Metody Informatyki Stosowanej

Wielkość: px
Rozpocząć pokaz od strony:

Download "Metody Informatyki Stosowanej"

Transkrypt

1 Polska Akademia Nauk Oddział w Gdańsku Komisja Informatyki Metody Informatyki Stosowanej Nr 4/2008 (Tom 17) Szczecin 2008

2 Metody Informatyki Stosowanej Kwartalnik Komisji Informatyki Polskiej Akademii Nauk Oddział w Gdańsku Komitet Naukowy: Przewodniczący: prof. dr hab. inŝ. Henryk Krawczyk, czł. koresp. PAN, Politechnika Gdańska Członkowie: prof. dr hab. inŝ. Michał Białko, czł. rzecz. PAN, Politechnika Koszalińska prof. dr hab. inŝ. Ludosław Drelichowski, Uniwersytet Technologiczno-Przyrodniczy w Bydgoszczy prof. dr hab. inŝ. Janusz Kacprzyk, czł. koresp. PAN, Instytut Badań Systemowych PAN prof. dr hab. Jan Madey, Uniwersytet Warszawski prof. dr hab. inŝ. Leszek Rutkowski, czł. koresp. PAN, Politechnika Częstochowska prof. dr hab. inŝ. Piotr Sienkiewicz, Akademia Obrony Narodowej prof. dr inŝ. Jerzy Sołdek, Politechnika Szczecińska prof. dr hab. inŝ. Andrzej Straszak, Instytut Badań Systemowych PAN prof. dr hab. Maciej M. Sysło, Uniwersytet Wrocławski Recenzenci: prof. dr hab. inŝ. Ludosław Drelichowski, Uniwersytet Technologiczno-Przyrodniczy w Bydgoszczy dr hab. inŝ. Krzysztof Giaro, prof. PG, Politechnika Gdańska prof. dr hab. inŝ. Larysa Globa, National Technical University of Ukraine prof. dr hab. inŝ. Janusz Górski, Politechnika Gdańska prof. Shinya Kobayashi, Ehime University prof. dr hab. inŝ. Leonid Kompanets, Politechnika Częstochowska dr hab. inŝ. Georgy Kukharev, prof. PS, Politechnika Szczecińska dr hab. inŝ. Eugeniusz Kuriata, prof. UZ, Uniwersytet Zielonogórski dr hab. inŝ. Emma Kusztina, prof. PS, Politechnika Szczecińska dr hab. inŝ. Karol Myszkowski, Politechnika Szczecińska prof. dr hab. inŝ. Andrzej Piegat, Politechnika Szczecińska dr hab. Jacek Pomykała, Uniwersytet Warszawski prof. dr hab. inŝ. Remigiusz Rak, Politechnika Warszawska prof. dr hab. inŝ. Valeriy Rogoza, Politechnika Szczecińska dr hab. inŝ. Khalid Saeed, prof. PB, Politechnika Białostocka prof. dr hab. inŝ. Boris Sovetov, St. Petersburg Electrotechnical University dr hab. inŝ. Antoni Wiliński, prof. PS, Politechnika Szczecińska dr hab. Zenon Zwierzewicz, prof. AM, Akademia Morska w Szczecinie Redaktor Naczelny: Antoni Wiliński Sekretarz redakcji: Piotr Czapiewski ISSN ISBN Wydawnictwo: Polska Akademia Nauk Oddział w Gdańsku Komisja Informatyki Adres kontaktowy: ul. śołnierska 49 p. 104, Szczecin Druk: Pracownia Poligraficzna Wydziału Informatyki Politechniki Szczecińskiej Nakład 510 egz.

3 Spis treści Włodzimierz Bielecki, Krzysztof Kraska INCREASING DATA LOCALITY OF PARALLEL PROGRAMS EXECUTED IN EMBEDDED SYSTEMS Bartosz Bielski, Przemysław Klęsk PASSIVE OPERATING SYSTEM FINGERPRINTING USING NEURAL NETWORKS AND INDUCTION OF DECISION RULES Janusz Bobulski ANALYSIS OF 2D PROBLEM IN HMM Michał Choraś, Adam Flizikowski, Anna Stachowicz, Marta Redo, Rafał Renk, Witold Hołubowicz ONTOLOGY NOTATION AND DESCRIPTION OF VULNERABILITIES IN HETEROGENEOUS NETWORKS AND CRITICAL INFRASTRUCTURES Magdalena Ciszczyk, Emma Kusztina THE ROLE OF STANDARDIZATION IN THE PROCESS OF FORMING QUALITY OF EDUCATIONAL REPOSITORY IN ODL Paweł Forczmański UNIFIED JPEG AND JPEG-2000 COLOR DESCRIPTOR FOR CONTENT-BASED IMAGE RETRIEVAL.. 53 Dariusz Frejlichowski AN OUTLINE OF THE SYSTEM FOR COMPUTER-ASSISTED DIAGNOSIS BASED ON BINARY ERYTHROCYTES SHAPES Jarosław Jankowski PERSONALIZACJA PRZEKAZU INTERAKTYWNEGO Z UDZIAŁEM METOD ANALIZY CZYNNIKOWEJ.. 71 Henryk Krawczyk, Sławomir Nasiadka METODA WYZNACZANIA KONTEKSTU DLA APLIKACJI STEROWANYCH ZDARZENIAMI Mariusz Kubanek, Szymon Rydzek A HYBRID METHOD OF PERSON VERIFICATION WITH USE INDEPENDENT SPEECH AND FACIAL ASYMMETRY Krzysztof Makles IDENTYFIKACJA CHARAKTERYSTYK MODELI W TRYBIE ON-LINE WRAZ Z WIZUALNĄ REKONSTRUKCJĄ CHARAKTERYSTYKI Wojciech Maleika, Michał Pałczyński VIRTUAL MULTIBEAM ECHOSOUNDER IN INVESTIGATIONS ON SEA BOTTOM MODELING Radosław Mantiuk HDRLIB: BIBLIOTEKA DO SZYBKIEGO PRZETWARZANIA OBRAZÓW HDR WYKORZYSTUJĄCA ZAAWANSOWANE MOśLIWOŚCI PROCESORÓW CPU Ireneusz Mrozek, Eugenia Buslowska, Bartosz Sokol MPS(3N) TRANSPARENT MEMORY TEST FOR PATTERN SENSITIVE FAULT DETECTION Adam Nowosielski, Krzysztof Kłosowski ANALIZA NATĘśENIA RUCHU OSÓB NA MONITOROWANYCH OBSZARACH

4 4 Walenty Oniszczuk MODELLING AND ANALYSIS OF TWO-SERVER NETWORKS WITH FINITE CAPACITY BUFFERS AND BLOCKING Jerzy Pejaś DIRECTED THRESHOLD SIGNCRYPTION SCHEME FROM BILINEAR PAIRING UNDER SOLE CONTROL OF DESIGNATED SIGNCRYPTER Andrzej Piegat, Marek Landowski LACK OF INFORMATION AVERAGE DISTRIBUTION OF PROBABILITY DENSITY Jacek Pomykała, Bartosz Źrałek DYNAMIC GROUP THRESHOLD SIGNATURE BASED ON DERANDOMIZED WEIL PAIRING COMPUTATION Orest Popov, Anna Barcz, Piotr Piela DETERMINING THE EFFECTIVE TIME INTERVALS IN THE RECURRENT PROCESSES OF IDENTIFICATION OF DYNAMIC SYSTEMS Michał Słonina, Imed El Fray INFRASTRUKTURA ZARZĄDZANIA UPRAWNIENIAMI WYKORZYSTUJĄCA KONTROLĘ DOSTĘPU OPARTĄ NA ROLACH ZINTEGROWANĄ Z JĄDREM SYSTEMU OPERACYJNEGO Marcin Suchorzewski EVOLVING WEIGHTED TOPOLOGIES FOR NEURAL NETWORKS USING GENETIC PROGRAMMING Galina łariova, Alexandr łariov EFEKTYWNE ALGORYTMY WYZNACZANIA WYRAśENIA POSTACI Y=(A B)X Tatiana Tretyakova, Abdullah Zair FORMATION OF THE CONTENTS OF KNOWLEDGE'S BASES FOR LOCAL INTELLIGENT DECISION SUPPORT SYSTEMS Jarosław Wątróbski, Zbigniew Piotrowski IMPACT OF THE PRESENCE OF LINGUISTIC DATA ON THE DECISION AID PROCESS

5 Increasing data locality of parallel programs executed in embedded systems Włodzimierz Bielecki, Krzysztof Kraska Szczecin University of Technology, Faculty of Computer Science and Information Technology Abstract: Increasing data locality in a program is a necessary factor to improve performance of software parts of embedded systems, to decrease power consumption and reduce memory on chip size. A possibility of applying a method of quantifying data locality to a novel method of extracting synchronization-free threads is introduced. It can be used to agglomerate extracted synchronization-free threads for adopting a parallel program to a target architecture of an embedded system under various loop schedule options (spacetime mapping) and the influence of well-known techniques to improve data locality. The choice of the best combination of loop transformation techniques regarding to data locality makes possible improving program performance. A way of an analysis of data locality is presented. Experimental results are depicted and discussed. Conclusion and future research are outlined. Keywords: data locality, compilers, parallel processing, embedded systems 1. Introduction Embedded systems involved in data processing consist of programmable processors, program components processed by the processors and hardware components often realized in FPGA cooperating with software parts of the system. Software components enable making corrections quickly, code reusing, elastic changing a program permitting for reducing the time of delivering product to the market. But programmable processors consume considerably more energy and they are significantly slower than their hardware counterparts. Hardware solutions assure greater performance and smaller power consumption however designing time may be long and the design process is expensive [9]. Multiprocessor architectures for embedded systems are widespread on the contemporary electronic market. For example, the Xilinx FPGA Virtex-4FX chip includes up to two PowerPC405 processors, National Semiconductor s Geode chips enable to join several processors to build a multiprocessor system based on the x86 architecture, the HPOC project (Hundred Processors, One Chip) undertaken at Hewlett Packard attempts to consolidate hundreds of processors on one chip using co-resident on-chip memory [4].

6 6 Włodzimierz Bielecki, Krzysztof Kraska Similarly to the computer software development, the embedded system development needs programming languages, debuggers, compilers, linkers and other programming tools. Approved as an IEEE standard, the SystemC language is an example of the tool that enables the implementation of both software and hardware parts of embedded systems. The optimal implementation of software components designed for multiprocessor embedded systems is critical for their performance and the power consumption. However, poor data locality is a common feature of many existing numerical applications [6]. Such applications are often represented with affine loops where the considerable quantities of data placed in arrays exceeded the size of a fast but small cache memory. For an inefficient code, referenced data has to be fetched to a cache from external memory although they could be reused many times. Because cache is expensive, memories often operate at full speed of a processor while cheaper but more capacious external memory modules operate at several times slower frequency, hence the time to access data located in a cache memory is significantly less. Improvement in data locality can be obtained by means of high-level program transformations. Increasing data locality within a program improves the utilization of fast data cache and delimits accesses to slower memory modules at lower level. Finally it makes general performance improvement for software parts of embedded systems. 2. Analysis of data locality for synchronization-free slices A new method of extracting synchronization-free slices (SFS) in arbitrarily nested loops was introduced in [1]. The method enables us to extract more parallel threads than other methods. The well-known technique invented by Wolfe [3] estimates data reuse factors. It makes possible to adopt such order of the loop execution that increases data locality in a program. In relation to the method of extracting synchronization-free slices, the estimation of data locality is a necessary activity to obtain an improved performance for a program executed on a target architecture. The SFS method extracts maximal number of the parallel threads however any target embedded architecture consists of the fixed number of CPU cores usually smaller than the number of threads extracted. Hence, it is necessary to adjust the level of parallelism in a program to the target architecture [10]. Our previous research conducted on parallel computers indicates that the extraction of synchronization-free slices as well as applying the tiling and the array contraction techniques within an individual thread can considerably increase the performance of a parallel program. For example, the results of the experiments performed for the Livermore Loops Kernel 1 (hydro fragment) [5] and the matrix multiplication algorithm [6] indicate the considerable gains in the execution time (Figure 1a and Figure 1b) [2]. On the contrary, the example of a simple code in Figure 2 executed on the same target architecture proves that the extraction of parallel slices under certain circumstances can limit the performance of a program the execution time of the parallel code (8 seconds) was about 30% greater than that of the correspondent sequential code (6 seconds). It can be noticed that the parallel code has the decreased spatial-reuse factor value for a reference to the array a[] caused to maintain the coherence between the caches of multiple processors to a large extent.

7 Increasing data locality of parallel programs executed in embedded systems 7 (a) Figure 1. Execution time of (a) Livermore Loops Kernel 1 (b) matrix multiplication (b) #define SIZE int main(void) { double *a = new double[size]; for(long i=0; i<size; i++) a[i]=(double)i+1; for(long i=0; i<(size-2); i++) a[i+2]=sin((a[i]*size+1)/size); return 0; } (a) Sequential code #include <omp.h> #define SIZE int main(void) { omp_set_num_threads(2); double *a=new double[size]; for(long i=0; i<size; i++) a[i]=(double)i+1; #pragma omp parallel for private(j,i) shared(a) for(long j=0; j < 2 ; j++) for(long i=j; i<(size-2); i+=2) a[i+2]=sin((a[i]*size+1)/size); return 0; } (b) Parallel code Figure 2. Decreased performance in the parallel version of a simple code

8 8 Włodzimierz Bielecki, Krzysztof Kraska The assurance of the optimal performance for a program with the level of parallelism limited to the possibility of a target architecture requires the iterative estimation of data locality for different ways of the slices agglomeration in combination with different types of scheduling (space-time mapping) and applying well-known techniques for improving data locality. The choice of the best combination of the above-mentioned elements under a generalized data locality factor will assure the optimal performance of a program. For both of the Livermore Loops Kernel 1 and the matrix multiplication algorithm, the level of parallelism was adjusted to a target architecture by applying the function omp_set_num_threads( omp_get_num_procs( ) ) from the OpenMP library. The number of threads created for the target architecture (2 x Intel Pentium 4 with Hyper-Threading technology) was 4. The size of the DataCache-L1 line for the processor was 128-bytes which corresponds to 32 array elements. Since the directive #pragma parallel in the both programs omitted the type of the iteration scheduling, the compiler applied the scheduling of the static policy allocating ¼ consecutive iterations to each thread [12]. The data locality factors for the matrix multiplication algorithm and the Livermore Loops Kernel 1 calculated with the method [3] are presented in Table 1, Table 2 and Table 3. Table 1. Reuse factors for the matrix multiplication algorithm Reuse factors Reference Temporal Spatial Self-reuse k j i k j i R k R j R i R k * Cumulative self reuse R j * R i * F k * Data footprint z[i][j] N N 32 1 N 32N 32N 1 N/32 N 2 /128 x[i][k] 1 N N N 32N N/32 N/32 N 2 /128 y[k][j] 1 1 N/ N/ N N N 2 /32 N 2 /32 F j * F i * Σ N + 33 N + 64 N/4 + 2 N+33 64N N N+N/ N 2 /32 + N/16 6N 2 /128 In the case of the matrix multiplication, there are no separate references to the same array, therefore only the self-reuse factors were calculated. For arrays of size N x N, where N=2048, the data footprint for the outermost loop, Fi*, considerably exceeded the size of DataCache-L1 causing an access to slower memory level: F 2 N * = ; N = 2048 ; F i = * 6 i

9 Increasing data locality of parallel programs executed in embedded systems 9 Table 2. Temporal-reuse factors for the Livermore Loops Kernel 1 (hydro fragment) Reuse factors Reference Temporal Spatial Self-reuse Cumulative self reuse Data footprint k l k l R k R l * R k * R l * F k * F l x[k] 1 Loop loop 32 32loop n/32 n/128 y[k] 1 Loop loop 32 32loop n/32 n/128 Z[k+10] 1 Loop loop 32 32loop n/32 n/128 Z[k+11] 1 Loop loop 32 32loop n/32 n/128 Σ 128 4* loop * loop n/8 n/32 Table 3. Spatial-reuse factors for the Livermore Loops Kernel 1 (hydro fragment) Reuse factors Reference Self-spatial reuse Group-temporal reuse Cumulative group reuse k l k l k l z[k+11] z[k+10] loop 32 32*loop The value Fi*= for the 4-bytes array element size gives 768KB. After applying the tiling technique and splitting data into blocks with the side B=32 elements, the value of the data footprint was decreased because that data amount could be entirely placed in DataCache-L1: F 2 B = ; B = 32 ; 128 * 6 i F = 48. The value Fi*=48 for the 4-bytes array element size gives 192B. It should be noticed that DataCache-L1 was shared between 2 parallel threads. In the case of the Livermore Loops Kernel 1 (hydro fragment), the self-reuse factors are identical for the source with fine grained parallelism and the source with synchronization-free slices extracted. There is also the group-reuse between references z[k+11] and z[k+10] sorted so that the reuse distance between adjacent references is lexicographically nonnegative. There are also self-temporal and self-spatial reuse factors for the both references. The group-spatial reuse factor equals one since there is the self-spatial reuse factor. To take into account reuse between references, a generalized data reuse factor for the outermost loop Ll is computed by dividing the data footprint by the cumulative group reuse factor that finally gives: * i n / 32 2 n / (32 * loop) 32* loop =. 3. Experiments Experiments were performed by means of the software simulator IBM PowerPC Multi-Core Instruction Set Simulator v1.29 (MC-ISS) [7] intended for the PowerPC

10 10 Włodzimierz Bielecki, Krzysztof Kraska 405/440/460 embedded systems development and the related IBM RISCWatch v6.0i debugger [8]. Cache utilization was reached from DCU (sim readdcu) statistics of the simulator. The following configuration of the simulator was used to conduct experiments: 2 x PowerPC405 processors with 16KB two-way set-associative DataCache-L1 (8 words/32 bytes cache line) no DataCache-L2. The sources exposed to the experiments were developed in a manner representative for the embedded software development using the cross-platform development environment composed of the Intel PC workstation and the target executable architecture [8]. The examined C sources were compiled on the Fedora 4 Linux x86 to the PowerPC Embedded ABI file format by means of the gcc compiler and executed in the target system environment using the MC-ISS software simulator. Due to the target architecture limitations, two threads of the data processing were extracted in the sources. Iterations of a parallel loop were assigned to threads according to the scheduling of static policy, i.e., one thread has assigned a half of the consecutive loop iterations [12]. Table 4 shows the results achieved for the matrix multiplication code being simulated in the MC-ISS embedded software simulator. Table 4. The experimental results of DCU utilization for the matrix multiplication code (N=256, B=8) RISCWatch STATUS Parallel SFS with Parallel SFS Sequential Parallel SFS Blocking & with Blocking Array Contraction CPU0 CPU1 CPU0 CPU1 CPU0 CPU1 CPU0 CPU1 DCU total accesses N/A DCU misses N/A Misses/total [%] 6,8% N/A 6,8% 6,8% 0,22% 0,22% 0,27% 0,27% Table 5 shows the results obtained for the Livermore loop Kernel 1 (hydro fragment) code executed in the MC-ISS embedded software simulator. RISCWatch STATUS Table 5. The experimental results of DCU utilization for the Kernel 1 (loop=100; array_size=8192*sizeof(int)) Parallel SFS with Sequential Parallel Parallel SFS Array Contraction CPU0 CPU1 CPU0 CPU1 CPU0 CPU1 CPU0 CPU1 DCU total accesses N/A DCU misses N/A misses/total [%] 2,69% N/A 2,69% 2,69% 0,04% 0,04% 0,06% 0,06% The examined sources have achieved the same (in the first case) and much better (in the second case) DCU misses/total ratio after synchronization-free slices extraction.

11 Increasing data locality of parallel programs executed in embedded systems 11 Obviously, increase in performance of the programs by the parallel execution with no synchronizations is not considered in the tables. Applying the blocking technique has further improved data locality. For the Parallel SFS sources with the array contraction technique applied the misses/total ratio do not properly render data locality improveplaced in CPU registers and therefore DCU total accesses ment since reused data were factors were decreased. In fact, data locality is better then previously due to usage of the fastest memory registers. The results achieved in the foregoing experiments confirmed the results previously achieved for real multiprocessor computers. They indicated on the significant improvea PowerPC405 processor used in embedded systems ment of the DCU utilization for where well-known optimization techniques to improved data locality were applied within synchronization-free slices. 4. A source-to-source compiler We intend to implement the results of our research in an academic source-to-source compiler. Figure 3 illustrates the structural overview of the software to be build. Figure 3. A structural overview of the software to build based on the results of research The MainController is responsible for managing the execution of all compiler modules. The SlicesExtractionModule implements the method of extracting parallel synchronization-free slices [1]. It makes the extraction of slices from an input C source taking advantage of the Omega Calculator Library [11] to fulfill a dependence analysis. The LoopTransformationModule analyses possible combinations of the slices agglome- scheduling options as well as techniques for improving data locality (i.e. tiling and array contraction). The DataLocalityEstimationModule implements the method of calculating data locality factors. VOPC domain model of the module worked out during research is presented in Fig- ration and applies into output code various space-timure 4. Both latter modules use the linear algebra engine from the Wolfram Research s

12 12 Włodzimierz Bielecki, Krzysztof Kraska Mathematica package. The CodeGenerationModule is responsible for the generation of source code destined for the target architecture; there is the explicit assumption that the tool will be able to generate output code according to the OpenMP2.0 standard. 5. Conclusion Figure 4. VOPC Domain Model of the DataLocalityEstimationModule The estimation of data locality for parallel threads of a loop extracted by means of the method introduced in [1] is a necessary activity to assure optimal performance for a program adjusted to and executed in a targeted architecture. The experiments presented in this paper targeted to an embedded system environment indicate on the identical gains achieved through the increased utilization level of DCU for sources where wellknown optimization techniques to improved data locality were applied. An important observation obtained from the research is that other software components of the system simultaneously worked during the program execution have an unforeseen impact on the cache utilization. For this reason, it is correctly to assume that the available cache size is different for various configurations of the system. To optimize cache utilization, it is worth to estimate the actual size of available cache memory. Let be noticed that the limitations of using the results of our work go from the limitations of the method introduced in [3]. It applies group-reuses only to separate array references that indexes expressions produce the same coefficient matrix A. Our effort is targeted toward the expansion of the presented method to operate the cases where: A i + c = A i + c

13 Increasing data locality of parallel programs executed in embedded systems 13 References [1] Bielecki W., Siedlecki K. Extracting synchronization-free slices in perfectly nested uniform and non-uniform loops. Electonic Modeling, [2] Bielecki W., Kraska K., Siedlecki K. Increasing Program Locality by Extracting Synchronization-Free Slices in Arbitrarily Nested Loops. Proceedings of the Fourteenth International Multi-Conference on Advanced Computer Systems ACS2007, [3] Wolfe M. High Performance Compilers for Parallel Computing. Addison-Wesley, [4] Richardson S. MPOC. A Chip Multiprocessor for Embedded Systems. [online] HP Laboratories, [5] Netlib Repository at UTK and ORNL [online]. [6] Aho A. V., Lam M. S., Sethi R., Ullman J. D. Compilers: Principles, Techniques and Tools, 2nd Edition. Addison-Wesley, [7] IBM PowerPC Multi-Core Instruction Set Simulator. User s Guide, IBM Corporation, [8] IBM RISCWatch Debugger. User s Manual, IBM Corporation, [9] Stasiak A. Klasyfikacja Systemów Wspomagających Proces Przetwarzania i Sterowania. II Konferencja Naukowa KNWS'05, [10] Griebl M. Habilitation. Automatic Parallelization of Loop Programs for Distributed Memory Architectures. Iniversitat Passau, [11] Kelly W., Maslov V., Pugh W., Rosser E., Shpeisman T., Wonnacott D. The omega library interface guide. Technical Report CS-TR-3445, University of Maryland, [12] Chandra R., Dagum L., Kohr D., Maydan D., McDonald J., Menon R. Parallel Programing In OpenMP. Morgan Kaufmann, 2001.

14

15 Passive operating system fingerprinting using neural networks and induction of decision rules Bartosz Bielski, Przemysław Klęsk Szczecin University of Technology, Faculty of Computer Science and Information Technology Abstract: One of the most difficult task for people managing big- or even medium-size computer network is determining the accurate number of hosts that are protected. This information is really helpful for accurately configuring network-based devices such as intrusion detection systems. Exact knowledge of the operating systems (residing in hosts) can be useful for excluding many alerts that cannot apply to a remote operating system that is being examined. In this context, we consider a classification problem (we try to recognize the class of operating system) when some of the characteristics of the system are modified by its user or any other program (e.g. for internet connection tuning). We use neural networks (MLP, RBF) and rule induction techniques. It should be stressed that existing fingerprinting tools get high accuracy results when tested on the clean versions of operating systems, but they fail to detect systems with modified TCP/IP parameters. Keywords: passive OS fingerprinting, TCP/IP fingerprinting, operating systems recognition, neural networks, induction of decision rules 1. Introduction Accurate operating system fingerprinting by passive analysis of the network traffic can be used for maintaining a security access policy. This type of policy may list the types of hosts that are allowed and disallowed (for example administrator can disallow really old versions of operating systems which may have serious bugs). Remote operating systems fingerprinting is the way of determining the operating system of a remote host. It is based on the fact that the the TCP/IP protocol specification does not clearly describe how to use all fields in the TCP and IP header. Due to this fact developers of operating systems implement differently the TCP/IP stack which can be used for identification. Even versions and patches can be identified, because programmers are using e.g. other security features in the systems. Remote operating systems can be identified by three approaches just looking, active and passive fingerprinting. Just looking method is really not accurate and may give inadequate results, because of the easy way to modify given presented information; active scanning provides detailed information by actively sending packets and passive analysis provides real-time (but usually less detailed) information. Nevertheless, scanning consumes hosts resources and network bandwidth and it requires more time on

16 16 Bartosz Bielski, Przemysław Klęsk broad networks. Moreover, it can cause some network devices to stop servicing. Passive fingerprinting hase none of the flaws mentioned above. Figure 1. OSI and TCP/IP stack (source: Passive fingerprinting is a method of recognizing operating systems based only on the packet traffic which is already transmitted. There is no need to send extra packets to remote host, because all the packets may be used to identify attacker or any person that is doing a security audit. A main goal of this research is to determine how accurately remote operating systems can be detected using passive fingerprinting by means of neural networks and induction of decision rules. Other goal is to evaluate the fingerprinting on some usermodified TCP/IP stacks on which current recognition tools fail to work and determine how well neural networks can identify operating systems that were not in the training set. 2. Passive OS fingerprinting existing solutions Based on our observations, which were confirmed by some of earlier researches [3], we can say that currently existing fingerprinting tools are mostly: rule based (very simple rules) or nearest neighbour implementation (usually 1-NN). Using such approach there is no way to accurately fingerprint operating systems having any modifications that were not included in the fingerprinting database of the systems. On the other hand, there is no way to include all such information in the database because of the variety of possible modifications.

17 Passive operating system fingerprinting using neural networks Passive OS fingerprinting using neural networks We try the application of neural networks MLP, RBF to our problem, knowing their successful application in such pattern-recognition areas as: handwriting recognition, identifying vehicles, medicine, etc. The database of the operating systems was taken from the open-source tool named ettercap [13], which at present includes the largest set of the OS examples The structure of values included in the ettercap set of operating systems is presented in Figure 2. WWWW : 4 digit hex field indicating the TCP Window Size MSS : 4 digit hex field indicating the TCP Option Maximum Segment Size if omitted in the packet or unknown it is "_MSS" TTL : 2 digit hex field indicating the IP Time To Live WS : 2 digit hex field indicating the TCP Option Window Scale if omitted in the packet or unknown it is "WS" S : 1 digit field indicating if the TCP Option SACK permitted is true N : 1 digit field indicating if the TCP Options contain a NOP D : 1 digit field indicating if the IP Don't Fragment flag is set T : 1 digit field indicating if the TCP Timestamp is present F : 1 digit ascii field indicating the flag of the packet S = SYN A = SYN + ACK LEN : 2 digit hex field indicating the length of the packet if irrelevant or unknown it is "LT" OS : an ascii string representing the OS Figure 2. TCP/IP parameters used to identify operating system (source: ettercap database) First of all, different detailed versions of operating systems were grouped into larger classes in order to have a sensible proportion: number of examples / number of classes, see Table 1. Experiments in which we tried to identify the exact OS version were conducted later. As seen on Figure 3 in state of full knowledge about operating systems and full trust researched neural network can identify systems with about 100% probability, just like current rule-based tools. There is already very rare situation when we can give trust computers and systems we do not own.

18 18 Bartosz Bielski, Przemysław Klęsk Table 1. Operating systems classes Pos. OS class Number of examples 1. windows linux bsd other solaris unix mac_os network modem/router cisco device network printer 39 Figure 3. Results of recognition by many kinds of neural networks When the knowledge and trust drops and especially when we cannot trust remote systems are clean and unmodified, neural network get really good prediction results. The good scores are especially valuable when there is no strict signature in the database of operating systems so that system cannot be recognised at all. As seen on Figure 4 we compared best neural network from earlier researches (3- layer multi layer perceptron network MLP with 10 neurons in every hidden layer) with multi-stage neural network architecture that can detect operating system version

19 Passive operating system fingerprinting using neural networks 19 too. The multi-stage architecture was build only for systems that meet the minimum 1% occurrence of quantity (Windows, Linux, BSD, etc). Figure 4. Results by recognition depth Figure 5. Best neural network topology (3 layers, 10 neurons in every hidden layer) One should note that: for modified TCP/IP stacks and when the original signatures were not placed in the training set the network gives 97,7% correct classification rate. When trying to additionally determine the exact version of the OS the rate dropped, but still was very high 85%. 4. Induction of decision rules, Pareto-optimal optimal rules To have a better understanding of the data set we also decided to do the induction of decision rules. Discovering interesting and statistically relevant rules may allow to perform simple OS fingerprinting without a neural network classifier, since if-then rules are of high interpretive value for humans.

20 20 Bartosz Bielski, Przemysław Klęsk 4.1. Greedy induction of decision rules Say we want to find all possible rules with the length of premise equal to p, i.e. in the premise there are exactly p terms connected with and. For example, when p = 3 a possible rule is: if ( x = 2) and ( x = 3) and ( x = 1) then ( y = 2) p=3 The algorithm to find all such rules can be named as greedy meaning that we will ( ) iterate over all n p combinations of input variables x j and for each single combination we will also iterate over all possible settings of values for these variables. The exact total number of iterations in such an algorithm (and in the same time the total number of rules) can be calculated as follows. Let n, p ( ) C be the set of all n p combinations of indices of variables. E.g.: C = {(1,2),(1,3),(1,4),(2,3),(2,4),(3,4)}. The 4,2 exact number of iterations is then equal to m m m j, j,, j p C n p ( 1 2 ), j 1 j 2 j p And if we wanted to find all rules with premises of length equal to p or less than p then the number of iterations (and rules) is. (1) p m m m k j, j,, j k C n k =1 ( 1 2 ), j 1 j 2 j k. (2) For a single fixed premise what should be the value chosen as the decision? Let X be a general notation for the premise and Y for the decision, e.g.: if ( x = 2) and ( x = 3) and ( x = 1) then ( y = 2) X = x Y = y Then, for a fixed premise X = x we deal with a certain conditional probability distribution of decisions P( Y X = x ). In other words, from the whole data set we take the subset containing only the cases where X = x and within this subset we look at the distribution of different decisions y {1, 2,, m y }. As the decision value we choose such y for which P( Y = y X = x ) is maximal Rule assessment measures Each rule should be assigned a certain number assessing how interesting this rule is and how statistically relevant it is for the decision. The most basic and common meas-

Proposal of thesis topic for mgr in. (MSE) programme in Telecommunications and Computer Science

Proposal of thesis topic for mgr in. (MSE) programme in Telecommunications and Computer Science Proposal of thesis topic for mgr in (MSE) programme 1 Topic: Monte Carlo Method used for a prognosis of a selected technological process 2 Supervisor: Dr in Małgorzata Langer 3 Auxiliary supervisor: 4

Bardziej szczegółowo

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi SNMP Protocol The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission

Bardziej szczegółowo

Fig 5 Spectrograms of the original signal (top) extracted shaft-related GAD components (middle) and

Fig 5 Spectrograms of the original signal (top) extracted shaft-related GAD components (middle) and Fig 4 Measured vibration signal (top). Blue original signal. Red component related to periodic excitation of resonances and noise. Green component related. Rotational speed profile used for experiment

Bardziej szczegółowo

Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip)

Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip) Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip) Embeded systems Architektura układów PSoC (Cypress) Możliwości bloków cyfrowych i analogowych Narzędzia

Bardziej szczegółowo

ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS.

ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS. ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS. Strona 1 1. Please give one answer. I am: Students involved in project 69% 18 Student not involved in

Bardziej szczegółowo

Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH

Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH Kierunek Elektronika i Telekomunikacja, Studia II stopnia Specjalność: Systemy wbudowane Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH Zagadnienia

Bardziej szczegółowo

Cracow University of Economics Poland. Overview. Sources of Real GDP per Capita Growth: Polish Regional-Macroeconomic Dimensions 2000-2005

Cracow University of Economics Poland. Overview. Sources of Real GDP per Capita Growth: Polish Regional-Macroeconomic Dimensions 2000-2005 Cracow University of Economics Sources of Real GDP per Capita Growth: Polish Regional-Macroeconomic Dimensions 2000-2005 - Key Note Speech - Presented by: Dr. David Clowes The Growth Research Unit CE Europe

Bardziej szczegółowo

Configuring and Testing Your Network

Configuring and Testing Your Network Configuring and Testing Your Network Network Fundamentals Chapter 11 Version 4.0 1 Konfigurowanie i testowanie Twojej sieci Podstawy sieci Rozdział 11 Version 4.0 2 Objectives Define the role of the Internetwork

Bardziej szczegółowo

Krytyczne czynniki sukcesu w zarządzaniu projektami

Krytyczne czynniki sukcesu w zarządzaniu projektami Seweryn SPAŁEK Krytyczne czynniki sukcesu w zarządzaniu projektami MONOGRAFIA Wydawnictwo Politechniki Śląskiej Gliwice 2004 SPIS TREŚCI WPROWADZENIE 5 1. ZARZĄDZANIE PROJEKTAMI W ORGANIZACJI 13 1.1. Zarządzanie

Bardziej szczegółowo

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to students

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to students Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl Back Twoje konto Wyloguj magda.szewczyk@slo-wroc.pl BIODIVERSITY OF RIVERS: Survey to students Tworzenie ankiety Udostępnianie Analiza (55) Wyniki

Bardziej szczegółowo

2014-3-30. Urbanek J., Jabłoński A., Barszcz T ssswedfsdfurbanek J., Jabłoński A., Barszcz T., Wykonanie pomiarów

2014-3-30. Urbanek J., Jabłoński A., Barszcz T ssswedfsdfurbanek J., Jabłoński A., Barszcz T., Wykonanie pomiarów Wykonanie pomiarów sygnałów wibroakustycznych przy stałych oraz zmiennych warunkach eksploatacyjnych na stanowisku testowym. Część II: Analiza poprawności pomiarów. Autorzy: Urbanek J., Jabłoński A., Barszcz

Bardziej szczegółowo

Politechnika Krakowska im. Tadeusza Kościuszki. Karta przedmiotu. obowiązuje studentów rozpoczynających studia w roku akademickim 2014/2015

Politechnika Krakowska im. Tadeusza Kościuszki. Karta przedmiotu. obowiązuje studentów rozpoczynających studia w roku akademickim 2014/2015 Politechnika Krakowska im. Tadeusza Kościuszki Karta przedmiotu Wydział Inżynierii Środowiska obowiązuje studentów rozpoczynających studia w roku akademickim 014/015 Kierunek studiów: Inżynieria Środowiska

Bardziej szczegółowo

Instrukcja konfiguracji usługi Wirtualnej Sieci Prywatnej w systemie Mac OSX

Instrukcja konfiguracji usługi Wirtualnej Sieci Prywatnej w systemie Mac OSX UNIWERSYTETU BIBLIOTEKA IEGO UNIWERSYTETU IEGO Instrukcja konfiguracji usługi Wirtualnej Sieci Prywatnej w systemie Mac OSX 1. Make a new connection Open the System Preferences by going to the Apple menu

Bardziej szczegółowo

Effective Governance of Education at the Local Level

Effective Governance of Education at the Local Level Effective Governance of Education at the Local Level Opening presentation at joint Polish Ministry OECD conference April 16, 2012, Warsaw Mirosław Sielatycki Ministry of National Education Doskonalenie

Bardziej szczegółowo

Presented by. Dr. Morten Middelfart, CTO

Presented by. Dr. Morten Middelfart, CTO Meeting Big Data challenges in Leadership with Human-Computer Synergy. Presented by Dr. Morten Middelfart, CTO Big Data Data that exists in such large amounts or in such unstructured form that it is difficult

Bardziej szczegółowo

Projekt: Mikro zaprogramowane na sukces!

Projekt: Mikro zaprogramowane na sukces! Projekt współfinansowany przez Unię Europejską w ramach Europejskiego Funduszu Społecznego Projekt: Mikro zaprogramowane na sukces! Opis autoryzowanych szkoleń Oracle planowanych do realizacji w ramach

Bardziej szczegółowo

TACHOGRAPH SIMULATOR DTCOSIM

TACHOGRAPH SIMULATOR DTCOSIM TACHOGRAPH SIMULATOR DTCOSIM Service Manual USB-KSIM interface General description The simulator is a device that is used as a replacement for tachograph in the vehicle where the tachograph is not mandatory,

Bardziej szczegółowo

Cracow University of Economics Poland

Cracow University of Economics Poland Cracow University of Economics Poland Sources of Real GDP per Capita Growth: Polish Regional-Macroeconomic Dimensions 2000-2005 - Keynote Speech - Presented by: Dr. David Clowes The Growth Research Unit,

Bardziej szczegółowo

Evaluation of the main goal and specific objectives of the Human Capital Operational Programme

Evaluation of the main goal and specific objectives of the Human Capital Operational Programme Pracownia Naukowo-Edukacyjna Evaluation of the main goal and specific objectives of the Human Capital Operational Programme and the contribution by ESF funds towards the results achieved within specific

Bardziej szczegółowo

PROJECT. Syllabus for course Global Marketing. on the study program: Management

PROJECT. Syllabus for course Global Marketing. on the study program: Management Poznań, 2012, September 20th Doctor Anna Scheibe adiunct in the Department of Economic Sciences PROJECT Syllabus for course Global Marketing on the study program: Management I. General information 1. Name

Bardziej szczegółowo

P R A C A D Y P L O M O W A

P R A C A D Y P L O M O W A POLITECHNIKA POZNAŃSKA Wydział Maszyn Roboczych i Transportu P R A C A D Y P L O M O W A Autor: inż. METODA Ε-CONSTRAINTS I PRZEGLĄDU FRONTU PARETO W ZASTOSOWANIU DO ROZWIĄZYWANIA PROBLEMU OPTYMALIZACJI

Bardziej szczegółowo

LEARNING AGREEMENT FOR STUDIES

LEARNING AGREEMENT FOR STUDIES LEARNING AGREEMENT FOR STUDIES The Student First and last name(s) Nationality E-mail Academic year 2014/2015 Study period 1 st semester 2 nd semester Study cycle Bachelor Master Doctoral Subject area,

Bardziej szczegółowo

Cel szkolenia. Konspekt

Cel szkolenia. Konspekt Cel szkolenia About this CourseThis 5-day course provides administrators with the knowledge and skills needed to deploy and ma Windows 10 desktops, devices, and applications in an enterprise environment.

Bardziej szczegółowo

UMOWY WYPOŻYCZENIA KOMENTARZ

UMOWY WYPOŻYCZENIA KOMENTARZ UMOWY WYPOŻYCZENIA KOMENTARZ Zaproponowany dla krajów Unii Europejskiej oraz dla wszystkich zainteresowanych stron wzór Umowy wypożyczenia między muzeami i instytucjami kultury opracowany został przez

Bardziej szczegółowo

How much does SMARTech system cost?

How much does SMARTech system cost? 1. How much does an intelligent home system cost? With over six years of experience in construction of Intelligent Home Systems we have done a value analysis of systems and services usually purchased by

Bardziej szczegółowo

PROGRAM STAŻU. IBM Global Services Delivery Centre Sp z o.o. Nazwa podmiotu oferującego staż / Company name. Muchoborska 8, 54-424 Wroclaw

PROGRAM STAŻU. IBM Global Services Delivery Centre Sp z o.o. Nazwa podmiotu oferującego staż / Company name. Muchoborska 8, 54-424 Wroclaw PROGRAM STAŻU Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o. Miejsce odbywania stażu / Legal address Muchoborska 8, 54-424 Wroclaw Stanowisko, obszar działania/

Bardziej szczegółowo

PRZEWODNIK PO PRZEDMIOCIE. Negotiation techniques. Management. Stationary. II degree

PRZEWODNIK PO PRZEDMIOCIE. Negotiation techniques. Management. Stationary. II degree Politechnika Częstochowska, Wydział Zarządzania PRZEWODNIK PO PRZEDMIOCIE Nazwa przedmiotu Kierunek Forma studiów Poziom kwalifikacji Rok Semestr Jednostka prowadząca Osoba sporządzająca Profil Rodzaj

Bardziej szczegółowo

Planning and Cabling Networks

Planning and Cabling Networks Planning and Cabling Networks Network Fundamentals Chapter 10 Version 4.0 1 Projektowanie okablowania i sieci Podstawy sieci Rozdział 10 Version 4.0 2 Objectives Identify the basic network media required

Bardziej szczegółowo

POLITYKA PRYWATNOŚCI / PRIVACY POLICY

POLITYKA PRYWATNOŚCI / PRIVACY POLICY POLITYKA PRYWATNOŚCI / PRIVACY POLICY TeleTrade DJ International Consulting Ltd Sierpień 2013 2011-2014 TeleTrade-DJ International Consulting Ltd. 1 Polityka Prywatności Privacy Policy Niniejsza Polityka

Bardziej szczegółowo

PROJECT. Syllabus for course Principles of Marketing. on the study program: Administration

PROJECT. Syllabus for course Principles of Marketing. on the study program: Administration Poznań, 2012, September 20th Doctor Anna Scheibe adiunct in the Department of Economic Sciences PROJECT Syllabus for course Principles of Marketing on the study program: Administration I. General information

Bardziej szczegółowo

No matter how much you have, it matters how much you need

No matter how much you have, it matters how much you need CSR STRATEGY KANCELARIA FINANSOWA TRITUM GROUP SP. Z O.O. No matter how much you have, it matters how much you need Kancelaria Finansowa Tritum Group Sp. z o.o. was established in 2007 we build trust among

Bardziej szczegółowo

Brief description of the paper/report. Chain 90% 10% District

Brief description of the paper/report. Chain 90% 10% District Brief description of the paper/report Item Identification Card (IIC) Process Structure Design Produce Deliver Analyse and Understand Chain 90% 10% District Argument Supply Chain Planning Process. Proces

Bardziej szczegółowo

Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading)

Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading) Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading) ROGER sp.j. Gościszewo 59 82-416 Gościszewo Poland tel. 055 2720132 fax 055 2720133 www.roger.pl

Bardziej szczegółowo

Financial support for start-uppres. Where to get money? - Equity. - Credit. - Local Labor Office - Six times the national average wage (22000 zł)

Financial support for start-uppres. Where to get money? - Equity. - Credit. - Local Labor Office - Six times the national average wage (22000 zł) Financial support for start-uppres Where to get money? - Equity - Credit - Local Labor Office - Six times the national average wage (22000 zł) - only for unymployed people - the company must operate minimum

Bardziej szczegółowo

Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is

Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is 1. Introduction Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is made of aluminum and steel mesh as one of the coolest enclosures available. It s also small

Bardziej szczegółowo

ROZPRAWY NR 128. Stanis³aw Mroziñski

ROZPRAWY NR 128. Stanis³aw Mroziñski UNIWERSYTET TECHNOLOGICZNO-PRZYRODNICZY IM. JANA I JÊDRZEJA ŒNIADECKICH W BYDGOSZCZY ROZPRAWY NR 128 Stanis³aw Mroziñski STABILIZACJA W ASNOŒCI CYKLICZNYCH METALI I JEJ WP YW NA TRWA OŒÆ ZMÊCZENIOW BYDGOSZCZ

Bardziej szczegółowo

Filozofia z elementami logiki Klasyfikacja wnioskowań I część 2

Filozofia z elementami logiki Klasyfikacja wnioskowań I część 2 Filozofia z elementami logiki Klasyfikacja wnioskowań I część 2 Mariusz Urbański Instytut Psychologii UAM Mariusz.Urbanski@amu.edu.pl Plan: definicja pojęcia wnioskowania wypowiedzi inferencyjne i wypowiedzi

Bardziej szczegółowo

Unit of Social Gerontology, Institute of Labour and Social Studies ageing and its consequences for society

Unit of Social Gerontology, Institute of Labour and Social Studies ageing and its consequences for society Prof. Piotr Bledowski, Ph.D. Institute of Social Economy, Warsaw School of Economics local policy, social security, labour market Unit of Social Gerontology, Institute of Labour and Social Studies ageing

Bardziej szczegółowo

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to teachers

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to teachers 1 z 7 2015-05-14 18:32 Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl Back Twoje konto Wyloguj magda.szewczyk@slo-wroc.pl BIODIVERSITY OF RIVERS: Survey to teachers Tworzenie ankiety Udostępnianie

Bardziej szczegółowo

PROGRAM STAŻU. Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o.

PROGRAM STAŻU. Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o. PROGRAM STAŻU Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o. Miejsce odbywania stażu / Legal address Muchoborska 8, 54-424 Wroclaw Stanowisko, obszar działania/

Bardziej szczegółowo

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian 1 / 12 Content list / Spis Treści 1. Hardware and software requirements, preparing device to upgrade Wymagania sprzętowe i programowe, przygotowanie urządzenia do aktualizacji 2. Installing drivers needed

Bardziej szczegółowo

EaglePCB_2_FreeCAD (beta)

EaglePCB_2_FreeCAD (beta) EaglePCB_2_FreeCAD (beta) Import your boards to FreeCAD marmni (marmni@onet.eu) Copyright 2013, 2014 http://sourceforge.net/projects/eaglepcb2freecad/ [ENG] Mod EaglePCB_2_FreeCAD allow you to import PCB

Bardziej szczegółowo

4D and 5D applications in BIM technology.

4D and 5D applications in BIM technology. 4D and 5D applications in BIM technology. Datacomp Grzegorzecka 79 street, 31-559 Cracow, Poland Paweł Kogut p.kogut@datacomp.com.pl Andrzej Tomana a.tomana@datacomp.com.pl Plan Who we are? Experience.

Bardziej szczegółowo

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian 1 / 14 Content list / Spis Treści 1. Hardware and software requirements, preparing device to upgrade Wymagania sprzętowe i programowe, przygotowanie urządzenia do aktualizacji 2. Installing drivers and

Bardziej szczegółowo

18. Przydatne zwroty podczas egzaminu ustnego. 19. Mo liwe pytania egzaminatora i przyk³adowe odpowiedzi egzaminowanego

18. Przydatne zwroty podczas egzaminu ustnego. 19. Mo liwe pytania egzaminatora i przyk³adowe odpowiedzi egzaminowanego 18. Przydatne zwroty podczas egzaminu ustnego I m sorry, could you repeat that, please? - Przepraszam, czy mo na prosiæ o powtórzenie? I m sorry, I don t understand. - Przepraszam, nie rozumiem. Did you

Bardziej szczegółowo

How to translate Polygons

How to translate Polygons How to translate Polygons Translation procedure. 1) Open polygons.img in Imagine 2) Press F4 to open Memory Window 3) Find and edit tlumacz class, edit all the procedures (listed below) 4) Invent a new

Bardziej szczegółowo

DETECTION OF MATERIAL INTEGRATED CONDUCTORS FOR CONNECTIVE RIVETING OF FUNCTION-INTEGRATIVE TEXTILE-REINFORCED THERMOPLASTIC COMPOSITES

DETECTION OF MATERIAL INTEGRATED CONDUCTORS FOR CONNECTIVE RIVETING OF FUNCTION-INTEGRATIVE TEXTILE-REINFORCED THERMOPLASTIC COMPOSITES Kompozyty 11: 2 (2011) 152-156 Werner A. Hufenbach, Frank Adam, Maik Gude, Ivonne Körner, Thomas Heber*, Anja Winkler Technische Universität Dresden, Institute of Lightweight Engineering and Polymer Technology

Bardziej szczegółowo

(duzo, przeczytac raz i zrozumiec powinno wystarczyc. To jest proste.)

(duzo, przeczytac raz i zrozumiec powinno wystarczyc. To jest proste.) 39. Typy indeksowania w hurtowniach danych. (duzo, przeczytac raz i zrozumiec powinno wystarczyc. To jest proste.) Po co inne niŝ B-Tree? Bo B-Tree w hurtowniach danych jest zbyt mało efektywny. Oprócz

Bardziej szczegółowo

Egzamin maturalny z języka angielskiego na poziomie dwujęzycznym Rozmowa wstępna (wyłącznie dla egzaminującego)

Egzamin maturalny z języka angielskiego na poziomie dwujęzycznym Rozmowa wstępna (wyłącznie dla egzaminującego) 112 Informator o egzaminie maturalnym z języka angielskiego od roku szkolnego 2014/2015 2.6.4. Część ustna. Przykładowe zestawy zadań Przykładowe pytania do rozmowy wstępnej Rozmowa wstępna (wyłącznie

Bardziej szczegółowo

Why choose No Hau Studio?

Why choose No Hau Studio? Why choose No Hau Studio? We ve been perfecting our skills for over 10 years. Branding and Communications are the core of our activities. B2B is our speciality. Customer s Satisfaction is our priority.

Bardziej szczegółowo

Angielski Biznes Ciekawie

Angielski Biznes Ciekawie Angielski Biznes Ciekawie Conditional sentences (type 2) 1. Discuss these two types of mindsets. 2. Decide how each type would act. 3. How would you act? Czy nauka gramatyki języka angielskiego jest trudna?

Bardziej szczegółowo

photo graphic Jan Witkowski Project for exhibition compositions typography colors : +48 506 780 943 : janwi@janwi.com

photo graphic Jan Witkowski Project for exhibition compositions typography colors : +48 506 780 943 : janwi@janwi.com Jan Witkowski : +48 506 780 943 : janwi@janwi.com Project for exhibition photo graphic compositions typography colors Berlin London Paris Barcelona Vienna Prague Krakow Zakopane Jan Witkowski ARTIST FROM

Bardziej szczegółowo

Łukasz Reszka Wiceprezes Zarządu

Łukasz Reszka Wiceprezes Zarządu Łukasz Reszka Wiceprezes Zarządu Time for changes! Vocational activisation young unemployed people aged 15 to 24 Projekt location Ząbkowice Śląskie project produced in cooperation with Poviat Labour Office

Bardziej szczegółowo

Z-LOG-1070 Towaroznawstwo Commodity Studies. Logistics 1st degree (1st degree / 2nd degree) General (general / practical)

Z-LOG-1070 Towaroznawstwo Commodity Studies. Logistics 1st degree (1st degree / 2nd degree) General (general / practical) MODULE DESCRIPTION Z-LOG-1070 Towaroznawstwo Commodity Studies Module code Module name Module name in English Valid from academic year 2012/2013 MODULE PLACEMENT IN THE SYLLABUS Subject Level of education

Bardziej szczegółowo

Please fill in the questionnaire below. Each person who was involved in (parts of) the project can respond.

Please fill in the questionnaire below. Each person who was involved in (parts of) the project can respond. Project CARETRAINING PROJECT EVALUATION QUESTIONNAIRE Projekt CARETRAINING KWESTIONARIUSZ EWALUACJI PROJEKTU Please fill in the questionnaire below. Each person who was involved in (parts of) the project

Bardziej szczegółowo

Programowanie. Sylwester Arabas. prowadzący ćwiczenia: Magdalena Kuich, Krzysztof Piasecki, Łukasz Dulny. Wydział Fizyki Uniwersytetu Warszawskiego

Programowanie. Sylwester Arabas. prowadzący ćwiczenia: Magdalena Kuich, Krzysztof Piasecki, Łukasz Dulny. Wydział Fizyki Uniwersytetu Warszawskiego Programowanie Sylwester Arabas prowadzący ćwiczenia: Magdalena Kuich, Krzysztof Piasecki, Łukasz Dulny Wydział Fizyki Uniwersytetu Warszawskiego wykład VII 8. kwietnia 2015 r. na ostatnim wykładzie...

Bardziej szczegółowo

A DIFFERENT APPROACH WHERE YOU NEED TO NAVIGATE IN THE CURRENT STREAMS AND MOVEMENTS WHICH ARE EMBEDDED IN THE CULTURE AND THE SOCIETY

A DIFFERENT APPROACH WHERE YOU NEED TO NAVIGATE IN THE CURRENT STREAMS AND MOVEMENTS WHICH ARE EMBEDDED IN THE CULTURE AND THE SOCIETY A DIFFERENT APPROACH WHERE YOU NEED TO NAVIGATE IN THE CURRENT STREAMS AND MOVEMENTS WHICH ARE EMBEDDED IN THE CULTURE AND THE SOCIETY ODMIENNE PODEJŚCIE JAK NAWIGOWAĆ W OBECNYCH NURTACH I RUCHACH, KTÓRE

Bardziej szczegółowo

Akademia Morska w Szczecinie. Wydział Mechaniczny

Akademia Morska w Szczecinie. Wydział Mechaniczny Akademia Morska w Szczecinie Wydział Mechaniczny ROZPRAWA DOKTORSKA mgr inż. Marcin Kołodziejski Analiza metody obsługiwania zarządzanego niezawodnością pędników azymutalnych platformy pływającej Promotor:

Bardziej szczegółowo

EGARA 2011. Adam Małyszko FORS. POLAND - KRAKÓW 2-3 12 2011r

EGARA 2011. Adam Małyszko FORS. POLAND - KRAKÓW 2-3 12 2011r EGARA 2011 Adam Małyszko FORS POLAND - KRAKÓW 2-3 12 2011r HISTORIA ELV / HISTORY ELV 1992r. 5 Program działań na rzecz ochrony środowiska / EAP (Environmental Action Plan) 1994r. Strategia dobrowolnego

Bardziej szczegółowo

Working Tax Credit Child Tax Credit Jobseeker s Allowance

Working Tax Credit Child Tax Credit Jobseeker s Allowance Benefits Depending on your residency status (EU citizen or not) there are various benefits available to help you with costs of living. A8 nationals need to have been working for a year and be registered

Bardziej szczegółowo

Analiza Sieci Społecznych Pajek

Analiza Sieci Społecznych Pajek Analiza Sieci Społecznych Pajek Dominik Batorski Instytut Socjologii UW 3 czerwca 2016 1 Wprowadzenie Regularności we wzorach relacji często są nazywane strukturą. Analiza sieci społecznych jest zbiorem

Bardziej szczegółowo

Perspektywy PDF. ==>Download: Perspektywy PDF ebook By 0

Perspektywy PDF. ==>Download: Perspektywy PDF ebook By 0 Perspektywy PDF ==>Download: Perspektywy PDF ebook By 0 Perspektywy PDF By 0 - Are you searching for Perspektywy pdf Books? Now, you will be happy that Perspektywy PDF is available at our online library

Bardziej szczegółowo

Logistics 1st degree (1st degree / 2nd degree) General (general / practical)

Logistics 1st degree (1st degree / 2nd degree) General (general / practical) MODULE DESCRIPTION Module code Module name Module name in English Valid from academic year 2012/2013 MODULE PLACEMENT IN THE SYLLABUS Z-LOG-1074 Zarządzanie relacjami z klientami Customer Relationship

Bardziej szczegółowo

Health Resorts Pearls of Eastern Europe Innovative Cluster Health and Tourism

Health Resorts Pearls of Eastern Europe Innovative Cluster Health and Tourism Health Resorts Pearls of Eastern Europe Innovative Cluster Health and Tourism Projekt finansowany Fundusze Europejskie z budżetu państwa dla rozwoju oraz ze Polski środków Wschodniej Unii Europejskiej

Bardziej szczegółowo

A n g i e l s k i. Phrasal Verbs in Situations. Podręcznik z ćwiczeniami. Dorota Guzik Joanna Bruska FRAGMENT

A n g i e l s k i. Phrasal Verbs in Situations. Podręcznik z ćwiczeniami. Dorota Guzik Joanna Bruska FRAGMENT A n g i e l s k i Phrasal Verbs in Situations Podręcznik z ćwiczeniami FRAGMENT Dorota Guzik Joanna Bruska Autorzy: Dorota Guzik, Joanna Bruska Konsultacja językowa: Tadeusz Z. Wolański Lektorzy: Maybe

Bardziej szczegółowo

ANKIETA ŚWIAT BAJEK MOJEGO DZIECKA

ANKIETA ŚWIAT BAJEK MOJEGO DZIECKA Przedszkole Nr 1 w Zabrzu ANKIETA ul. Reymonta 52 41-800 Zabrze tel./fax. 0048 32 271-27-34 p1zabrze@poczta.onet.pl http://jedyneczka.bnet.pl ŚWIAT BAJEK MOJEGO DZIECKA Drodzy Rodzice. W związku z realizacją

Bardziej szczegółowo

Call 2013 national eligibility criteria and funding rates

Call 2013 national eligibility criteria and funding rates Call 2013 national eligibility criteria and funding rates POLAND a) National eligibility criteria Funding Organisation National Contact Point National Center for Research and Development (Narodowe Centrum

Bardziej szczegółowo

Bazy danych Ćwiczenia z SQL

Bazy danych Ćwiczenia z SQL Bazy danych Ćwiczenia z SQL W ćwiczeniach wykorzystano przyk adowy schemat bazy danych dostarczany z Personal Oracle 8 Definicję schematu i dane tabel zawiera plik bdemobld sql (c) 2001 Katedra Informatyki

Bardziej szczegółowo

Auschwitz and Birkenau Concentration Camp Records, 1940 1945 RG 15.191M

Auschwitz and Birkenau Concentration Camp Records, 1940 1945 RG 15.191M Auschwitz and Birkenau Concentration Camp Records, 1940 1945 RG 15.191M United States Holocaust Memorial Museum Archive 100 Raoul Wallenberg Place SW Washington, DC 20024 2126 Tel. (202) 479 9717 Email:

Bardziej szczegółowo

Addressing the Network IPv4

Addressing the Network IPv4 Addressing the Network IPv4 Network Fundamentals Chapter 6 Version 4.0 1 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8-bit binary and decimal numbers.

Bardziej szczegółowo

PORTS AS LOGISTICS CENTERS FOR CONSTRUCTION AND OPERATION OF THE OFFSHORE WIND FARMS - CASE OF SASSNITZ

PORTS AS LOGISTICS CENTERS FOR CONSTRUCTION AND OPERATION OF THE OFFSHORE WIND FARMS - CASE OF SASSNITZ Part-financed by EU South Baltic Programme w w w. p t m e w. p l PROSPECTS OF THE OFFSHORE WIND ENERGY DEVELOPMENT IN POLAND - OFFSHORE WIND INDUSTRY IN THE COASTAL CITIES AND PORT AREAS PORTS AS LOGISTICS

Bardziej szczegółowo

Analiza Sieci Społecznych Pajek

Analiza Sieci Społecznych Pajek Analiza Sieci Społecznych Pajek Dominik Batorski Instytut Socjologii UW 25 marca 2005 1 Wprowadzenie Regularności we wzorach relacji często są nazywane strukturą. Analiza sieci społecznych jest zbiorem

Bardziej szczegółowo

Sustainable mobility: strategic challenge for Polish cities on the example of city of Gdynia

Sustainable mobility: strategic challenge for Polish cities on the example of city of Gdynia Katedra Rynku Transportowego Sustainable mobility: strategic challenge for Polish cities on the example of city of Gdynia dr Marcin Wołek Department of Transportation Market University of Gdansk Warsaw,

Bardziej szczegółowo

1945 (96,1%) backlinks currently link back. 1505 (74,4%) links bear full SEO value. 0 links are set up using embedded object

1945 (96,1%) backlinks currently link back. 1505 (74,4%) links bear full SEO value. 0 links are set up using embedded object Website Backlinks Analysis Report 2023 backlinks from 224 domains Report created: Jan 3, 2015 Website: http://wpisz.stronę.odbiorcy Compared with: 7 day(s) old Domain Statistics The domain seo.zgred.pl

Bardziej szczegółowo

Extraclass. Football Men. Season 2009/10 - Autumn round

Extraclass. Football Men. Season 2009/10 - Autumn round Extraclass Football Men Season 2009/10 - Autumn round Invitation Dear All, On the date of 29th July starts the new season of Polish Extraclass. There will be live coverage form all the matches on Canal+

Bardziej szczegółowo

Estimation and planing. Marek Majchrzak, Andrzej Bednarz Wroclaw, 06.07.2011

Estimation and planing. Marek Majchrzak, Andrzej Bednarz Wroclaw, 06.07.2011 Estimation and planing Marek Majchrzak, Andrzej Bednarz Wroclaw, 06.07.2011 Story points Story points C D B A E Story points C D 100 B A E Story points C D 2 x 100 100 B A E Story points C D 2 x 100 100

Bardziej szczegółowo

Nauka Przyroda Technologie

Nauka Przyroda Technologie Nauka Przyroda Technologie ISSN 1897-7820 http://www.npt.up-poznan.net Dział: Rolnictwo Copyright Wydawnictwo Uniwersytetu Przyrodniczego w Poznaniu 2010 Tom 4 Zeszyt 4 ALICJA SZABELSKA 1, MICHAŁ SIATKOWSKI

Bardziej szczegółowo

Traceability. matrix

Traceability. matrix Traceability matrix Radek Smilgin W testowaniu od 2002 roku Tester, test manager, konsultant Twórca testerzy.pl i mistrzostw w testowaniu Fan testowania eksploracyjnego i testowania w agile [zdjecie wikipedia:

Bardziej szczegółowo

Zastosowanie Internetu w małych i średnich przedsiębiorstwach

Zastosowanie Internetu w małych i średnich przedsiębiorstwach Akademia Ekonomiczna w Poznaniu Wydział Zarządzania Specjalność: Inwestycje Kapitałowe i Strategie Finansowe Przedsiębiorstw Zastosowanie Internetu w małych i średnich przedsiębiorstwach Michał Goc Praca

Bardziej szczegółowo

OSTC GLOBAL TRADING CHALLENGE MANUAL

OSTC GLOBAL TRADING CHALLENGE MANUAL OSTC GLOBAL TRADING CHALLENGE MANUAL Wrzesień 2014 www.ostc.com/game Po zarejestrowaniu się w grze OSTC Global Trading Challenge, zaakceptowaniu oraz uzyskaniu dostępu to produktów, użytkownik gry będzie

Bardziej szczegółowo

COMPUTERISED MAINTENANCE MANAGEMENT SYSTEMS

COMPUTERISED MAINTENANCE MANAGEMENT SYSTEMS COMPUTERISED MAINTENANCE MANAGEMENT SYSTEMS ROBERT KOSTEK University of Technology and Life Sciences Summary The paper presents programs dedicated to computerised maintenance management systems (CMMS).

Bardziej szczegółowo

Po powtórce zaczynamy naukę kolejnych 10-15 nowych słów i wyrażeń, po czym zostawiamy je w przegródce numer 1. Systematyczność

Po powtórce zaczynamy naukę kolejnych 10-15 nowych słów i wyrażeń, po czym zostawiamy je w przegródce numer 1. Systematyczność Fiszki, metoda powtórkowa. System pięciu przegródek Pierwszego dnia nauki możemy zacząć od przyswojenia 10-15 nowych słówek. Wkładamy je wtedy do przegródki numer 1. Kolejnego dnia zaczynamy od powtórki

Bardziej szczegółowo

Domy inaczej pomyślane A different type of housing CEZARY SANKOWSKI

Domy inaczej pomyślane A different type of housing CEZARY SANKOWSKI Domy inaczej pomyślane A different type of housing CEZARY SANKOWSKI O tym, dlaczego warto budować pasywnie, komu budownictwo pasywne się opłaca, a kto się go boi, z architektem, Cezarym Sankowskim, rozmawia

Bardziej szczegółowo

A. WAN1/WAN2 Interface and LAN NAT/Routing host. B. VPN Host and LAN NAT Host. C. An example using Part A and B

A. WAN1/WAN2 Interface and LAN NAT/Routing host. B. VPN Host and LAN NAT Host. C. An example using Part A and B This document introduces the Load-Balance/RoutePolicy. In real world, we need various kinds of routing rules to fulfill many different usages, and the Load-Balance/RoutePolicy is aiming to provide an integrated

Bardziej szczegółowo

Testy penetracyjne Przykłady programów

Testy penetracyjne Przykłady programów Bezpieczeństwo systemów informatycznych Testy penetracyjne Przykłady programów Zbigniew Suski 1 Rekonesans - przykłady Zbigniew Suski 2 Rekonesans - przykłady Zbigniew Suski 3 Rekonesans - przykłady Zbigniew

Bardziej szczegółowo

Early exit from a function as method of code optimization in the component environments

Early exit from a function as method of code optimization in the component environments Early exit from a function as method of code optimization in the component environments Wcześniejsze wychodzenie z funkcji jako metoda optymalizacji kodu w środowiskach komponentowych M. KNIOTEK kniotek@agh.edu.pl

Bardziej szczegółowo

TRANSPORT W RODZINNYCH GOSPODARSTWACH ROLNYCH

TRANSPORT W RODZINNYCH GOSPODARSTWACH ROLNYCH INŻYNIERIA W ROLNICTWIE. MONOGRAFIE 16 ENGINEERING IN AGRICULTURE. MONOGRAPHS 16 WIESŁAW GOLKA TRANSPORT W RODZINNYCH GOSPODARSTWACH ROLNYCH TRANSPORTATION IN RURAL FAMILY FARMS Falenty 2014 WYDAWNICTWO

Bardziej szczegółowo

The use of objective statistical processing for presenting the data in scientific publications

The use of objective statistical processing for presenting the data in scientific publications The use of objective statistical processing for presenting the data in scientific publications Zastosowanie obiektywnej analizy statystycznej w celu prezentacji danych w publikacjach naukowych Fedortsiv

Bardziej szczegółowo

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian 1 / 8 Content list / Spis Treści 1. Hardware and software requirements, preparing device to upgrade Wymagania sprzętowe i programowe, przygotowanie urządzenia do aktualizacji 2. Installing drivers and

Bardziej szczegółowo

Interfejsy człowiek komputer dla osób niepełnosprawnych i w podeszłym wieku

Interfejsy człowiek komputer dla osób niepełnosprawnych i w podeszłym wieku Interfejsy człowiek komputer dla osób niepełnosprawnych i w podeszłym wieku Emilia Mikołajewska 1, Dariusz Mikołajewski 2,3 STRESZCZENIE 1 Klinika Rehabilitacji, 10 Wojskowy Szpital Kliniczny z Polikliniką

Bardziej szczegółowo

TECHNICAL CATALOGUE WHITEHEART MALLEABLE CAST IRON FITTINGS EE

TECHNICAL CATALOGUE WHITEHEART MALLEABLE CAST IRON FITTINGS EE TECHNICAL CATALOGUE WHITEHEART MALLEABLE CAST IRON FITTINGS EE Poland GENERAL INFORMATION USE Whiteheart malleable cast iron fittings brand EE are used in threaded pipe joints, particularly in water, gas,

Bardziej szczegółowo

Mirosław Kupczyk miron@man.poznan.pl. Pozna, PCSS, 17-18.01.2005. Szkolenie: "Architektura i uytkowanie klastra Linux IA-64"

Mirosław Kupczyk miron@man.poznan.pl. Pozna, PCSS, 17-18.01.2005. Szkolenie: Architektura i uytkowanie klastra Linux IA-64 Mirosław Kupczyk miron@man.poznan.pl $ %! " # & ' Wzgldy historyczne Naturalna ewolucja systemów luno ze sob powizanych znajdujcych si w jednej oraganizacji, ch współdzielenia zasobów obliczeniowych, danych,

Bardziej szczegółowo

Umowa o współpracy ponadnarodowej

Umowa o współpracy ponadnarodowej Wzór minimalnego zakresu umowy o współpracy ponadnarodowej w ramach PO KL Umowa o współpracy ponadnarodowej Nazwa Programu Operacyjnego w Polsce: : Numer i nazwa Priorytetu: Numer i nazwa Działania: Numer

Bardziej szczegółowo

Na tych zaj ciach poznamy tablice liczb, zarówno jedno jak i wielowymiarowe.

Na tych zaj ciach poznamy tablice liczb, zarówno jedno jak i wielowymiarowe. du Metodyki i techniki programowania 1 2008/2009 ZAJ CIA 7. Tablice Na tych zaj ciach poznamy tablice liczb, zarówno jedno jak i wielowymiarowe. Tworzymy je, gdy mamy do czynienia z ilo ci powi zanych

Bardziej szczegółowo

Wpływ dyrektywy PSD II na korzystanie z instrumentów płatniczych. Warszawa, 15 stycznia 2015 r. Zbigniew Długosz

Wpływ dyrektywy PSD II na korzystanie z instrumentów płatniczych. Warszawa, 15 stycznia 2015 r. Zbigniew Długosz Wpływ dyrektywy PSD II na korzystanie z instrumentów płatniczych Warszawa, 15 stycznia 2015 r. Zbigniew Długosz 1 do czego można wykorzystywać bankowość elektroniczną? nowe usługi płatnicze a korzystanie

Bardziej szczegółowo

SUPPLEMENTARY INFORMATION FOR THE LEASE LIMIT APPLICATION

SUPPLEMENTARY INFORMATION FOR THE LEASE LIMIT APPLICATION SUPPLEMENTARY INFORMATION FOR THE LEASE LIMIT APPLICATION 1. Applicant s data Company s name (address, phone) NIP (VAT) and REGON numbers Contact person 2. PPROPERTIES HELD Address Type of property Property

Bardziej szczegółowo

System optymalizacji produkcji energii

System optymalizacji produkcji energii System optymalizacji produkcji energii Produkcja energii jest skomplikowanym procesem na który wpływa wiele czynników, optymalizacja jest niezbędna, bieżąca informacja o kosztach i możliwościach wykorzystania

Bardziej szczegółowo

WYDZIAŁ: PSYCHOLOGIA KIERUNEK:

WYDZIAŁ: PSYCHOLOGIA KIERUNEK: Lp. I Introductory module 3 Academic skills Information Technology introduction Intellectual Property Mysterious Code of Science Online surveys Personal growth and social competences in the globalizedintercultural

Bardziej szczegółowo