Filters
total: 1281
filtered: 975
-
Catalog
Chosen catalog filters
Search results for: SECURITY CONTROLS AND MEASURES
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublicationA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
Diagnostic PCR assay for Microsporum and Trichophyton infections
PublicationWe have previously described a highly sensitive 5-hour PCR test for the rapid diagnosis of onychomycosis which detects any dermatophyte and species-identify T. rubrum from patient specimens. We have subsequently developed and evaluated new PCR tests for detection of Trichophyton and Microsporum canis/audouinii infections.58 dermatophyte isolates (21) Microsporum spp. (4 different species), 35 Trichophyton spp (10 different species)...
-
The impact of training and neurotrophins on functional recovery after spinal cord transection: cellular and molecular mechanisms contributing to motor improvement
PublicationBeneficial effects of locomotor training on the functional recovery after complete transection of the spinal cord indicate that in chronic spinal animals spontaneous recovery processes are enhanced and shaped by the training. The mechanisms of that use-dependent improvement are still not fully understood. This review tackles three aspects of this issue: (1) neurochemical attributes of functional improvement...
-
Application of adjusted subpixel method (ASM) in HRCT measurements of the bronchi in bronchial asthma patients and healthy individuals
PublicationBackground: Recently, we described a model system which included corrections of high-resolution computedtomography (HRCT) bronchial measurements based on the adjusted subpixel method (ASM).Objective: To verify the clinical application of ASM by comparing bronchial measurements obtained bymeans of the traditional eye-driven method, subpixel method alone and ASM in a group comprised ofbronchial asthma patients and healthy individuals.Methods:...
-
Hyperbranched polyethylenimine functionalized silica/polysulfone nanocomposite membranes for water purification
PublicationHyperbranched polyethyleneimine functionalized silica (PEI-SiO2) nanoparticles with considerable hydrophilicity were synthesized and incorporated into a polysulfone (PSF)/dimethylacetamide (DMA)/polyvinylpyrrolidone (PVP) membrane casting solution in five different ratios to fabricate PEI-SiO2/PSF nanocomposite membranes using nonsolvent-induced phase separation. The hydrophilic PEI-SiO2 nanoparticles were characterized by TEM,...
-
Nonlinear Control of a Doubly Fed Generator Supplied by a Current Source Inverter
PublicationNowadays, wind turbines based on a doubly fed induction generator (DFIG) are a commonly used solution in the wind industry. The standard converter topology used in these systems is the voltage source inverter (VSI). The use of reverse-blocking insulated gate bipolar transistor (RB-IGBT) in the current source inverter topology (CSI), which is an alternative topology, opens new possibilities of control methods. This paper presents...
-
Semi complex navigation with an active optical gesture sensor
PublicationThis paper presents the methods of diversified touchless interactions between a user and a mobile platform utilizing the optical gesture sensor. The sensor uses 8 photodiodes to measure the reflected light in the active mode (using embedded LEDs) or it measures shadows caused by fingers in the passive mode. Several algorithms were implemented: automatic mode switching, adaptive illumination level compensation, resolution improvements...
-
Development and Research of the Text Messages Semantic Clustering Methodology
PublicationThe methodology of semantic clustering analysis of customer’s text-opinions collection is developed. The author's version of the mathematical models of formalization and practical realization of short textual messages semantic clustering procedure is proposed, based on the customer’s text-opinions collection Latent Semantic Analysis knowledge extracting method. An algorithm for semantic clustering of the text-opinions is developed,...
-
Examining Quality of Hand Segmentation Based on Gaussian Mixture Models
PublicationResults of examination of various implementations of Gaussian mix-ture models are presented in the paper. Two of the implementations belonged to the Intel’s OpenCV 2.4.3 library and utilized Background Subtractor MOG and Background Subtractor MOG2 classes. The third implementation presented in the paper was created by the authors and extended Background Subtractor MOG2 with the possibility of operating on the scaled version of...
-
Healthy financial system of local government on the example of Poland
Publicationhealthy local government financial system lays the foundation for the ability of local government units (LGUs) to carry out public tasks at the current qualitative and quantitative level and to meet their obligations in the short and long term. A healthy financial system of local government is a system that is adequate, stable, unified, consistent, transparent, diversified, counter-cyclical, guarantees the financial independence...
-
Hybrid use of the building as a method supporting epidemic safety
PublicationThe COVID-19 pandemic has resulted in changing organisational and technical requirements in the operation of treatment facilities. This paper summarises the available knowledge on the principles of hybrid design of the architecture of treatment units to ensure that different levels of sanitary and hygienic safeguards can be implemented. The basis of this narrative overview is an analysis of the existing Polish legislation on required...
-
Urban Freight Transport Demand Modelling and Data Availability Constraints
PublicationThe paper provides a review of urban freight transport demand modelling approaches confronted with constrains regarding adequate data provision from a perspective of the local authorities. Demand estimation models has been selected as a reference because they are the most representative in terms of inclusion of urban freight indicators which can be transformed into a decision-support tool for evaluation of freight measures. The...
-
Literature update of analytical methods for biogenic amines determination in food and beverages
PublicationBiogenic amines (BAs) have been reported in a variety of foods, such as fish, meat, cheese, and wines. The formation of BAs in food by the microbial decarboxylation of amino acids can result in human allergic reactions, characterized by difficulty in breathing, rash, vomiting, and hypertension. Control measures to prevent biogenic amine formation in foods and/or reduce their levels should be considered. Therefore, monitoring of...
-
Quality of bottled waters
PublicationBottled water is a product that is purchased by annually increasing numbers of people of all age groups. The quality control of mineral waters tends to concentrate on the determination of anion and cation levels, since it is these that govern the taste, smell and possible medicinal properties of the water. The constantly rising sales of mineral waters bring with them the ever increasing exploitation of their sources. The consequences...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Delivery of Ancillary Services in Distribution Power Systems
PublicationOne of the technical and organizational challenges the power system faces in deregulated market conditions is to organize an ancillary services market. The growing share of distributed generation of variable (intermittent) energy sources and a change in the market position of consumers, causes the demand for distributed delivery of ancillary services. For this purpose, it is sought to use the ability of the regulatory measures:...
-
Influence of Toll Collection Method on Motorways on Traffic Safety and Efficiency
PublicationThe paper presents the results of the effectiveness analysis for various forms of toll collection on motorway gates and their impact on safety and efficiency of traffic. The results from field tests that were performed on the A1 motorway in Rusocin were used for the analysis. The research included the analysis of the video image of driver behaviour on the way to the toll booths and at toll booths. The PTV VISSIM tool was used to...
-
A Framework of A Ship Domain-Based Near-Miss Detection Method Using Mamdani Neuro-Fuzzy Classification
PublicationSafety analysis of navigation over a given area may cover application of various risk measures for ship collisions. One of them is percentage of the so called near- miss situations (potential collision situations). In this article a method of automatic detection of such situations based on the data from Automatic Identification System (AIS), is proposed. The method utilizes input parameters such as: collision risk measure based...
-
Composition Patterns of Contemporary Polish Residential Building Facades
PublicationThis study aims to define the types of composition patterns of contemporary Polish multi-family building facades. The authors define the compositional patterns to determine their frequency. Analyses carried out on the basis of photos and visualizations of 113 examples of architecture from Poland identified groups of common features of facades. Statistical analyses of these features resulted in six types of compositions. Clear differences...
-
Examination of selected failure criteria with asymmetric shear stresses in the collapse analysis of laminated shells
PublicationThe paper is concerned with failure analysis of composite shells performed with the usage of the nonlinear 6‐parameter shell theory with drilling rotation degree of freedom. This special theory embodies naturally unlim-ited translations and rotations and is suitable for analysis of irregular shells for instance with various, partic-ularly orthogonal, intersections. The presence of the drilling rotation is inherently accompanied...
-
State of Development of Intelligent Transport Systems Services on National Roads in Poland
PublicationIn recent years we can see intensifying implementation of Intelligent Transport System (ITS) measures in Polish cities and on national roads. The architecture of the National Traffic Management System (KSZR) will enable the implementation of a uniform, integrated and intelligent ICT system to launch ITS systems that are the most important for drivers and the General Directorate for National Roads and Motorways (GDDKiA). This paper...
-
Development of tools for road infrastructure safety management for the provinces (voivodeships) in Poland
PublicationThe development of modern tools for road infrastructure safety management will help to reduce the number of fatalities and serious injuries as one of the main objectives adopted in 2013 in the National Road Safety Programme 2014-2020 and the new Road Safety Programme 2011-2020 in the EU. Risk Management in Highway Engineering can be applied in developing tools essential in the process of safety management. Risk Management in Highway...
-
Methodology for assessing the lighting of pedestrian crossings based on light intensity parameters
PublicationOne of the possible preventive measures that could improve safety at crossings is to assess the state of illumination of the lighting installation located in the transition area for pedestrians. The City of Warsaw has undertaken to comprehensively assess the pedestrian crossings to determine the level of road safety and the condition of lighting. The lighting conditions related to pedestrian crossings without traffic lights in...
-
Analysis and evaluation of grouping methods for effective cutting tool operation
PublicationThis article presents the possibilities for using cluster analysis in the assignment of machine tools in automated manufacturing systems. Based on the similarity of manufacturing processes in the system, cutting tools have been grouped. The objective was to obtain groups of similar objects, which could potentially ensure the reduction of the frequency and time of setups, optimizing the maintenance of tool resources and improving...
-
The influence of sound track on the viewer’s emotions and correction of the color in the film
PublicationThe article presents the aspects of the final selection of colors in film production based on the emotions caused by the soundtrack of the film. First, the processing of colors, contrast, saturation and white balance of shots in the film was presented. The definition of color grading is also described, i.e. the color changes in the film's views. In the second part of the article, the soundtracks of the film were analyzed, in particular...
-
Schronienie – poszukiwanie formuły dla domu wpisanego w relacje środowiskowe
PublicationKonieczność schronienia i potrzeba zamieszkiwania wymagają przestrzeni, które współcześnie zazwyczaj zabezpieczają obiekty architektoniczne. Jednak często zauważamy niedobory wartości w przestrzeni zamieszkiwania. Pomysłem zaradczym w tej sytuacji jest powrót do punktu wyjścia. Do zapewnienia schronienia. Jeśli będzie ono wpisane w relacje środowiskowe i ukształtowane w zgodzie z potrzebą zachowania ciągłości kulturowej, ma szansę...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublicationZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublicationW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublicationVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublicationImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublicationFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublicationEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Interaction with medical data using QR-codes
PublicationBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublicationAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublicationThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Multimodal Surveillance Based Personal Protection System
PublicationA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublicationWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
Integrating web site services into application through user interface
PublicationThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublicationThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublicationNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublicationThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Assurance Case Patterns On-line Catalogue
PublicationAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Algorithms of chemicals detection using raman spectra
PublicationRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublicationA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Polska adaptacja Metody Oceny Wypalenia Zawodowego (BAT-PL) autorstwa Schaufeliego i współpracowników
PublicationAim. The study aimed to present the Polish version of the Burnout Assessment Tool (BAT-PL) by Schaufeli et al. and to assess its validity and reliability. The tool measures the core symptoms of burnout (BAT-C): exhaustion, mental distance, cognitive and emotional impairment, and its secondary symptoms (BAT-S): psychosomatic complaints and psychological distress. Method. The participants were 255 nursing staff members....
-
Nowelizacja art. 209 kodeksu karnego. Analiza proponowanych zmian. Analysis of the Proposed Amendments to Article 209 of the Polish Criminal Code.
Publication"W niniejszym artykule rozpatrywane jest zagadnienie przestępstwa niealimentacji (zwłaszcza, gdy pokrzywdzonymi są dzieci). Artykuł dotyczy analizy nowelizacji polskiego kodeksu karnego. Przez lata ściągalność roszczeń alimentacyjnych pozostawała na niskim poziomie. Właśnie w celu poprawy skuteczności egzekucji świadczeń alimentacyjnych Ministerstwo Sprawiedliwości przygotowało zmianę w obszarze kodeksu karnego. Nieprawidłowości...