Filters
total: 2446
filtered: 1596
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 583 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską
PublicationArtykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...
-
Pipeline geometry defects in high resolution pig's data
PublicationMost of the pipelines have been inspected at least once using intelligent pigging. The problem of specific software for interactive presentation, analysis and comparison of features revealed during the consecutive geometry surveys is emphasized. Capabilities of a simultaneous measurement of internal geometry and metal loss features in a single run are illustrated. Advantages of application of statistical characteristics of both...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Current risk analysis and management issues in technical systems.
PublicationDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublicationThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Data Mining Applications and Methods in Medicine
PublicationIn this paper we describe the research area of data mining and its applications in medicine. The origins of data mining and its crucial features are shortly presented. We discuss the specificity of medicine as an application area for computer systems. Characteristic features of the medical data are investigated. Common problems in the area are also presented as well as the strengths and capabilities of the data mining methods....
-
Open smart glasses development platform for AAL applications
PublicationThis paper describes an open platform for multi sensory electronic glasses that supports new and enhanced methods for intelligent interaction with patients, with smart objects, or to be used as new data input modalities like proximity sensor or smart textile interfaces. All the activities have been developed, investigated and evaluated within EU CHIST-ERA eGlasses project...
-
Smart Services supporting Drivers in Effective Cars Parking
PublicationThe paper shows how to design and implement intelligent, service oriented systems for management of free places in distributed car parks. The idea of SOA technology is widely used. It is assumed that a state of every car park is automatically determined by a special electronic infrastructure including IoT solutions. The information received from such an infrastructure is sent to the main management system, which processes it and,...
-
Methodology of Constructing and Analyzing the Hierarchical Contextually-Oriented Corpora
PublicationMethodology of Constructing and Analyzing the Hierarchical structure of the Contextually-Oriented Corpora was developed. The methodology contains the following steps: Contextual Component of the Corpora’s Structure Building; Text Analysis of the Contextually-Oriented Hierarchical Corpus. Main contribution of this study is the following: hierarchical structure of the Corpus provides advanced possibilities for identification of the...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Satellite Image Classification Using a Hierarchical Ensemble Learning and Correlation Coefficient-Based Gravitational Search Algorithm
PublicationSatellite image classification is widely used in various real-time applications, such as the military, geospatial surveys, surveillance and environmental monitoring. Therefore, the effective classification of satellite images is required to improve classification accuracy. In this paper, the combination of Hierarchical Framework and Ensemble Learning (HFEL) and optimal feature selection is proposed for the precise identification...
-
A mobile hospital – its advantages and functional limitations
PublicationThe idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublicationTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublicationIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model
PublicationThe objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...
-
Optymalizacja kosztu działania aplikacji na urządzeniach mobilnych wspomaganych przez chmurę obliczeniową
PublicationRozprawa doktorska dotyczy problemu optymalnego rozdziału aplikacji na dwa heterogeniczne środowiska – urządzenie mobilne i chmurę obliczeniową – w celu minimalizacji kosztu jej wykonania. W części wstępnej przedstawiona została problematyka dotycząca urządzeń mobilnych, w tym urządzeń IoT (Internet of Things), architektury chmury obliczeniowej, a także istniejące badania związane ze współpracą pomiędzy urządzeniami mobilnymi i...
-
Feature Weighted Attention-Bidirectional Long Short Term Memory Model for Change Detection in Remote Sensing Images
PublicationIn remote sensing images, change detection (CD) is required in many applications, such as: resource management, urban expansion research, land management, and disaster assessment. Various deep learning-based methods were applied to satellite image analysis for change detection, yet many of them have limitations, including the overfitting problem. This research proposes the Feature Weighted Attention (FWA) in Bidirectional Long...
-
Gesture Recognition With the Linear Optical Sensor and Recurrent Neural Networks
PublicationIn this paper, the optical linear sensor, a representative of low-resolution sensors, was investigated in the multiclass recognition of near-field hand gestures. The recurrent neural network (RNN) with a gated recurrent unit (GRU) memory cell was utilized as a gestures classifier. A set of 27 gestures was collected from a group of volunteers. The 27 000 sequences obtained were divided into training, validation, and test subsets....
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Multichannel Human Body Communication
PublicationHuman Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...
-
Improvement of subsoil and railway substructure by explosive means.
PublicationQuick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...
-
Analysis of possible application of high-temperature nuclear reactors to contemporary large-output steam power plants on ships
PublicationThis paper is aimed at analysis of possible application of helium to cooling high-temperature nuclear reactor to be used for generating steam in contemporary ship steam-turbine power plants of a large output with taking into account in particular variable operational parameters. In the first part of the paper types of contemporary ship power plants are presented. Features of today applied PWR reactors and proposed HTR reactors...
-
Shipping Low Frequency Noise and Its Propagation in Shallow Water
PublicationOne of the most significant factor influencing acoustical climate of the sea is underwater noise generated by moving ships. If the considered sea area has features of the shallow water, namely the wave frequency fulfils relation f < 10c/h, where c denotes phase speed of sound, and h is depths of the sea, then in certain distance from the wave source specific image of sound pressure distribution in the mean of wave modes appears....
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublicationA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
RUSSIANS ON THE POLISH LABOUR MARKET
PublicationThe article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublicationThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Greenwashing sins - the indicators of ecological marketing immaturity
PublicationThe paper presents the main features of so called "green washing". Unethical aspects of that new phenomena are presented and some corrective actions are proposed by the authors.
-
A handwritten signature verification method employing a tablet
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method's efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublicationBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublicationThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
A design framework and a digital toolset supporting the early-stage explorations of responsive kinetic building skin concepts
PublicationIn this paper we present the first phase of our research on the development of a framework for early-stage responsive kinetic building skin design. The aims of this study were: to formulate a methodological and instrumental basis for the construction of the framework, to conduct an initial pre-assessment of its features, and finally to provide the first example of how the framework could be applied in practice. Importantly, at...
-
MORPHOLOGY OF BUILDING DEVELOPMENT AS AN ELEMENT OF URBAN VENTIALTION SYSTEM
PublicationProblems related to air quality in large urban agglomerations (e.g., high concentration of pollutants, the urban heat island phenomenon) make it necessary to take comprehensive measures to improve air exchange in urban areas.The article concerns the relationship between wind phenomena observable in cities and the geometrical features of building development. The knowledge on the subject is already well-founded and has been intensively...
-
Distributed VoIP telecommunication system
PublicationIn the paper a distributed VoIP telecommunication system architecture with load balancing is described. Important features of this architecture are the high level of system reliability and the possibility of using lowcost hardware solutions.
-
Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe
PublicationThe CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....