Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "mobile computing" wg kryterium: Temat


Tytuł:
A multi-source fluid queue based stochastic model of the probabilistic offloading strategy in a MEC system with multiple mobile devices and a single MEC server
Autorzy:
Zheng, Huan
Jin, Shunfu
Powiązania:
https://bibliotekanauki.pl/articles/2055156.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
mobile edge computing
probabilistic offloading strategy
multi-source fluid queue
birth and death process
cumulative distribution function
przetwarzanie mobilne
proces narodzin i śmierci
dystrybuanta
Opis:
Mobile edge computing (MEC) is one of the key technologies to achieve high bandwidth, low latency and reliable service in fifth generation (5G) networks. In order to better evaluate the performance of the probabilistic offloading strategy in a MEC system, we give a modeling method to capture the stochastic behavior of tasks based on a multi-source fluid queue. Considering multiple mobile devices (MDs) in a MEC system, we build a multi-source fluid queue to model the tasks offloaded to the MEC server. We give an approach to analyze the fluid queue driven by multiple independent heterogeneous finite-state birth-and-death processes (BDPs) and present the cumulative distribution function (CDF) of the edge buffer content. Then, we evaluate the performance measures in terms of the utilization of the MEC server, the expected edge buffer content and the average response time of a task. Finally, we provide numerical results with some analysis to illustrate the feasibility of the stochastic model built in this paper.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 1; 125--138
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Android Security Policy Enforcement Tool
Autorzy:
Cotterell, K.
Welch, I.
Chen, A.
Powiązania:
https://bibliotekanauki.pl/articles/226930.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
mobile computing
Java
Android
security
Opis:
The Android operating system (OS) has become the dominant smart phone OS in recent years due to its accessibility, usability and its open-source philosophy. Consequently, this has also made it a popular target for attackers who aim to install malware on Android devices and take advantage of Android’s coarsegrained, non-revoking permission system. This project designs, implements and evaluates a security tool named COMBdroid, which addresses these security concerns in Android by enforcing fine-grained, user-defined policies. COMBdroid modifies an application before installation, allowing it to override points of security vulnerabilities at run-time. As a proof of concept we have implemented three policies in COMBdroid. This paper documents the development process of COMBdroid, deriving design decisions from the literature review, detailing the design and implementation, and proving the program’s effectiveness through evaluation.
Źródło:
International Journal of Electronics and Telecommunications; 2015, 61, 4; 311-320
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An efficient provably secure certificateless aggregate signature applicable to mobile computation
Autorzy:
Xiong, H.
Wu, Q.
Chen, Z.
Powiązania:
https://bibliotekanauki.pl/articles/206221.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
message authentication
certificateless cryptography
aggregate signature
mobile computing
Opis:
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificateless aggregate signature scheme. Compared with up-to-date certificateless aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model; (2) the security is proven in the strongest security model so far; (3) the signers do not need to be synchronized; and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/ computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
Źródło:
Control and Cybernetics; 2012, 41, 2; 373-391
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Basic concepts of evolution in agents calculating and agents system
Autorzy:
Boyko, N.
Kutyuk, O.
Powiązania:
https://bibliotekanauki.pl/articles/411217.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Oddział w Lublinie PAN
Tematy:
system
technology
agents
agents computing
mobile agents
method
web-application
processing
analysis
Opis:
The basics concepts of evolution in agents calculating are discovered in this work and are showed their directions and applications. Before explaining what is agent and its description, there were given a bit of its history and the difference between agents and programs. Were given basic types of agents on examples and figures. The main task of agents is to require a large number of interactions for which most mathematical modeling methods are unsuitable. Were analyzed agent systems architecture and a description of their main parts. Principles of work with mobile and intelligent agents are considered. Furthermore, were exemplify the reasons and situations of use either intelligent agents or mobile agents. Also, their examples were showed on different examples and figures. Technology and application tools which uses in the process are represented. Analysis of JADE-technology are carried out. On the market today there are analogues of JADE, but most of the systems are relatively new and require many improvements, some are under development prototypes. Also, were given description of main tools and features of JADE. It will help a lot in elaboration of agents. Advantages and disadvantages of using agent approach are showed for creating system of data processing and they show their versatility compared with other systems.
Źródło:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes; 2016, 5, 2; 69-76
2084-5715
Pojawia się w:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Behavior analysis of genetic fuzzy controller for an autonomous robot
Autorzy:
Cho, S.
Lee, S.
Powiązania:
https://bibliotekanauki.pl/articles/205937.pdf
Data publikacji:
1998
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
robot
sterowanie rozmyte
automata
behavior analysis
genetic fuzzy controller
mobile robot
soft computing
Opis:
To program an autonomous robot so that it acts reliably in a dynamic environment is a very hard task. Towards a promising approach to this problem, we have developed a genetic fuzzy controller for a mobile robot, and showed the possibility by applying it to a simulated robot called Khepera. The robot gets input from eight infrared sensors and operates two motors according to the fuzzy inference based on the sensory input. This paper attempts to analyze the adaptive behaviors of the controller by using automata, which indicates the emergence of several strategies to make the robot to navigate the complex space without bumping agains the walls and obstacles.
Źródło:
Control and Cybernetics; 1998, 27, 4; 579-591
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cloud Computing and Mobility as the Main Trends in Unified Communications
Przetwarzanie w chmurze i mobilność jako główne tendencje zunifikowanej komunikacji
Autorzy:
Palonka, Joanna
Porębska-Miąc, Teresa
Powiązania:
https://bibliotekanauki.pl/articles/587764.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
Chmura obliczeniowa
Komunikowanie w przedsiębiorstwie
Technologie mobilne
Technologie sieciowe
Cloud computing
Communication in organisation
Mobile technologies
Network technologies
Opis:
W artykule zaprezentowano nowe trendy w rozwiązaniach zunifikowanej komunikacji i współpracy (UC&C) dla biznesu oraz korzyści wynikające z ich wdrożenia. Dla ich użytkowników systemy UC&C stanowią wygodny sposób kontaktowania się i współpracy, poprawiający komfort pracy pracowników i wpływający na jej efektywność. Obecnie rozwój rozwiązań UC&C zmierza w kierunku wykorzystania technologii mobilnych, wideokonferencji i sieci społecznościowych w biznesie. Jest także zauważalny trend polegający na migracji firm do zintegrowanych rozwiązań komunikacyjnych od jednego dostawcy, jak również rozwój technologii wirtualizacji i cloud computing.
Źródło:
Studia Ekonomiczne; 2014, 188; 119-134
2083-8611
Pojawia się w:
Studia Ekonomiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative Analysis of NOMA and OMA Schemes: GSVD-based NOMA Systems and the Role of Mobile Edge Computing
Autorzy:
Dursun, Yunus
Powiązania:
https://bibliotekanauki.pl/articles/24200752.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
generalized singular value decomposition
MIMO
mobile edge computing
non-orthogonal multiple-access
Opis:
This paper presents a comprehensive study that examines the fundamental concept of the non-orthogonal multiple access (NOMA) scheme and provides its detailed comparison with the orthogonal multiple access (OMA) technique. Furthermore, the paper explores the application of the generalized singular value decomposition (GSVD) method in conjunction with NOMA, accompanied by a detailed review of GSVD-based NOMA systems. This study also introduces the concept of mobile edge computing (MEC) and extensively discusses its key parameters. Furthermore, a comprehensive analysis of NOMA MEC is presented, shedding light on its potential advantages and challenges. The aims of this study are to provide a comprehensive understanding of the aforementioned topics and contribute to the advancement of MIMO-NOMA systems.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 3; 11--20
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cooperative adaptive driving for platooning autonomous self driving based on edge computing
Autorzy:
Chang, Ben-Jye
Hwang, Ren-Hung
Tsai, Yueh-Lin
Yu, Bo-Han
Liang, Ying-Hsin
Powiązania:
https://bibliotekanauki.pl/articles/330778.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
mobile edge computing
active safe driving
cooperative platoon driving
cooperative adaptive cruise control
przetwarzanie mobilne
bezpieczna jazda
tempomat adaptacyjny
Opis:
Cooperative adaptive cruise control (CACC) for human and autonomous self-driving aims to achieve active safe driving that avoids vehicle accidents or traffic jam by exchanging the road traffic information (e.g., traffic flow, traffic density, velocity variation, etc.) among neighbor vehicles. However, in CACC, the butterfly effect is encountered while exhibiting asynchronous brakes that easily lead to backward shock-waves and are difficult to remove. Several critical issues should be addressed in CACC, including (i) difficulties with adaptive steering of the inter-vehicle distances among neighbor vehicles and the vehicle speed, (ii) the butterfly effect, (iii) unstable vehicle traffic flow, etc. To address the above issues in CACC, this paper proposes the mobile edge computing-based vehicular cloud of the cooperative adaptive driving (CAD) approach to avoid shock-waves efficiently in platoon driving. Numerical results demonstrate that the CAD approach outperforms the compared techniques in the number of shock-waves, average vehicle velocity, average travel time and time to collision (TTC). Additionally, the adaptive platoon length is determined according to the traffic information gathered from the global and local clouds.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2019, 29, 2; 213-225
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Creating semantic maps from laser terrestrial data
Tworzenie map semantycznych na podstawie danych z naziemnego skaningu laserowego
Autorzy:
Będkowski, J.
Majek, K.
Musialik, P.
Masłowski, A.
Adamek, A.
Powiązania:
https://bibliotekanauki.pl/articles/130718.pdf
Data publikacji:
2013
Wydawca:
Stowarzyszenie Geodetów Polskich
Tematy:
semantic map
terrestrial scanning
mobile robot navigation
path planning
parallel computing
mapa semantyczna
skaning naziemny
nawigacja robota mobilnego
planowanie trasy
obliczenia równoległe
Opis:
In this paper creating semantic maps based on laser terrestrial data is shown. Semantic map is based on transformed geometric data (3D laser range finder) into the data with assigned labels. This labels can help in several applications such as navigation of mobile robot by finding traversable and not traversable regions. Computation of large 3D data sets requires high computational power, therefore we proposed the GPU based (Graphic Processing Unit) implementation to decrease the computational time. As a result we demonstrate the computed semantic map for mobile robot navigation.
W niniejszej pracy zostało przedstawione tworzenie map semantycznych na podstawie danych z naziemnego skaningu laserowego. Mapa semantyczna bazuje na danych pomiarowych z przypisanymi etykietami. Te etykiety mogą zostać wykorzystane w wielu aplikacjach, jak nawigacja robota mobilnego z wykorzystaniem podziału na regiony przejezdne i nieprzejezdne. Obliczenia dużych trójwymiarowych zbiorów danych wymaga zastosowania duże mocy obliczeniowej, dlatego zaproponowaliśmy implementację wykorzystującą GPU (Graphic Processing Unit), by zmniejszyć czas obliczeń. W rezultacie prezentujemy mapę semantyczną do nawigacji robota mobilnego.
Źródło:
Archiwum Fotogrametrii, Kartografii i Teledetekcji; 2013, Spec.; 23-33
2083-2214
2391-9477
Pojawia się w:
Archiwum Fotogrametrii, Kartografii i Teledetekcji
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Forth Industrial Revolution (4 IR): Digital Disruption of Cyber – Physical Systems
Autorzy:
Kasza, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1058063.pdf
Data publikacji:
2019
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Forth Industrial Revolution (4IR)
H2M (human to machine) communication
Industrial Internet of Things (IIOT)
Industry 4.0
Internet of Things (IOT)
M2H (machine to human)
M2M (machine to machine)
SMAC (social
Smart Manufacturing
analytics and cloud)
artificial intelligence (AI)
cyber-physical systems
digital disruption (disruptive innovations)
infosphere
mobile
pervasive computing
philosophy of information
semantic web
symbiotic and ubiquitous web
Opis:
Article focus of the disruptive character of technological innovations brought by Fourth Industrial Revolution (4IR), with its unprecedented scale and scope, and exponential speed of incoming innovations, described from the point view of ‘unintended consequences’ (cross cutting impact of disruptive technologies across many sectors and aspects of human life). With integration of technology innovations emerging in number of fields including advanced robotics, pervasive computing, artificial intelligence, nano- and bio- technologies, additive and smart manufacturing, Forth Industrial Revolution introduce new ways in which technology becomes embedded not only within the society, economy and culture, but also within human body and mind (described by integration of technologies, collectively referred to as cyber-physical systems). At the forefront of digital transformation, based on cyber physical systems, stands Industry 4.0, referring to recent technological advances, where internet and supporting technologies (embedded systems) are serving as framework to integrate physical objects, human actors, intelligent machines, production lines and processes across organizational boundaries to form new kind of intelligent, networked value chain, called smart factory. Article presents broader context of ‘disruptive changes (innovations)’ accompanying 4IR, that embrace both economical perspective of ‘broader restructuring’ of modern economy and society (described in second part of the article as transition from second to third and forth industrial revolution), and technological perspective of computer and informational science with advances in pervasive computing, algorithms and artificial intelligence (described in third part of article with different stages of web development : web 1.0, web 2.0, web 3.0, web 4.0). What’s more important, article presents hardly ever described in literature, psychological and philosophical perspective, more or less subtle reconfiguration made under the influence of these technologies, determining physical (body), psychological (mind) and philosophical aspect of human existence (the very idea of what it means to be the human), fully depicted in the conclusion of the article. The core element (novelty) is the attempt to bring full understanding and acknowledgment of disruptive innovations’, that “change not only of the what and the how things are done, but also the who we are”, moving beyond economical or technological perspective, to embrace also psychological and philosophical one.
Źródło:
World Scientific News; 2019, 134, 2; 118-147
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fuzzy-Arithmetic-Based Lyapunov Synthesis in the Design of Stable Fuzzy Controllers: a Computing-With-Words Approach
Autorzy:
Zhou, C.
Powiązania:
https://bibliotekanauki.pl/articles/908020.pdf
Data publikacji:
2002
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
informatyka
fuzzy control
standard fuzzy arithmetic
constrained fuzzy arithmetic
Lyapunov synthesis
stability
computing with words
perception-based information
pole balancing mobile robot
Opis:
A novel approach to designing stable fuzzy controllers with perception-based information using fuzzy-arithmetic-based Lyapunov synthesis in the frame of computing with words (CW) is presented. It is shown that a set of conventional fuzzy control rules can be derived from the perception-based information using the standard-fuzzy-arithmetic-based Lyapunov synthesis approach. On the other hand, a singleton fuzzy controller can be devised by using a constrained-fuzzy-arithmetic-based Lyapunov synthesis approach. Furthermore, the stability of the fuzzy controllers can be guaranteed by means of the fuzzy version of Lyapunov stability analysis. Moreover, by introducing standard and constrained fuzzy arithmetic in CW, the "words" represented by fuzzy numbers could be efficiently manipulated to design fuzzy controllers. The results obtained are illustrated with the design of stable fuzzy controllers for an autonomous pole balancing mobile robot.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2002, 12, 3; 411-421
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved motion type identification method using mobile device sensors
Ulepszona metoda identyfikacji rodzaju ruchu wykorzystująca sensory urządzenia mobilnego
Autorzy:
Smołka, J.
Troć, P.
Skublewska-Paszkowska, M.
Łukasik, E.
Powiązania:
https://bibliotekanauki.pl/articles/408539.pdf
Data publikacji:
2016
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
mobile computing
sensors
motion type detection
przetwarzanie mobilne
sensory
rozpoznawanie rodzaju ruchu
Opis:
This paper presents an application of built-in sensors of a mobile device – a more robust version of authors’ own motion type detection method introduced in previous work. Use of accelerometer and magnetometer for recording acceleration in the World’s coordinate system is explained. The original results and identification criteria are briefly described. New tests and their results are presented. An improved version of the motion type identification method is introduced.
Artykuł przedstawia zastosowanie sensorów urządzeń mobilnych – bardziej rozbudowaną wersję autorskiej metody identyfikacji rodzaju ruchu. Metoda ta została zaproponowana we wcześniejszej pracy. Krótko omówione zostało zastosowanie akcelerometru i magnetometru do pomiaru przyspieszenia we współrzędnych świata. Przedstawiono wyniki wstępnych pomiarów razem z oryginalnymi kryteriami rozpoznawania ruchu. Opisano nowe przeprowadzone eksperymenty i ich wyniki. Zaproponowano ulepszoną wersję metody rozpoznawania rodzaju ruchu.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2016, 2; 13-18
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information technology apparatuses
Autorzy:
Golwala, Maulik S.
Powiązania:
https://bibliotekanauki.pl/articles/951094.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Gospodarki Euroregionalnej im. Alcide De Gasperi w Józefowie
Tematy:
IT apparatuses
Cloud Computing
Mobile technology
Social Media
Opis:
The article presents an outline of various Information Technology apparatuses and the use of IT tools in the modern world. The main IT apparatuses which are described in this article are Cloud computing, venture content management, mobile technology, web based conferencing system and social media. The main goal of this article to aware the society that how beneficial the IT apparatuses can be in our day to day life, in business and in social media. Like the Mobile technology has changed our day to day life thoroughly. We can communicate with the people around the world; can know the weather forecast and so on. This section starts by quickly presenting two ideas that are bound together in the thought of computer upheld business advancement. Moreover the challenges and opportunities in Information technology world are described.
Źródło:
Journal of Modern Science; 2019, 42, 3; 283-295
1734-2031
Pojawia się w:
Journal of Modern Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kierunki badań i perspektywy rozwoju zintegrowanych systemów informatycznych zarządzania
Research directions and trends in the development of integrated management information systems
Autorzy:
Abramek, Edyta
Sołtysik-Piorunkiewicz, Anna
Sroka, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/432348.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
integrated management information systems
future trends in information systems development
MRPII/ERP systems
Cloud Computing
mobile technology
Opis:
The purpose of this article is to present the results of research on the directions of the development of integrated management information systems. The authors took especially into account the functionality of systems and technology solutions. The survey was sent to the leading MRPII/ERP producers on the Polish market. Findings allowed to identify future trends in the development of MRPII/ERP systems for the years 2013-2015: Business Analytics, Business Intelligence, access to the system through a web browser, management dashboards, Cloud Computing and virtualization of data, mobile technology and tools for business processes modeling in ERP systems.
Źródło:
Informatyka Ekonomiczna; 2014, 1(31); 114-125
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods for measurement of energy consumption in mobile devices
Autorzy:
Damaševičius, R.
Štuikys, V.
Toldinas, J.
Powiązania:
https://bibliotekanauki.pl/articles/221497.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
battery management
energy consumption
energy measurement
mobile computing
Opis:
Mobile devices have become an integral part of our life and provide dozens of useful services to their users. However, usability of mobile devices is hindered by battery lifetime. Energy conservation can extend battery lifetime, however, any energy management policy requires accurate prediction of energy consumption, which is impossible without reliable energy measurement and estimation methods and tools. We present an analysis of the energy measurement methodologies and describe the implementations of the internal (profiling) software (proprietary, custom) and external software-based (Java API, Sensor API, GSM AT) energy measurement methodologies. The methods are applied to measure energy consumption on a variety of mobile devices (laptop PC, PDA, smart phone). A case study of measuring energy consumption on a mobile computer using 3DMark06 benchmarking software is presented.
Źródło:
Metrology and Measurement Systems; 2013, 20, 3; 419-430
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies