Filters
total: 2446
filtered: 1596
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 583 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Framework for RIDM within functional safety management process
PublicationThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublicationA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Automatic Analysis of Trajectories of Moving Objects
PublicationOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublicationA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Human-Computer Interface Based on Visual Lip Movement and Gesture Recognition
PublicationThe multimodal human-computer interface (HCI) called LipMouse is presented, allowing a user to work on a computer using movements and gestures made with his/her mouth only. Algorithms for lip movement tracking and lip gesture recognition are presented in details. User face images are captured with a standard webcam. Face detection is based on a cascade of boosted classifiers using Haar-like features. A mouth region is located in...
-
A comparative study of English viseme recognition methods and algorithms
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector construction...
-
Detection of Lexical Stress Errors in Non-Native (L2) English with Data Augmentation and Attention
PublicationThis paper describes two novel complementary techniques that improve the detection of lexical stress errors in non-native (L2) English speech: attention-based feature extraction and data augmentation based on Neural Text-To-Speech (TTS). In a classical approach, audio features are usually extracted from fixed regions of speech such as the syllable nucleus. We propose an attention-based deep learning model that automatically de...
-
Comparative analysis of various transformation techniques for voiceless consonants modeling
PublicationIn this paper, a comparison of various transformation techniques, namely Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Walsh Hadamard Transform (DWHT) are performed in the context of their application to voiceless consonant modeling. Speech features based on these transformation techniques are extracted. These features are mean and derivative values of cepstrum coefficients, derived from each transformation....
-
A comparative study of English viseme recognition methods and algorithm
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublicationMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Internet payment methods in Poland
PublicationIn this chapter authors intended to describe wide range of aspects of the Internet payment systems. At the beginning there is briefly shown their evolution and features required for the effective payment system. Data on the popularity of different payment systems in Internet transactions links this section with description of the current state of payment systems available in Poland.
-
Enterprise Gamification - Learning as a Side Effect of Competition
PublicationGmification in companies can be used for driving desired employees behaviour that are advantageous to their development and performance improvement. This paper presents tools acquired from online social networking services and game mechanisms to encourage managers to compete by providing extended statistics and user profiles features in e-learning system.
-
Photoelectron-photoabsorption (PePa) database
PublicationIn this paper a recently launched Photoelectron-Photoabsorption Database is presented. The database was developed in order to gather all the photoelectron and photoabsorption spectra measured by various collaborators over the years as well as to ease the access to the data to the potential users. In the paper the main features of the database were described and its outline explained.
-
Cognitive memory for intelligent systems of decision-making, based on human psychology
PublicationA model of memory, which allows to expand the functionality of autonomous decision-making systems for robotic and human-system-interface purposes, is discussed. The model provides functions and features which make the prospective robotic and interfacing systems more human-like as well as more efficient in solving interactive issues.
-
Cognitive memory for intelligent systems of decision-making, based on human psychology
PublicationA model of memory, which allows to expand the functionality of autonomous decision-making systems for robotic and human-system-interface purposes, is discussed. The model provides functions and features which make the prospective robotic and interfacing systems more human-like as well as more efficient in solving interactive issues.
-
Expert assessment of arguments: a method and its experimental evaluation
PublicationArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublicationA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublicationAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Nuclear power plant as a source of electrical energy and heat
PublicationIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Political Parties in the Digital World
PublicationThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublicationAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublicationThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublicationThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Optimization-based antenna miniaturization using adaptively-adjusted penalty factors
PublicationThe continuing trend for miniaturization of electronic devices necessitates size reduction of the comprising components and circuitry. Specifically, integrated circuit-antenna modules therein require compact radiators in applications such as 5G communications, implantable and on-body devices, or internet of things (IoT). The conflict between the demands for compact size and elec-trical and field performance can be mitigated by...
-
Buzz-based honeybee colony fingerprint
PublicationNon-intrusive remote monitoring has its applications in a variety of areas. For industrial surveillance case, devices are capable of detecting anomalies that may threaten machine operation. Similarly, agricultural monitoring devices are used to supervise livestock or provide higher yields. Modern IoT devices are often coupled with Machine Learning models, which provide valuable insights into device operation. However, the data...
-
Strategic aspects in spatial planning - theory and practice in largest cities of Poland
PublicationThe rate of changes and the growing uncertainty rise to the need for a strategic approach to development planning, which is active and flexible in relation to the changing reality. Strategic planning, occurring in companies, was adapted by the social-economic development planning of self-government units. However, there are difficulties in applying the strategic planning in the spatial planning and integration of the two forms...
-
KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR
PublicationPrzedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...
-
An Island of Connectedness: Intra-Insular and Inter-Regional Communications of Rab Island (North-East Adriatic, Kvarner Gulf), Croatia
PublicationDrawing from archaeological data on Prehistoric and Roman settlement patterns, and respective sepulchral features, just as on later historic and cartographic sources, in this contribution it will be shown how movement along with mobility influenced on and were an integral part of settlement dynamics on the island of Rab (NE Adriatic, Croatia). The employed approach sees the practice of movement as dependent on specific social...
-
The Influence of the Chemical Composition of Selected Waste Materials from the Production of Copper on the Final Environmental Assessment
PublicationThis article presents qualitative and quantitative analysis of the waste produced by KGHM Polska Miedź. The waste has been analyzed according to its chemical composition and balanced in order to be reused and recycled. Special attention has been paid to mining industries producing the biggest amount of waste and ore enrichment businesses generating waste, which isn’t reused nowadays. Laboratory reseach has been conducted on floatation...
-
Sleep Apnea Detection by Means of Analyzing Electrocardiographic Signal
PublicationObstructive sleep apnea (OSA) is a condition of cyclic, periodic ob-struction (stenosis) of the upper respiratory tract. OSA could be associated with serious cardiovascular problems, such as hypertension, arrhythmias, hearth failure or peripheral vascular disease. Understanding the way of connection between OSA and cardiovascular diseases is important to choose proper treatment strategy. In this paper, we present a method for integrated...
-
Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation
PublicationThe non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...
-
Optical photoluminescent, and electroluminescent properties of organic solids
PublicationThis chapter discusses optical, photoluminescence and electroluminescence properties of organic materials. First, the spectral features of individual molecules and molecular solid states are analysed. Next, the excitonic processes in organic materials are discussed. The chapter reviews experimental methods leading to the determination of basic excitonic parameters. Finally, the electroluminescence phenomena in organic materials...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Support for argument structures review and assessment
PublicationArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublicationHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublicationE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
How to render FDTD computations more effective using agraphics accelerator.
PublicationGraphics processing units (GPUs) for years have been dedicated mostly to real time rendering. Recently leading GPU manufactures have extended their research area and decided to support also graphics computing. In this paper, we describe an impact of new GPU features on development process of an efficient finite difference time domain (FDTD) implementation.
-
New Indoor Positioning Algorithm for Distance Measurements
PublicationIn the paper a new indoor positioning algorithm is presented. This algorithm takes into account selected features of radio wave propagation in indoor environment. This results in improvement in accuracy of calculated position estimates. A comparative analysis of this new algorithm with Chan and Foy algorithms was made and described in the paper. This comparative analysis was made with utilization of real radio distance measurements.
-
Data visualization of marine objects on digital maps
PublicationThe paper presents the implementation of two multithreaded applications for data visualization of marine objects written in C#, designed to run on operator consoles with 32-bit or 64-bit Windows 7 OS. The article describes the most important functionality and features of the developed C# .NET user controls for data visualization on digital maps and in the configurable tables.
-
Iron complexes with terminal and nonbridging phosphanido ligands
PublicationThis review discusses known iron complexes with terminal-bonded and nonbridging phosphanido ligands R2Pand their analogs, such as phosphanylphosphanido, borylphosphanido and oligophosphanido groups, that have been reported since 1960s. Particular attention is focused on the synthesis and structural features of these complexes, which have a direct impact on their philicity and further reactivity. Moreover, their application in catalysis...
-
Quality Analysis of Audio-Video Transmission in an OFDM-Based Communication System
PublicationApplication of a reliable audio-video communication system, brings many advantages. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. With the availability of visual information one can monitor the surrounding, working environment, etc. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission. Currently, orthogonal frequency...
-
Variable-Fidelity Simulation Models and Sparse Gradient Updates for Cost-Efficient Optimization of Compact Antenna Input Characteristics
PublicationDesign of antennas for the Internet of Things (IoT) applications requires taking into account several performance figures, both electrical (e.g., impedance matching) and field (gain, radiation pattern), but also physical constraints, primarily concerning size limitation. Fulfillment of stringent specifications necessitates the development of topologically complex structures described by a large number of geometry parameters that...
-
Collagen Type II—Chitosan Interactions as Dependent on Hydroxylation and Acetylation Inferred from Molecular Dynamics Simulations
PublicationChitosan–collagen blends have been widely applied in tissue engineering, joints diseases treatment, and many other biomedical fields. Understanding the affinity between chitosan and collagen type II is particularly relevant in the context of mechanical properties modulation, which is closely associated with designing biomaterials suitable for cartilage and synovial fluid regeneration. However, many structural features influence...
-
An integrated geoarchaeological approach to late Iron Age settlement at Kaštelina hillfort (Lopar, Island of Rab, Croatia) using Amplitude Data Comparison (ADC) method and trial excavation
PublicationGeophysical prospection and small-scale archaeological excavation were undertaken on the site of Kaštelina, a Late Iron Age hillfort settlement located on the Stolac promontory in the northern part of Rab island (Kvarner Gulf, Croatia). Within the frame of the “Archaeological topography of the island of Rab” program, a Polish–Croatian team applied a series of multidisciplinary methods to study the occupational history of the...
-
Application of Stirling Engine Type Alpha Powered by the Recovery Energy on Vessels
PublicationThe Stirling engine is a device, in which thermal energy is transformed into mechanical without a contact between the heat carrier, and the working gas closed in the engine. Mentioned feature makes this type of engine very attractive for the use of the recovery energy, taken from other heat devices. One of the potential applications of Stirling engines is the use of thermal energy generated in the ship's engine room for producing...