Filters
total: 59
filtered: 56
-
Catalog
Chosen catalog filters
Search results for: vulnerability
-
Infrastructure vulnerability analysis of a port container terminal
PublicationW referacie przedstawiono infrastrukturę nowobudowanego terminala kontenerowego w Gdańsku. Za pomocą narzędzia programowego CARVER2 przeanalizowano infrastrukturę krytyczną tego portu pod kątem zagrożeń atakami terrorystycznymi.
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Vulnerability of municipal solid waste: An emerging threat to aquatic ecosystems
Publication -
The changes of groundwater quality of the ''Czarny Dwór'' intake as a result of the aquifer vulnerability
PublicationThe "Czarny Dwór" groundwater intake is one of the main sources of water for Gdańsk. It is situated on the Marine Terrace and exploits mainly Quaternary aquifer, but also Tertiary and Cretaceous. The water is generally of good quality although some undesirable changes were observed in the Quaternary aquifer during almost 40 years of exploitation. The changes are caused by developing urbanization, former high pumping rates and...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publication -
Hydrogeochemistry and vulnerability of groundwater in the moraine upland aquifers of the Gdańsk region (Northern Poland)
PublicationWody podziemne występujące w utworach morenowych na Pojezierzu Kaszubskim charakteryzują się różnym stopniem przykrycia i wynikającą z tego różną podatnością na zanieczyszczenie. Skład chemiczny tych wód jest wynikiem działania czynników naturalnych oraz antropogenicznych, które powodują wzrost stężeń niektórych składników, i pogarszają jakość wód.
-
Machine learning-based seismic fragility and seismic vulnerability assessment of reinforced concrete structures
PublicationMany studies have been performed to put quantifying uncertainties into the seismic risk assessment of reinforced concrete (RC) buildings. This paper provides a risk-assessment support tool for purpose of retrofitting and potential design strategies of RC buildings. Machine Learning (ML) algorithms were developed in Python software by innovative methods of hyperparameter optimization, such as halving search, grid search, random...
-
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
PublicationIn this research, GALDIT method was used to assess seawater intrusion in the coastal aquifer of the inner Puck Bay (Southern Baltic Sea). The impact of potential sea-level rise on groundwater vulnerability for years 2081-2100 was also considered. The study area was categorized into three classes of vulnerability: low, moderate and high. The most vulnerable area is the Hel Peninsula with northern part of the Kashubian Coastland....
-
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
PublicationIn this research, GALDIT method was used to assess seawater intrusion in the coastal aquifer of the inner Puck Bay (Southern Baltic Sea). The impact of potential sea-level rise on groundwater vulnerability for years 2081-2100 was also considered. The study area was categorized into three classes of vulnerability: low, moderate and high. The most vulnerable area is the Hel Peninsula with northern part of the Kashubian Coastland....
-
Assessing groundwater vulnerability to pollution in the Puck region (denudation moraine upland) using vertical seepage method
PublicationDegradation of groundwater quality can cause a serious water supply and environmental problems. The identify of potential groundwater pollution can be determined by assessment of groundwater vulnerability method. The assessment of groundwater vulnerability to pollution was based on estimation of migration time of potential conservative contamination through the vadose zone. Area of investigation is a type of denudation moraine...
-
Application of Shape Memory Alloys in Retrofitting of Masonry and Heritage Structures Based on Their Vulnerability Revealed in the Bam 2003 Earthquake
PublicationFor decades, one of the most critical considerations of civil engineers has been the construction of structures that can sufficiently resist earthquakes. However, in many parts of the globe, ancient and contemporary buildings were constructed without regard for engineering; thus, there is a rising necessity to adapt existing structures to avoid accidents and preserve historical artefacts. There are various techniques for retrofitting...
-
Machine Learning-Based Wetland Vulnerability Assessment in the Sindh Province Ramsar Site Using Remote Sensing Data
PublicationWetlands provide vital ecological and socioeconomic services but face escalating pressures worldwide. This study undertakes an integrated spatiotemporal assessment of the multifaceted vulnerabilities shaping Khinjhir Lake, an ecologically significant wetland ecosystem in Pakistan, using advanced geospatial and machine learning techniques. Multi-temporal optical remote sensing data from 2000 to 2020 was analyzed through spectral...
-
Machine Learning-Based Wetland Vulnerability Assessment in the Sindh Province Ramsar Site Using Remote Sensing Data
Publication -
Entrepreneurship Vulnerability to Business Cycle. A New Methodology for Identification Pro-cyclical and Counter-cyclical Patterns of Entrepreneurial Activity
PublicationIn literature, there is ongoing discussion whether entrepreneurial activity, approximated by, for instance, changes in self-employment, tends to behave pro-cyclically, counter-cyclically or rather is a-cyclical. Thus far, both theoretical and empirical evidence, where various multiple methodological approaches are used, does not provide clear answer to the latter; while widely offered explanations are scattered and lack robustness....
-
Towards evaluation of the Second Generation Intact Stability Criteria - examination of a fishing vessel vulnerability to surf-riding, based on historical capsizing
PublicationThe Second Generation Intact Stability Criteria (SGISC) are the latest achievements in the field of intact ship stability assessment. The criteria are the result of massive international cooperative efforts and extensive research that lasted more than 15 years. Even though they are based on a solid scientific foundation, the trial period has commenced to collect user experience and further validation. One of possible approaches...
-
Bounds on isolated scattering number
PublicationThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Bounds on isolated scattering number
PublicationThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Accident susceptibility index for a passenger ship-a framework and case study
PublicationThe continuous monitoring and assessment of operational vulnerability and accident susceptibility of passenger ships is crucial from the perspective of ship and passenger safety. Despite the existing solutions for vulnerability monitoring, stemming mainly from watertight door operations, a comprehensive framework for accident susceptibility assessment and monitoring is missing in the literature. Therefore, this paper offers a...
-
Probabilistic assessment of SMRFs with infill masonry walls incorporating nonlinear soil-structure interaction
PublicationInfill Masonry Walls (IMWs) are used in the perimeter of a building to separate the inner and outer space. IMWs may affect the lateral behavior of buildings, while they are different from those partition walls that separate two inner spaces. This study focused on the seismic vulnerability assessment of Steel Moment-Resisting Frames (SMRFs) assuming different placement of IMWs incorporating nonlinear Soil-Structure Interaction (SSI)....
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublicationThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Safety-based approach in multifunctional building design
PublicationABSTRACT: The modern trend in design of the public buildings is to create multifunctional environments in one building, hosting a variety of functions. Multifunctional buildings entertain large number of visitors. The complexity and vulnerability of this type of public space are the main reasons to use within their design process the performance based approach including the recognition of hazards. Safety and reliability approach...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Warunki hydrogeochemiczne i podatność na zanieczyszczenie wód podziemnych w zlewni górnej Raduni
PublicationThe paper presents results of long-term studies in the Kashubian Lake district that have been completed with data gathered over the last five years. The purpose of this research was to assess a temporal variability of groundwater chemical composition and to analyze risk of pollutant migration to subsurface water. Investigation indicates local, however, significant anthropogenic influence on a shallow aquifers.The assessment of...
-
Predicting seismic response of SMRFs founded on different soil types using machine learning techniques
PublicationPredicting the Maximum Interstory Drift Ratio (M-IDR) of Steel Moment-Resisting Frames (SMRFs) is a useful tool for designers to approximately evaluate the vulnerability of SMRFs. This study aims to explore supervised Machine Learning (ML) algorithms to build a surrogate prediction model for SMRFs to reduce the need for complex modeling. For this purpose, twenty well-known ML algorithms implemented in Python software are trained...
-
Jamming and jamming mitigation for selected 5G military scenarios
PublicationThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Ocena wpływu ataku filtrowania wiadomości zarządzających na oferowany poziom bezpieczeństwa w nowym kryptosystemie dla łącza krótkofalowego
PublicationNiniejszy artykuł przedstawia próbę obiektywnej oceny oferowanego poziomu bezpieczeństwa w nowym kryptosystemie dla transmisji danych w łączu krótkofalowym. W referacie tym skupiono się na potencjalnymataku, opartym o technikę filtrowania wiadomości zarządzających przesyłanych w kryptosystemie. W pierwszej kolejności przeanalizowano w sposób subiektywny możliwość wykorzystania takiej metody ataku na próbę uzyskania nieautoryzowanego...
-
Preliminary estimation of groundwater recharge on Brda river outwash plain
PublicationEstimation of groundwater recharge is one of the most challenging subjects in hydrogeology. It is a critical factor influencing the pollution migration, assessment of aquifer vulnerability to contamination, small-scale groundwater budget calculation, modeling of nutrient cycling and detailed flow path calculations. In Poland an infiltration rate method is widely used, which depends on a system of rate coefficients referring to...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Measures of region failure survivability for wireless mesh networks
PublicationWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
WHAT DRIVES CROSS-COUNTRY DIFFERENCES IN EXPORT VARIETY? A BILATERAL PANEL APPROACH
PublicationA worldwide event like the 2020 Coronavirus outbreak can only reinforce the interest in modelling trade diversification as a key factor in countries’ vulnerability to external shocks. This paper adopts a detailed relative framework to study the determinants of product-level export variety in a large bilateral panel of developing and developed economies (16,770 country pairs in the period 1988–2014). We find that country pairs characterized...
-
Ochrona odbiorników GNSS przed zakłóceniami celowymi
PublicationArtykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Using Redis supported by NVRAM in HPC applications
PublicationNowadays, the efficiency of storage systems is a bottleneck in many modern HPC clusters. High performance in the traditional approach – processing using files – is often difficult to obtain because of a model’s complexity and its read/write patterns. An alternative approach is to apply a key-value database, which usually has low latency and scales well. On the other hand, many key-value stores suffer from a limitation of memory...
-
PLANNING AND ANALYSIS OF EARTHQUAKE DISASTER RELIEF WORK IN ETHIOPIA
PublicationThis paper addresses dynamic planning and analysis of earthquake disaster relief work by analysis the disaster throughout the technical and procedural method. And combine this analysis as continues assessment for better input to investigating planning disaster for discontinuous economic growth. This implemented, considering the vulnerability and hazard analysis as a procedural analysis disaster to estimating acceptance risk leveling...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Nanocrystalline diamond sheets as protective coatings for fiber-optic measurement head
PublicationFiber-optic sensors find numerous applications in science and industry, but their full potential is limited because of the risk of damaging the measurement head, in particular, due to the vulnerability of unprotected tips of the fiber to mechanical damage and aggressive chemical agents. In this paper, we report the first use of a new nanocrystalline diamond structure in a fiber-optic measurement head as a protective coating of...
-
Numerical Analysis of Recharge Rates and Contaminant Travel Time in Layered Unsaturated Soils
PublicationThis study focused on the estimation of groundwater recharge rates and travel time of conservative contaminants between ground surface and aquifer. Numerical simulations of transient water flow and solute transport were performed using the SWAP computer program for 10 layered soil profiles, composed of materials ranging from gravel to clay. In particular, sensitivity of the results to the thickness and position of weakly permeable...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network
PublicationThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Greencoin information system empowering urban adaptability and eco living choices.
PublicationThere are many gamification projects focused on mitigating climate changes which has been tested or implemented worldwide. However, the gap which remains is the limited number of solutions dedicated for central European countries where the urban polices in terms of climate vulnerability are bounded. On the other hand, cities, when implementing climate-oriented policies, are focused on urban resilience, while the opportunities...
-
How pesticides affect neonates? - Exposure, health implications and determination of metabolites
PublicationThis review covers key information related to the effects of pesticides on fetal and child health. All humans are exposed to environmental toxicants, however child's health, due to their high vulnerability, should be of special concern. They are continuously exposed to environmental xenobiotics including a wide variety of pesticides, and other pollutants. These compounds can enter the child's body through various routes, both during...
-
Mapping of Flood-Prone Areas Utilizing GIS Techniques and Remote Sensing: A Case Study of Duhok, Kurdistan Region of Iraq
PublicationOne of the most common types of natural disaster, floods can happen anywhere on Earth, except in the polar regions. The severity of the damage caused by flooding can be reduced by putting proper management and protocols into place. Using remote sensing and a geospatial methodology, this study attempts to identify flood-vulnerable areas of the central district of Duhok, Iraq. The analytical hierarchy process (AHP) technique was...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Estimation of Conservative Contaminant Travel Time through Vadose Zone Based on Transient and Steady Flow Approaches
PublicationEstimation of contaminant travel time through the vadose zone is needed for assessing groundwater vulnerability to pollution, planning monitoring and remediation activities or predicting the effect of land use change or climate change on groundwater quality. The travel time can be obtained from numerical simulations of transient flow and transport in the unsaturated soil profile, which typically require a large amount of data and...
-
Urban flash flood hazard identification and assessment applying geospatial techniques and hydrodynamic modeling; Erbil city case study, Kurdistan Region of Iraq
PublicationThis dissertation aims to investigate the factors behind flash flooding in Erbil's central district, located in the Kurdistan Region of Iraq, and develop a methodology for assessing flood hazards in the city, despite limited data accessibility. In this thesis, each factor was investigated, including analyzing extreme precipitation events in the last two decades, including their spatial and temporal distribution of rainfall, intensity,...
-
Personalized nutrition in ageing society: redox control of major-age related diseases through the NutRedOx Network (COST Action CA16112)
PublicationA healthy ageing process is important when it is considered that one-third of the population of Europe is already over 50 years old, although there are regional variations. This proportion is likely to increase in the future, and maintenance of vitality at an older age is not only an important measure of the quality of life but also key to participation and productivity. So, the binomial “nutrition and ageing” has different aspects...
-
A Vision of Sustainable Design Concepts for Upgrading Vulnerable Coastal Areas in Light of Climate Change Impacts: A Case Study from Beirut, Lebanon
PublicationRapid urbanization combined with the effects of climate change has increased the vulnerability of poor urban communities to natural hazards, particularly to informal settlements located in coastal areas. Apart from socio-economic challenges, the effects of climate change threaten the very existence of these settlements. They are particularly vulnerable due to their poor structural quality and lack of adequate infrastructure to...