Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 259

Liczba wyników na stronie
first rewind previous Strona / 13 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cloud computing
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 13 next fast forward last
1
EN
Purpose: The publication presents the results of an analysis of the popularity of technologies used in logistics based on published technical literature. The aim of the work was to determine the participation of individual types of technologies in the development of Logistics 4.0. In the Industry 4.0 policy implemented in highly developed countries, logistics development is referred to as “Logistics 4.0”. Methodology: The work is based on the analysis of empirical data describing the topics of the application of the latest information technology and other technologies related to the fourth industrial revolution. The scope of the analysis covers technologies developed between 2014-2022. Findings: Based on the investigation, the major technological subfields of Big Data, Cloud computing and networking, Business Intelligence and other, Internet of Things, and Hardware have been proposed as the core utility categories of technologies in Logistics 4.0. Originality/value: The analysis can be useful for practical aims, e.g., while planning logistics 4.0 trainings, enterprising technical investments, but also for scientific and educational objectives.
EN
The ongoing process of network softwareization is clearly visible for the mobile networks. The 5G standard defines core network functions as separate processes that can be easily virtualized. The next step is to make deployments cloud-enabled, e.g., independent of the hardware and hypervisor. In this work, we present a Proof-of-Concept of the 5G network cloud-based deployment. We perform the troubleshooting and propose solution for the encountered problem. We also extended the existing implementation with an analytics function.
PL
Oprogramowanie stanowi nieodłączny element systemów telekomunikacyjnych. Jest to widoczne w sieciach 5G, które definiują funkcje sieciowe jako procesy programistyczne, z możliwością wirtualizacji. Kolejnym krokiem jest uniezależnienie wdrożeń od sprzętu oraz nadzorcy wirtualizacji. W pracy, przedstawiamy wdrożenie sieci rdzeniowej 5G w środowisku chmurowym. Przeprowadziliśmy także walidację oraz zaproponowaliśmy sposób rozwiązania problemu. Wdrożenie rozszerzyliśmy o funkcję sieciową na potrzeby analityki.
PL
Nowoczesność, ale nie ta teoretyczna, lecz w praktycznym wymiarze. Przemysł 4.0, automatyzacja, robotyzacja i inne innowacyjne technologie czy wynalazki w polskich realiach. Idące za tym zmiany w zarządzaniu [...] Niezbędna w nowych warunkach społeczno-gospodarczych elastyczność procesu produkcyjnego, z charakterystyką zmian pod wpływem bieżących niezależnych od firmy wydarzeń i procesów... [raport : rozdział 1]
EN
As the popularity of cloud computing increases, safety concerns are growing as well. Cloud forensics (CF) is a smart adaptation of the digital forensics model that is used for fighting the related offenses. This paper proposes a new forensic method relying on a blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. In order to protect the system against illegitimate users, an improved blowfish method is applied. In this particular instance, the system is made up of five distinct components: hypervisor (VMM), IPFS file storage, log ledger, node controller, and smart contract. The suggested approach includes six phases: creation of the log file, key setup and exchange, evidence setup and control, integrity assurance, agreement validation and confidential file release, as well as blockchain-based communication. To ensure efficient exchange of data exchange between the cloud provider and the client, the methodology comprises IPFS. The SSA (FOI-SSA) model, integrated with forensic operations, is used to select the keys in the best possible way. Finally, an analysis is conducted to prove the effectiveness of the proposed FOI-SSA technique.
EN
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.
EN
Land surface albedo is a relevant variable in many climatic, environmental, and hydrological studies; its monitoring allows researchers to identify changes on the Earth’s surface. The open satellite data that is provided by the USGS/NASA Landsat mission is quite suitable for estimating this parameter through the remote sensing technique. The purpose of this paper is to evaluate the potentialities of the new Landsat 9 data for retrieving Earth’s albedo by applying da Silva et al.’s algorithm (developed in 2016 for the Landsat 8 data) using the Google Earth Engine cloud platform and R software. Two urban areas in Southern Italy with similar geomorphologic and climatic characteristics were chosen as study sites. After obtaining thematic maps of the albedos here, a statistical analysis and comparison among the Landsat 8 and Landsat 9 results was performed considering the entire study areas and each land use/land cover class that is provided by the Copernicus Urban Atlas 2018. This approach was also applied to the data after being filtered through Tukey’s test (used to detect and remove outliers). The analysis showed a very good correlation between the Landsat 8 and Landsat 9 estimations (ρ > 0.94 for both sites), with some exceptions that were related to some mis-corresponding values. Furthermore, the Landsat 8 and Landsat 9 outliers were generally overlapping. In conclusion, da Silva et al.’s approach appears to also be reasonably applicable to the Landsat 9 data despite some radiometric differences.
EN
Cloud computing provides centralized computing services to the user on demand. Despite this sophisticated service, it suffers from single-point failure, which blocks the entire system. Many security operations consider this single-point failure, which demands alternate security solutions to the aforesaid problem. Blockchain technology provides a corrective measure to a single-point failure with the decentralized operation. The devices communicating in the cloud environment range from small IoT devices to large cloud data storage. The nodes should be effectively authenticated in a blockchain environment. Mutual authentication is time-efficient when the network is small. However, as the network scales, authentication is less time-efficient, and dynamic scalability is not possible with smart contract-based authentication. To address this issue, the blockchain node runs the skip graph algorithm to retrieve the registered node. The skip graph algorithm possesses scalability and decentralized nature, and retrieves a node by finding the longest prefix matching. The worst time complexity is O(log n) for maximum n nodes. This method ensures fast nodal retrieval in the mutual authentication process. The proposed search by name id algorithm through skip graph is efficient compared with the state-of-art existing work and the performance is also good compared with the existing work where the latency is reduced by 30–80%, and the power consumption is reduced by 32–50% compared to other considered approaches.
EN
This research focuses on the study of monitoring and controlling the internal climate of a public building by controlling temperature and humidity through designing and implementing an automation system. This system can be completely operated and secure using Wi-Fi networks as communication protocol, and Node MCU as a wireless hub. There are also new possibilities for remote control and monitoring of network-enabled devices as a result of the rapid expansion of the Internet. The proposed system consists of temperature and humidity sensors, a relay, and an ESP8266 Wi-Fi module that stores sensor data and transfers it to a cloud server database via Appatshy and Mysql formats to the web server. The web page is designed using HTML/CSS program language with a distinct and simple interface. The system has been implemented with a high latency so that all readings are automatically updated and displayed. The designed proposed system has efficient, secure, rapid responsive real time, and control it automatically and manually at the same time.
PL
Badania te skupiają się na badaniu monitorowania i kontrolowania klimatu wewnętrznego budynku użyteczności publicznej poprzez kontrolowanie temperatury i wilgotności poprzez zaprojektowanie i wdrożenie systemu automatyki. Ten system może być w pełni obsługiwany i bezpieczny przy użyciu sieci Wi-Fi jako protokołu komunikacyjnego oraz MCU węzła jako koncentratora bezprzewodowego. W wyniku gwałtownej ekspansji Internetu pojawiły się również nowe możliwości zdalnego sterowania i monitorowania urządzeń pracujących w sieci. Proponowany system składa się z czujników temperatury i wilgotności, przekaźnika oraz modułu Wi-Fi ESP8266, który przechowuje dane z czujników i przekazuje je do bazy danych serwera w chmurze za pośrednictwem formatów Appatshy i Mysql na serwer WWW. Strona internetowa została zaprojektowana w języku programowania HTML/CSS z wyraźnym i prostym interfejsem. System został zaimplementowany z dużym opóźnieniem, dzięki czemu wszystkie odczyty są automatycznie aktualizowane i wyświetlane. Zaprojektowany proponowany system posiada wydajny, bezpieczny, szybki czas reakcji w czasie rzeczywistym, a jednocześnie steruje nim automatycznie i ręcznie.
PL
Współczesne tekstroniczne transpondery RFID otwierają zupełnie nowe możliwości przed projektantami sprzętu AGD. W szczególności zastosowania te widoczne są w technice pralniczej, gdzie informacje zawarte w transponderze RFID wszytym w odzież można wykorzystać do wyboru najlepszego programu prania dla danego rodzaju tkaniny lub do wyboru odpowiedniego programu prania dla różnych umieszczonych tkanin w bębnie pralki. W ramach prac zaprojektowano i zbudowano stanowisko do demonstracji zastosowania transponderów RFIDtex w urządzeniu myjącym. Przygotowano system zarządzania dla zbudowanego modelu pralki wyposażonej w urządzenie RWD, wspierający podejmowanie decyzji o wyborze danej funkcji urządzenia na podstawie danych dostarczanych przez odczyt identyfikatorów RFIDtex zintegrowanych z odzieżą. Urządzenie piorące zintegrowano z chmurą obliczeniową do zarządzania ubraniami bazując na ich unikalnym identyfikatorze, a także jako moduł pośredniczący do aplikacji „wirtualnej szafy”. W ramach prac sprawdzono skuteczność działania stacji z wykorzystaniem próbek.
EN
Modern Textronics RFID transponders open completely new possibilities for designers of household appliances. In particular, these applications can be seen in laundry technology, where the information contained in the RFID transponder sewn into the clothes can be used to select the best washing program for a given type of fabric or to select the appropriate washing program for different fabrics placed in the drum of the washing machine. The work included design and construction of a demonstration station for the demonstration of RFIDtex transponders in the washing machine. A management system for a model of a washing machine equipped with Read-Write Device (RWD) was prepared, which supports decision-making based on data provided by reading of RFIDtex tags integrated with clothes. The laundry device was integrated with cloud computing for garment management based on the unique identifier of the tags and also as an intermediary module for the virtual closet application. The work checked the effectiveness of the station using samples.
EN
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
PL
Artykuł przedstawia porównanie oferty wybranych dostawców chmury obliczeniowych pod kątem ich wykorzystania w procesie przygotowywania i wdrażania usług opartych o idee otwartego kodu źródłowego. Przeprowadzone badania dotyczą usług dostarczanych według modelu IaaS w postaci dzierżawy maszyny wirtualnej oraz usług dostarczanych według modelu PaaS w postaci usług baz danych. Zaprezentowana analiza ma charakter tak jakościowy (ocena subiektywna) jak i ilościowy, który polega na szeregu pomiarów parametrów instancji wirtualnych. Na podstawie tej analizy, wybrany został najlepszy dostawca usług w chmurze publicznej dla użytkowników rozpoczynających wykorzystywanie zasobów chmur obliczeniowych.
EN
The article presents a comparison of the offers of selected cloud computing providers in terms of their use in the process of developing and implementing IT services based on the idea of open source code. The conducted research concerns services provided according to the IaaS model in the form of a virtual machine lease and services provided according to the PaaS model in the form of database services. The presented analysis is both qualitative (subjective assessment) and quantitative, which consists in a series of measurements of the parameters of virtual instances. Based on this analysis, the best public cloud service provider for users starting to use cloud computing resources was selected.
EN
Cloud computing has emerged as a significant technology domain, primarily due to the emergence of big data, machine learning, and quantum computing applications. While earlier, cloud computing services were focused mainly on providing storage and some infrastructures/ platforms for applications, the need to advance computational power analysis of massive datasets. It has made cloud computing almost inevitable from most client-based applications, mobile applications, or web applications. The allied challenge to protect data shared from and to cloud-based platforms has cropped up with the necessity to access public clouds. While conventional cryptographic algorithms have been used for securing and authenticating cloud data, advancements in cryptanalysis and access to faster computation have led to possible threats to the traditional security of cloud mechanisms. This has led to extensive research in homomorphic encryption pertaining to cloud security. In this paper, a security mechanism is designed targeted towards dynamic groups using public clouds. Cloud security mechanisms generally face a significant challenge in terms of overhead, throughput, and execution time to encrypt data from dynamic groups with frequent member addition and removal. A two-stage homomorphic encryption process is proposed for data security in this paper. The performance of the proposed system is evaluated in terms of the salient cryptographic metrics, which are the avalanche effect, throughput, and execution time. A comparative analysis with conventional cryptographic algorithms shows that the proposed system outperforms them regarding the cryptographic performance metrics.
EN
The application of quadcopter and intelligent learning techniques in urban monitoring systems can improve flexibility and efficiency features. This paper proposes a cloud-based urban monitoring system that uses deep learning, fuzzy system, image processing, pattern recognition, and Bayesian network. The main objectives of this system are to monitor climate status, temperature, humidity, and smoke, as well as to detect fire occurrences based on the above intelligent techniques. The quadcopter transmits sensing data of the temperature, humidity, and smoke sensors, geographical coordinates, image frames, and videos to a control station via RF communications. In the control station side, the monitoring capabilities are designed by graphical tools to show urban areas with RGB colors according to the predetermined data ranges. The evaluation process illustrates simulation results of the deep neural network applied to climate status and effects of the sensors’ data changes on climate status. An illustrative example is used to draw the simulated area using RGB colors. Furthermore, circuit of the quadcopter side is designed using electric devices.
PL
Tematyka pracy obejmuje sposób realizacji aplikacji mobilnych z usługami rozpoznawania twarzy (ang. face recognition) w chmurze obliczeniowej oraz sposoby wykorzystania takich rozwiązań. Opisane zostały popularne platformy chmurowe mające w swojej ofercie usługę rozpoznawania twarzy. W pracy przedstawiono również etap projektowania oraz tworzenia aplikacji. Po jej utworzeniu została przetestowana funkcjonalność na różnych zdjęciach. W podsumowaniu wyszczególniono główne wady i zalety aplikacji oraz przedstawiono wnioski dotyczące podejmowanego tematu.
EN
The subject of this work includes the method of implementing mobile applications with face recognition services in the computing cloud and the ways of using such solutions. Popular cloud platforms that offer a facial recognition service were described. The next part of the work presents the application’s design stage. After its implementation, the functionality was tested in various photos. The summary lists the main advantages and disadvantages of the application as well as conclusions on the topic under consideration.
EN
With the rapid development of remote sensing technology, our ability to obtain remote sensing data has been improved to an unprecedented level. We have entered an era of big data. Remote sensing data clear showing the characteristics of Big Data such as hyper spectral, high spatial resolution, and high time resolution, thus, resulting in a significant increase in the volume, variety, velocity and veracity of data. This paper proposes a feature supporting, salable, and efficient data cube for time-series analysis application, and used the spatial feature data and remote sensing data for comparative study of the water cover and vegetation change. In this system, the feature data cube building and distributed executor engine are critical in supporting large spatiotemporal RS data analysis with spatial features. The feature translation ensures that the geographic object can be combined with satellite data to build a feature data cube for analysis. Constructing a distributed executed engine based on dask ensures the efficient analysis of large-scale RS data. This work could provide a convenient and efficient multidimensional data services for many remote sensing applications.
PL
W dzisiejszych czasach coraz więcej firm decyduje się na uruchamianie usług oraz przetwarzanie danych w ramach tak zwanych systemów chmurowych, których przykładem może być m.in. OpenStack. Szeroka gama istniejących rozwiązań pozwala na dostosowanie chmury do potrzeb i wymagań użytkownika. Podczas wyboru systemu chmurowego jednym z ważniejszych aspektów jest analiza oferowanych przez niego mechanizmów oraz zaawansowanych usług sieciowych. Poniższy artykuł zawiera podstawowe informacje dotyczące chmury obliczeniowej, najpopularniejszych modułów wykorzystywanych do wdrożenia chmury OpenStack wraz z omówieniem architektury modułu sieciowego OpenStack Networking. Ponadto, przedstawiono porównanie mechanizmów i usług sieciowych oferowanych przez system OpenStack oraz dwa inne systemy chmurowe, tj. Amazon Web Services oraz Apache CloudStack.
EN
Nowadays, more and more companies decide to launch services and data processing within the cloud environments, e.g., OpenStack. A wide range of existing solutions allows you to adjust the cloud to the needs and requirements of the user. When choosing a cloud system, one of the most important aspects is the analysis of mechanisms and advanced network services offered by it. This paper contains basic information about cloud computing, the most popular modules used to implement the OpenStack cloud, together with an overview of the architecture of the OpenStack Networking module. Additionally, a comparison of the mechanisms and network services offered by the OpenStack system and two other cloud systems, i.e., the Amazon Web Services and Apache CloudStack, is presented.
EN
Purpose: The study aims to diagnose the corrosion current density in the coating defect on the outer surface of the ammonia pipe depending on the distance to the pumping station, taking into account the interaction of media at the soil-steel interface and using modern graphical data visualization technologies and approaches to model such a system. Design/methodology/approach: The use of an automated system for monitoring defects in underground metallic components of structures, in particular in ammonia pipelines, is proposed. The use of the information processing approach opens additional opportunities in solving the problem of defect detection. Temperature and pressure indicators in the pipeline play an important role because these parameters must be taken into account in the ammonia pipeline for safe transportation. The analysis of diagnostic signs on the outer surface of the underground metallic ammonia pipeline is carried out taking into account temperature changes and corrosion currents. The parameters and relations of the mathematical model for the description of the influence of thermal processes and mechanical loading in the vicinity of pumping stations on the corresponding corrosion currents in the metal of the ammonia pipeline are offered. Findings: The paper evaluates the corrosion current density in the coating defect on the metal surface depending on the distance to the pumping station and the relationship between the corrosion current density and the characteristics of the temperature field at a distance L = 0…20 km from the pumping station. The relative density of corrosion current is also compared with the energy characteristics of the surface layers at a distance L = 0…20 km from the pumping station. An information system using cloud technologies for data processing and visualization has been developed, which simplifies the process of data analysis regarding corrosion currents on the metal surface of an ammonia pipeline. Research limitations/implications: The study was conducted for the section from the pumping station to the pipeline directly on a relatively small data set. Practical implications: The use of client-server architecture has become very popular, thanks to which monitoring can be carried out in any corner of the planet, using Internet data transmission protocols. At the same time, cloud technologies allow you to deploy such software on remote physical computers. The use of the Amazon Web Service cloud environment as a common tool for working with data and the ability to use ready-made extensions is proposed. Also, this cloud technology simplifies the procedure of public and secure access to the collected information for further analysis. Originality/value: Use of cloud environments and databases to monitor ammonia pipeline defects for correct resource assessment.
18
Content available remote Wirtualna platforma do realizacji zdalnych zajęć dydaktycznych
PL
W artykule opisano projekt i realizację wirtualnej platformy, zbudowanej w oparciu o sprzętowe rozwiązanie chmurowe oraz oprogramowanie klasy Open Source, przeznaczonej do realizacji zajęć prowadzonych w trybie zdalnym. Omówiono przykładowe scenariusze ćwiczeń z zagadnień dotyczących bezpieczeństwa sieciowego oraz przedstawiono doświadczenia z eksploatacji wdrożonego systemu.
EN
The article describes the design and implementation of a virtual platform, built on the basis of a hardware cloud solution and Open Source class software, intended for the implementation of classes conducted remotely. Sample scenarios of exercises on network security issues is discussed, as well as experience from the operation of the implemented system.
PL
W artykule przedstawiono architekturę i implementację systemu monitorowania ruchu ulicznego. Zastosowano w nim identyfikatory RFID do rozpoznawania pojazdów, w tym specjalnego znaczenia, jak karetki pogotowia, autobusy miejskie, pojazdy z obniżoną emisją spalin. Dane o ruchu są przesyłane do usługi IoT Hub w chmurze obliczeniowej Azure. Na ich podstawie dokonywana jest analiza sytuacji drogowych i podejmowane decyzje dotyczące sterowania ruchem ulicznym. Informacje sterujące są zwrotnie kierowane do urządzeń sterujących ruchem za pomocą świateł ulicznych, barier, tablic informacyjnych. W artykule opisano sposób komunikacji z chmurą obliczeniową oraz możliwości realizacji algorytmów monitorowania i sterowania ruchem za pomocą IoT Hub.
EN
The article presents the architecture and implementation of a street traffic monitoring system. It uses RFID identifiers to recognize vehicles, including special meaning, such as ambulances, city buses, vehicles with reduced exhaust gas emissions. Traffic data is sent to the IoT Hub service in the Azure cloud. On their basis, road situations are analyzed and decisions are made regarding traffic control. Control information is fed back to traffic control devices by means of street lights, barriers, information boards. The article describes the method of communication with the computing cloud and the possibilities of implementing traffic monitoring and control algorithms using IoT Hub.
PL
W pracy omówiono propozycje implementacji cyfrowego Paszportu Szczepień COVID-19, bazującego na Blockchain chroniącym prywatność. Od końca zeszłego roku, po rozpoczęciu szczepień przeciw COVID-19, toczy się intensywna dyskusja nad formą wprowadzenia takiego narzędzia oraz konsekwencjami jego wdrożenia. Ma ona miejsce w wielu krajach europejskich. Jednym z elementów tej dyskusji, były kwestie bezpieczeństwa i anonimowości weryfikowanych danych szczepionych osób w sposób masowy, w różnych obszarach funkcjonowania społeczeństwa. Zagadnienia te próbuje rozwiązać proponowany system cyfrowego Paszportu Szczepień. System ten wykorzystuje dwie główne metody: Blockchain i funkcje skrótu, które pozwalają na zachowanie bezpieczeństwa, prywatności, a zarazem anonimowości. Celem poprawienia intuicyjności oraz prostoty jego funkcjonowania, w procesie weryfikacji Paszportów zaproponowano technologię kodów QR. System został zaimplementowany i przetestowany w środowisku chmury obliczeniowej Amazon AWS. Zaproponowano architekturę referencyjną bazująca na Blockchain dla środowiska AWS, dedykowaną dużym i wymagającym rozwiązaniom aplikacyjnym Paszportu Szczepień. Dodatkowo środowisko chmury oferuje dostęp do wielu narzędzi, które wykorzystano w implementacji systemu, podnoszących w znaczny sposób bezpieczeństwo całego rozwiązania.
EN
The paper discusses proposals for implementing the COVID-19 digital Vaccination Passport based on Blockchain that protects privacy. Since the end of the last year, after the commencement of vaccination against COVID-19, there has been an intense discussion on the form of introducing such a tool and the consequences of its implementation. This discussion is taking place in many European countries. One element of this discussion was the safety and anonymity of the massively verified data of persons on vaccinations in various areas of society functioning. These issues are being resolved by the proposed digital Vaccination Passport system. This system uses two major methods: Blockchain and hash functions, which allow you to maintain security, privacy, and anonymity at the same time. To improve the intuitiveness and simplicity of the system operation, the QR code technology was proposed in the passport verification process. The system has been implemented and tested in the Amazon AWS cloud computing environment. A reference architecture based on Blockchain for the AWS environment was proposed, dedicated to large and demanding application solutions. In addition, the cloud environment offers access to many tools that were used in the system’s implementation, significantly increasing the security of the entire solution.
first rewind previous Strona / 13 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.