Zeszyty czasopisma

Tom 22 (2022): Zeszyt 3 (September 2022)

Tom 22 (2022): Zeszyt 2 (June 2022)

Tom 22 (2022): Zeszyt 1 (March 2022)

Tom 21 (2021): Zeszyt 4 (December 2021)

Tom 21 (2021): Zeszyt 3 (September 2021)

Tom 21 (2021): Zeszyt 2 (June 2021)

Tom 21 (2021): Zeszyt 1 (March 2021)

Tom 20 (2020): Zeszyt 6 (December 2020)
Special Zeszyt on New Developments in Scalable Computing

Tom 20 (2020): Zeszyt 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Tom 20 (2020): Zeszyt 4 (November 2020)

Tom 20 (2020): Zeszyt 3 (September 2020)

Tom 20 (2020): Zeszyt 2 (June 2020)

Tom 20 (2020): Zeszyt 1 (March 2020)

Tom 19 (2019): Zeszyt 4 (November 2019)

Tom 19 (2019): Zeszyt 3 (September 2019)

Tom 19 (2019): Zeszyt 2 (June 2019)

Tom 19 (2019): Zeszyt 1 (March 2019)

Tom 18 (2018): Zeszyt 5 (May 2018)
Special Thematic Zeszyt on Optimal Codes and Related Topics

Tom 18 (2018): Zeszyt 4 (November 2018)

Tom 18 (2018): Zeszyt 3 (September 2018)

Tom 18 (2018): Zeszyt 2 (June 2018)

Tom 18 (2018): Zeszyt 1 (March 2018)

Tom 17 (2017): Zeszyt 5 (December 2017)
Special Zeszyt With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Tom 17 (2017): Zeszyt 4 (November 2017)

Tom 17 (2017): Zeszyt 3 (September 2017)

Tom 17 (2017): Zeszyt 2 (June 2017)

Tom 17 (2017): Zeszyt 1 (March 2017)

Tom 16 (2016): Zeszyt 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Tom 16 (2016): Zeszyt 5 (October 2016)
Zeszyt Title: Special Zeszyt on Application of Advanced Computing and Simulation in Information Systems

Tom 16 (2016): Zeszyt 4 (December 2016)

Tom 16 (2016): Zeszyt 3 (September 2016)

Tom 16 (2016): Zeszyt 2 (June 2016)

Tom 16 (2016): Zeszyt 1 (March 2016)

Tom 15 (2015): Zeszyt 7 (December 2015)
Special Zeszyt on Information Fusion

Tom 15 (2015): Zeszyt 6 (December 2015)
Special Zeszyt on Logistics, Informatics and Service Science

Tom 15 (2015): Zeszyt 5 (April 2015)
Special Zeszyt on Control in Transportation Systems

Tom 15 (2015): Zeszyt 4 (November 2015)

Tom 15 (2015): Zeszyt 3 (September 2015)

Tom 15 (2015): Zeszyt 2 (June 2015)

Tom 15 (2015): Zeszyt 1 (March 2015)

Tom 14 (2014): Zeszyt 5 (December 2014)
Special Zeszyt

Tom 14 (2014): Zeszyt 4 (December 2014)

Tom 14 (2014): Zeszyt 3 (September 2014)

Tom 14 (2014): Zeszyt 2 (June 2014)

Tom 14 (2014): Zeszyt 1 (March 2014)

Tom 13 (2013): Zeszyt Special-Zeszyt (December 2013)

Tom 13 (2013): Zeszyt 4 (December 2013)
The publishing of the present issue (Tom 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Tom 13 (2013): Zeszyt 3 (September 2013)

Tom 13 (2013): Zeszyt 2 (June 2013)

Tom 13 (2013): Zeszyt 1 (March 2013)

Tom 12 (2012): Zeszyt 4 (December 2012)

Tom 12 (2012): Zeszyt 3 (September 2012)

Tom 12 (2012): Zeszyt 2 (June 2012)

Tom 12 (2012): Zeszyt 1 (March 2012)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
ISSN
1311-9702
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

Tom 13 (2013): Zeszyt 3 (September 2013)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
ISSN
1311-9702
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

11 Artykułów
Otwarty dostęp

Reliability Estimation Based on the Degradation Amount Distribution Using Composite Time Series Analysis and Grey Theory

Data publikacji: 20 Sep 2013
Zakres stron: 3 - 14

Abstrakt

Abstract

This paper puts forward a reliability estimation method by the Degradation Amount Distribution (DAD) of products, using a composite time series modeling procedure and grey theory based on a random failure threshold. Product DAD data are treated as a composite time series and described using a composite time series model to predict a long-term trend of degradation. The degradation test is processed for a certain electronic product and the degradation data is collected for reliability estimation. Comparison among the reliability evaluation by DAD composite time series analysis and grey theory, based on a constant and a random failure threshold, reliability evaluation by DAD regression analysis based on a random failure threshold, reliability evaluation by degradation path time series analysis, and real reliability of the electronic product is done. The results show that the reliability evaluation of the product using the method proposed is the most creditable of all.

Keywords

  • Reliability estimation
  • time series
  • grey theory
  • degradation amount distribution
Otwarty dostęp

Fixed Point Theorem for Converse Commuting Mapping in Symmetric Spaces

Data publikacji: 20 Sep 2013
Zakres stron: 15 - 25

Abstrakt

Abstract

Using the concept of converse commuting mappings, our target is to prove some common fixed point theorems with respect to a contractive condition under implicit function relations and an integral type contractive condition in fuzzy symmetric spaces.

Keywords

  • Commuting point
  • coincidence point
  • commuting mappings
  • conversely commuting mappings
  • occasionally converse commuting (occ) mappings
  • converse commuting multivalued mappings
  • fuzzy symmetric space
  • implicit relation
Otwarty dostęp

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces

Data publikacji: 20 Sep 2013
Zakres stron: 26 - 40

Abstrakt

Abstract

With the increase of subdivision depths, some problems of common data structures for representing the subdivision surfaces appear, such as excessive computer memory consumption and low efficiency of the data query which restrict the popularization and application of subdivision surfaces in more fields. By utilizing the topological characteristics of the subdivision surface, a two-layer data structure named CELL is presented in order to better realize the piecewise representation of trilateral/quadrilateral subdivision surfaces. The inner structure of CELL represents the subdivision surface patch by using arrays, and the outer structure of CELL represents the topological relations between the subdivision surface patches. Based on Catmull-Clark subdivision scheme, the structural compositions of CELL and the realization mechanism of the subdivision algorithm are proposed. Additionally, sharp and semi-sharp features are constructed, and a primary study on amalgamation of the image/Z-map model and subdivision surface is presented. The results of the experimental and theoretical analysis show the superior performance of CELL with relation to computer memory consumption, data query, subdivision surface computation and algorithm development.

Keywords

  • Geometric modeling
  • subdivision surface
  • data structure
  • mesh compression
Otwarty dostęp

Upper Bound on Correcting Partial Random Errors

Data publikacji: 20 Sep 2013
Zakres stron: 41 - 49

Abstrakt

Abstract

Since coding has become a basic tool for practically all communication/electronic devices, it is important to carefully study the error patterns that actually occur. This allows correction of only partial errors rather than those which have been studied using Hamming distance, in non-binary cases.

The paper considers a class of distances, SK-distances, in terms of which partial errors can be defined. Examining the sufficient condition for the existence of a parity check matrix for a given number of parity-checks, the paper contains an upper bound on the number of parity check digits for linear codes with property that corrects all partial random errors of an (n, k ) code with minimum SK-distance at least d. The result generalizes the rather widely used Varshamov-Gilbert bound, which follows from it as a particular case.

Keywords

  • Hamming distance
  • SK-metric
  • error patterns
  • error control in codes
  • bounds
Otwarty dostęp

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

Data publikacji: 20 Sep 2013
Zakres stron: 50 - 63

Abstrakt

Abstract

In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.

Keywords

  • Modular arithmetic inverse
  • interlacing
  • decomposition
  • permutation
  • inverse permutation
Otwarty dostęp

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Data publikacji: 20 Sep 2013
Zakres stron: 64 - 76

Abstrakt

Abstract

Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identification scheme, based on the host and flow behaviour characteristics of P2P traffic. First we determine if a host takes part in a P2P application by matching its behaviour with some predefined host level behaviour rules. Subsequently, we refine the identification by comparing the statistical features of each flow in the host with several flow feature profiles. The experiments on real world network data prove that this method is quite efficient to identify P2P traffic. The classification accuracy achieves 93.9 % and 96.3 % in terms of flows and bytes respectively.

Keywords:

  • P2P traffic identification
  • host behaviour
  • flow behaviour
Otwarty dostęp

An Efficient Access Control Scheme for Cloud Environment

Data publikacji: 20 Sep 2013
Zakres stron: 77 - 90

Abstrakt

Abstract

In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well as reduce the complexity of management. Analysis and experimental results show that the scheme can be semantically secure against adaptive chosen ciphertext attacks under the random oracle model. Our concrete access control scheme can enhance the efficiency of the cloud to a certain extent.

Keywords

  • Secure storage
  • attribute-based encryption
  • identity-based signature
  • cloud computing
Otwarty dostęp

Current Practices, Trends and Challenges in K-12 Online Learning

Data publikacji: 20 Sep 2013
Zakres stron: 91 - 110

Abstrakt

Abstract

Online learning is one of the fastest growing trends in Technology- Enhanced Learning (TEL). Technology in combination with an instruction that addresses the cognitive and social processes of knowledge construction could offer more diverse and effective online learning opportunities than their face-to-face counterparts. In this review we attempt to summarize different forms and practices in K-12 online and blended learning as they appear in various regional, national and cultural contexts. The article starts with introducing some basic concepts and terminology, sums up the state of K-12 online learning around the world and ends with summarizing some trends and challenges observed in current K-12 online learning practices.

Keywords

  • Online learning
  • blended learning
  • distance learning
  • learning management systems
  • K-12 education
Otwarty dostęp

Acyclic Real-Time Traffic Signal Control Based on a Genetic Algorithm

Data publikacji: 20 Sep 2013
Zakres stron: 111 - 123

Abstrakt

Abstract

This paper presents an acyclic real-time traffic signal control model with transit priority based on a rolling horizon process for isolated intersections. The developed model consists of two components, including: an Improved Genetic Algorithm (IGA)-based signal optimization module and a microscopic traffic simulation module. The acyclic real-time traffic signal control model optimizes the phase sequence and the phase length with the aim to minimize the total delay of both transit vehicles and general vehicles for the next decision horizon. Numerical results show that the proposed IGA signal optimization module could provide a more efficient search for optimal solutions. The results also show that the acyclic real-time traffic signal control model outperforms the fixed-time control model. It prioritizes transit vehicles while minimizing the impact on the general vehicles.

Keywords

  • Acyclic real-time control
  • traffic signal control
  • transit priority
  • genetic algorithm
Otwarty dostęp

Design of a Diabetic Diagnosis System Using Rough Sets

Data publikacji: 20 Sep 2013
Zakres stron: 124 - 139

Abstrakt

Abstract

Traditionally the diagnosis of a disease is done by medical experts with experience, clinical data of the patients and adequate knowledge in identifying the disease. Such diagnosis is found to be approximate and time-consuming since it purely depends on the availability and the experience of the medical experts dealing with imprecise and uncertain clinical data of the patients. Hence, to improve decision making with uncertain data and to reduce the time consumption in diagnosing a disease, several simulated diagnosis systems have been developed. Most of these diagnosis systems are designed to possess the clinical data and symptoms associated with a specific disease as knowledge base. The quality of the knowledge base has an impact not only on the consequences, but also on the diagnostic precision. Most of the existing systems have been developed as an expert system that contains all the diagnosis facts as rules. Notably, applying the concept of a fuzzy set has shown better knowledge representation to improve the decision making process. Therefore an attempt is made in this paper to design and develop such diagnosis system, using a rough set. The system developed is evaluated using a simple set of symptoms that is added to clinical data in determining diabetes and its severity.

Keywords

  • Disease diagnosis
  • knowledge based system
  • a rough set
  • diabetes
Otwarty dostęp

Enhancing a Traditional Health Care System of an Organization for Better Service with Agent Technology by Ensuring Confidentiality of Patients’ Medical Information

Data publikacji: 20 Sep 2013
Zakres stron: 140 - 156

Abstrakt

Abstract

Agent technology is one of the widely adapted technologies for developing applications that deliver e-Services. Ensuring confidentiality of the patients’ data in e-health care systems remains a serious challenge. Many large enterprises provide in-house health care services free of cost for their employees and their dependents as a competitive benefit to prevent employees turnover and also to maintain healthy and productive human resource. This paper proposes enhancements to the traditional health care system of an organization so that it provides better services with respect to users’ satisfaction. The requirements identification of the system proposed and the evaluation of the new system are done using a feedback model. The new system proved to be mutually beneficial to employees and employers in terms of saving time and cost and thus it enhances productivity.

Keywords

  • e-Healthcare
  • agent technology
  • confidentiality
  • JADE
  • FIPA
11 Artykułów
Otwarty dostęp

Reliability Estimation Based on the Degradation Amount Distribution Using Composite Time Series Analysis and Grey Theory

Data publikacji: 20 Sep 2013
Zakres stron: 3 - 14

Abstrakt

Abstract

This paper puts forward a reliability estimation method by the Degradation Amount Distribution (DAD) of products, using a composite time series modeling procedure and grey theory based on a random failure threshold. Product DAD data are treated as a composite time series and described using a composite time series model to predict a long-term trend of degradation. The degradation test is processed for a certain electronic product and the degradation data is collected for reliability estimation. Comparison among the reliability evaluation by DAD composite time series analysis and grey theory, based on a constant and a random failure threshold, reliability evaluation by DAD regression analysis based on a random failure threshold, reliability evaluation by degradation path time series analysis, and real reliability of the electronic product is done. The results show that the reliability evaluation of the product using the method proposed is the most creditable of all.

Keywords

  • Reliability estimation
  • time series
  • grey theory
  • degradation amount distribution
Otwarty dostęp

Fixed Point Theorem for Converse Commuting Mapping in Symmetric Spaces

Data publikacji: 20 Sep 2013
Zakres stron: 15 - 25

Abstrakt

Abstract

Using the concept of converse commuting mappings, our target is to prove some common fixed point theorems with respect to a contractive condition under implicit function relations and an integral type contractive condition in fuzzy symmetric spaces.

Keywords

  • Commuting point
  • coincidence point
  • commuting mappings
  • conversely commuting mappings
  • occasionally converse commuting (occ) mappings
  • converse commuting multivalued mappings
  • fuzzy symmetric space
  • implicit relation
Otwarty dostęp

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces

Data publikacji: 20 Sep 2013
Zakres stron: 26 - 40

Abstrakt

Abstract

With the increase of subdivision depths, some problems of common data structures for representing the subdivision surfaces appear, such as excessive computer memory consumption and low efficiency of the data query which restrict the popularization and application of subdivision surfaces in more fields. By utilizing the topological characteristics of the subdivision surface, a two-layer data structure named CELL is presented in order to better realize the piecewise representation of trilateral/quadrilateral subdivision surfaces. The inner structure of CELL represents the subdivision surface patch by using arrays, and the outer structure of CELL represents the topological relations between the subdivision surface patches. Based on Catmull-Clark subdivision scheme, the structural compositions of CELL and the realization mechanism of the subdivision algorithm are proposed. Additionally, sharp and semi-sharp features are constructed, and a primary study on amalgamation of the image/Z-map model and subdivision surface is presented. The results of the experimental and theoretical analysis show the superior performance of CELL with relation to computer memory consumption, data query, subdivision surface computation and algorithm development.

Keywords

  • Geometric modeling
  • subdivision surface
  • data structure
  • mesh compression
Otwarty dostęp

Upper Bound on Correcting Partial Random Errors

Data publikacji: 20 Sep 2013
Zakres stron: 41 - 49

Abstrakt

Abstract

Since coding has become a basic tool for practically all communication/electronic devices, it is important to carefully study the error patterns that actually occur. This allows correction of only partial errors rather than those which have been studied using Hamming distance, in non-binary cases.

The paper considers a class of distances, SK-distances, in terms of which partial errors can be defined. Examining the sufficient condition for the existence of a parity check matrix for a given number of parity-checks, the paper contains an upper bound on the number of parity check digits for linear codes with property that corrects all partial random errors of an (n, k ) code with minimum SK-distance at least d. The result generalizes the rather widely used Varshamov-Gilbert bound, which follows from it as a particular case.

Keywords

  • Hamming distance
  • SK-metric
  • error patterns
  • error control in codes
  • bounds
Otwarty dostęp

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

Data publikacji: 20 Sep 2013
Zakres stron: 50 - 63

Abstrakt

Abstract

In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.

Keywords

  • Modular arithmetic inverse
  • interlacing
  • decomposition
  • permutation
  • inverse permutation
Otwarty dostęp

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Data publikacji: 20 Sep 2013
Zakres stron: 64 - 76

Abstrakt

Abstract

Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identification scheme, based on the host and flow behaviour characteristics of P2P traffic. First we determine if a host takes part in a P2P application by matching its behaviour with some predefined host level behaviour rules. Subsequently, we refine the identification by comparing the statistical features of each flow in the host with several flow feature profiles. The experiments on real world network data prove that this method is quite efficient to identify P2P traffic. The classification accuracy achieves 93.9 % and 96.3 % in terms of flows and bytes respectively.

Keywords:

  • P2P traffic identification
  • host behaviour
  • flow behaviour
Otwarty dostęp

An Efficient Access Control Scheme for Cloud Environment

Data publikacji: 20 Sep 2013
Zakres stron: 77 - 90

Abstrakt

Abstract

In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well as reduce the complexity of management. Analysis and experimental results show that the scheme can be semantically secure against adaptive chosen ciphertext attacks under the random oracle model. Our concrete access control scheme can enhance the efficiency of the cloud to a certain extent.

Keywords

  • Secure storage
  • attribute-based encryption
  • identity-based signature
  • cloud computing
Otwarty dostęp

Current Practices, Trends and Challenges in K-12 Online Learning

Data publikacji: 20 Sep 2013
Zakres stron: 91 - 110

Abstrakt

Abstract

Online learning is one of the fastest growing trends in Technology- Enhanced Learning (TEL). Technology in combination with an instruction that addresses the cognitive and social processes of knowledge construction could offer more diverse and effective online learning opportunities than their face-to-face counterparts. In this review we attempt to summarize different forms and practices in K-12 online and blended learning as they appear in various regional, national and cultural contexts. The article starts with introducing some basic concepts and terminology, sums up the state of K-12 online learning around the world and ends with summarizing some trends and challenges observed in current K-12 online learning practices.

Keywords

  • Online learning
  • blended learning
  • distance learning
  • learning management systems
  • K-12 education
Otwarty dostęp

Acyclic Real-Time Traffic Signal Control Based on a Genetic Algorithm

Data publikacji: 20 Sep 2013
Zakres stron: 111 - 123

Abstrakt

Abstract

This paper presents an acyclic real-time traffic signal control model with transit priority based on a rolling horizon process for isolated intersections. The developed model consists of two components, including: an Improved Genetic Algorithm (IGA)-based signal optimization module and a microscopic traffic simulation module. The acyclic real-time traffic signal control model optimizes the phase sequence and the phase length with the aim to minimize the total delay of both transit vehicles and general vehicles for the next decision horizon. Numerical results show that the proposed IGA signal optimization module could provide a more efficient search for optimal solutions. The results also show that the acyclic real-time traffic signal control model outperforms the fixed-time control model. It prioritizes transit vehicles while minimizing the impact on the general vehicles.

Keywords

  • Acyclic real-time control
  • traffic signal control
  • transit priority
  • genetic algorithm
Otwarty dostęp

Design of a Diabetic Diagnosis System Using Rough Sets

Data publikacji: 20 Sep 2013
Zakres stron: 124 - 139

Abstrakt

Abstract

Traditionally the diagnosis of a disease is done by medical experts with experience, clinical data of the patients and adequate knowledge in identifying the disease. Such diagnosis is found to be approximate and time-consuming since it purely depends on the availability and the experience of the medical experts dealing with imprecise and uncertain clinical data of the patients. Hence, to improve decision making with uncertain data and to reduce the time consumption in diagnosing a disease, several simulated diagnosis systems have been developed. Most of these diagnosis systems are designed to possess the clinical data and symptoms associated with a specific disease as knowledge base. The quality of the knowledge base has an impact not only on the consequences, but also on the diagnostic precision. Most of the existing systems have been developed as an expert system that contains all the diagnosis facts as rules. Notably, applying the concept of a fuzzy set has shown better knowledge representation to improve the decision making process. Therefore an attempt is made in this paper to design and develop such diagnosis system, using a rough set. The system developed is evaluated using a simple set of symptoms that is added to clinical data in determining diabetes and its severity.

Keywords

  • Disease diagnosis
  • knowledge based system
  • a rough set
  • diabetes
Otwarty dostęp

Enhancing a Traditional Health Care System of an Organization for Better Service with Agent Technology by Ensuring Confidentiality of Patients’ Medical Information

Data publikacji: 20 Sep 2013
Zakres stron: 140 - 156

Abstrakt

Abstract

Agent technology is one of the widely adapted technologies for developing applications that deliver e-Services. Ensuring confidentiality of the patients’ data in e-health care systems remains a serious challenge. Many large enterprises provide in-house health care services free of cost for their employees and their dependents as a competitive benefit to prevent employees turnover and also to maintain healthy and productive human resource. This paper proposes enhancements to the traditional health care system of an organization so that it provides better services with respect to users’ satisfaction. The requirements identification of the system proposed and the evaluation of the new system are done using a feedback model. The new system proved to be mutually beneficial to employees and employers in terms of saving time and cost and thus it enhances productivity.

Keywords

  • e-Healthcare
  • agent technology
  • confidentiality
  • JADE
  • FIPA

Zaplanuj zdalną konferencję ze Sciendo