, the traditional PD-IoT has the characteristics of single network function, management and maintenance difficulties, and poor service flexibility, which makes it hard to meet the differentiated quality of service (QoS) requirements of different services. In this paper, we propose the software-defined networking (SDN)- enabled PD-IoT framework to improve network compatibility and flexibility, and investigate the virtual network function (VNF) embedding problem of service orchestration in PD-IoT. To solve the preference conflicts among different VNFs towards the network function node (NFV) and provide differentiated service for services in various priorities, a matching-based priority-aware VNF embedding (MPVE) algorithm is proposed to reduce energy consumption while minimizing the total task processing delay. Simulation results demonstrate that MPVE significantly outperforms existing matching algorithm and random matching algorithm in terms of delay and energy consumption while ensuring the task processing requirements of high-priority services.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 4; 647--653
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Transmission of biomedical data from BIOSIP modules in a wireless personal area network with synchronous measurements, and the future use in the internet of things
Autorzy:
Szuster, B.
Szczurek, Z.
Kowalski, P.
Kubik, B.
Michnik, A.
Wiśniowski, R.
Świda, K.
Powiązania:
https://bibliotekanauki.pl/articles/397939.pdf
Data publikacji:
2016
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
body sensor network
wireless medicine
low power
personal area network
Bluetooth Smart
ANT
BioSip
WPAN
Wireless Personal Area Network
Body Area Networks
internet of things (IoT)
IoT
IPv6
Internet Protocol version 6
sieć sensorowa na powierzchni ciała
medycyna bezprzewodowa
sieć osobista
Internet rzeczy
protokół internetowy w wersji 6
Opis:
The paper aims to present the organizational concept of the wireless personal area network (WPAN network) transmitting biomedical data, used in the BioSip system. The network transmits data from recording modules arranged on the subject's body to a collective node (data integrator). At the same time, all the necessary properties are maintained, i.e. low power consumption of the modules, increased resistance of the network to artefacts, the required transmission speed and signal delays. The options to synchronize measurements in various modules have also been presented, along with the resulting benefits. The wireless personal area network of BioSip modules may be based on various communication protocols, such as Bluetooth Smart or ANT. The BioSip network builds on its own protocol based on transmission mechanisms by Nordic. The software of BioSip modules may be adapted for operation in the Internet of Things through network protocol layers made available by Nordic.
Źródło:
International Journal of Microelectronics and Computer Science; 2016, 7, 1; 33-40
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data
Autorzy:
Wiszniewski, Ł.
Klimowicz, D.
Powiązania:
https://bibliotekanauki.pl/articles/1940556.pdf
Data publikacji:
2017
Wydawca:
Politechnika Gdańska
Tematy:
Internet of Things
LoRaWAN
data gathering
data visualization
unmanned air vehicles
LPWAN Network
Long Range Data Transmission
internet rzeczy
gromadzenie danych
wizualizacja danych
bezzałogowe pojazdy powietrzne
sieć LPWAN
transmisja danych dalekiego zasięgu
Opis:
Internet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very difficult to propagate under field conditions ( e.g. in urban areas). The market response to these needs are the LPWAN (Low Power WAN) type networks, whose main features are far-reaching wireless coverage and low power measurement end-nodes that can be battery powered for months. One of the promising LPWAN technologies is the LoRa WAN, which uses a publicly available 868 MHz band (in Europe) and has a range of up to 20 km. This article presents how the LoRa WAN network works and describes the installation of the research and measurement infrastructure in this technology which was built in the Gdańsk area using the Academic Computer Center TASK network infrastructure. The methodology and results of the qualitative and performance studies of the constructed network with the use of unmanned aircraft equipped with measuring devices for remote collection of environmental data are also presented. The LoRaWAN TASK has been designed to support the development of other research projects as an access infrastructure for a variety of devices. Registered users can attach their own devices that send specific metrics that are then collected in a cloud-based database, analyzed and visualized.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2017, 21, 4; 355-363
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security aspects of strategic co-operation of Ukraine and EU with regard to network and information systems
Aspekty bezpieczeństwa strategicznej współpracy Ukrainy i UE w odniesieniu do sieciowych i informatycznych systemów
Autorzy:
Olijnyk, Danyila
Ilyash, Olha
Konizhai, Yurii
Powiązania:
https://bibliotekanauki.pl/articles/1811793.pdf
Data publikacji:
2019-11-20
Wydawca:
Wyższa Szkoła Gospodarki w Bydgoszczy. Wydawnictwo Uczelniane
Tematy:
security of network and information systems
global information infrastructure
electronic communications
Internet of Things
next generation networks
broadband
5G
bezpieczeństwo sieci i systemów informatycznych
globalna infrastruktura informacyjna
komunikacja elektroniczna
internet rzeczy
sieci nowej generacji
internet szerokopasmowy
Opis:
On the basis of an analysis of the EU regulatory framework on network and information systems security, the authors share the opinion that the geopolitical and economic factors of development, Ukraine may apply for inclusion in the global information infrastructure intended to connect all telecommunication and computer networks in globally, and is emerging to address complex issues such as security, privacy, hardware and software compatibility, identity management, digital rights management, and more. It is a European vector of integration of Ukraine for the creation of next-generation digital networks. However, it requires not only the proclamation of these directions as a priority but also the political will of the authorities and the establishment of a mechanism of interaction between public authorities and civil society institutions with the involvement of Ukraine’s strategic partners. The development of balanced interaction with the global digital infrastructure, strategic programming of digital preservation development and data processing, including energy and telecommunications infrastructure, creation and implementation of macro models inclusive development of Ukraine as a guarantee of information security.
Na podstawie analizy ram regulacyjnych UE dotyczących bezpieczeństwa sieci i systemów informatycznych autorzy podzielają opinię, że geopolityczne i ekonomiczne czynniki rozwoju Ukrainy mogą ubiegać się o włączenie do globalnej infrastruktury informacyjnej, mającej na celu połączenie wszystkich telekomunikacyjnych i komputerowych sieci w skali globalnej i coraz częściej pojawia się ten postulat w celu rozwiązania takich problemów, jak bezpieczeństwo, prywatność, zgodność sprzętu i oprogramowania, zarządzanie prawami cyfrowymi. Europejski wektor integracji Ukrainy został wybrany w celu tworzenia sieci cyfrowych nowej generacji. Wymaga to jednak nie tylko ogłoszenia tych priorytetowych kierunków, ale także woli politycznej władz i wyboru mechanizmu interakcji między władzami publicznymi a instytucjami społeczeństwa obywatelskiego przy zaangażowaniu strategicznych partnerów Ukrainy. Rozwój zrównoważonej interakcji z globalną infrastrukturą cyfrową, strategiczne programowanie rozwoju ochrony zasobów cyfrowych i przetwarzania danych, w tym infrastruktury energetycznej i telekomunikacyjnej, tworzenie i wdrażanie makropoleceń – stanowią gwarancję bezpieczeństwa informacyjnego Ukrainy.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Gospodarki w Bydgoszczy. Seria Ekonomia; 2019, 10, 34; 89-106
1733-8891
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Gospodarki w Bydgoszczy. Seria Ekonomia
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-15 z 15

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies