Filters
total: 4082
filtered: 2450
-
Catalog
- Publications 2450 available results
- Journals 369 available results
- Conferences 202 available results
- Publishing Houses 1 available results
- People 314 available results
- Projects 14 available results
- Laboratories 1 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 168 available results
- Events 6 available results
- Open Research Data 555 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: COMPUTER SECURITY LABORATORY
-
Diagnostics of zno varistors by means of nondestructive testing
PublicationStandard industrial testing of high-voltage varistors for surge arresters demands application of high voltages and intensive currents. Nondestructive methods for varistor quality and endurance evaluation have been proposed and described. They rely on the application of resonant ultrasound spectroscopy, electro-ultrasonic spectroscopy, noise measurement and nonlinearity testing at voltages lower than continuous operating range....
-
Assessment of technical condition and repair of steel structure elements on the example of fire damage in a warehouse building
PublicationThe paper analyses a case study on the structural assessment of warehouse building partially damaged by fire caused by external source (fire of lorries close to the building). The authors focus on the site investigations and laboratory test results prior to assessing actual condition of the structural elements. Both strengthening concept and repair procedure of a steel column are addressed here. A short literature survey in the...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
Transfer learning in imagined speech EEG-based BCIs
PublicationThe Brain–Computer Interfaces (BCI) based on electroencephalograms (EEG) are systems which aim is to provide a communication channel to any person with a computer, initially it was proposed to aid people with disabilities, but actually wider applications have been proposed. These devices allow to send messages or to control devices using the brain signals. There are different neuro-paradigms which evoke brain signals of interest...
-
A model-based approach to analysis of authentication protocols.
PublicationW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Reconfigurable Antennas for Trustable Things
PublicationIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublicationEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublicationEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublicationIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
I, Robot: between angel and evil
PublicationThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Some problems of slide bearing material fatigue evaluation.
PublicationA slide bearing alloy resistance against fatigue failures have been investigated for three different lubricants, different heat loadings and different stress ratio κ values. The research methods and data handling procedures for determination of particular parameter effects on fatigue strength have been described and analysed for experiments that were set and performed in laboratory tester SKMR-2. Main and interaction effects of...
-
Ella4Life virtual assistant - user centered design strategy - evaluation following labolatory tests
PublicationIn the paper, we summarize the evaluation of Anne4Care system after laboratory tests. A group of end users, seniors over 55 years of age, rated a virtual assistant by completing a questionnaire. The objectives of the pilot evaluations are mainly to assess the feasibility, usability, acceptance and functionality of the system and the ability of the potential target user to use the system and receive valuable information from it...
-
The silver layers in fiber-optic sensors
PublicationIn this paper a method of application of the silver layers on the surface of an optical fiber was proposed. The optical properties and surface quality of the silver layer was examined by optical microscopy. The reflection and transmission of the sample were investigated. To evaluate the silver mirror it was placed in a fiber optic Fabry-Perot interferometer and the quality of the spectra was analyzed. The commercial mirror was...
-
Vision-based motion analysis of kitesurfer
PublicationKitesurfing is a relatively recent phenomenon with raising popularity worldwide – a recently developed extreme water sport considered a high-risk injury sport. It combines elements of several other sports, in particular sailing, surfing, windsurfing, wakeboarding, and snowboarding. The main purpose of authors’ research in the present paper is to use a vision system technique for measuring a kitesurfer’s body movements in order...
-
Conducted EMI Propagation Paths in DC-AC Hard Switching Converter
PublicationIn order to limit the electromagnetic interference (EMI) in power electronics devices, knowledge about the phenomena connected with EMI generation and propagation is necessary. This papers describes the propagation paths in the 3 phase voltage source inverter using wide-band simulation and laboratory test with the signal processing method Wiener filtering, where the transfer functions between voltage across switches and the perturbation...
-
Optical method for verification of homogeneity of phantoms for calibration of magnetic resonance
PublicationThe primary purpose of this study was to develop a laboratory photonic set-up for characterisation of homogeneity of gel phantoms for calibration of magnetic resonance. In this system, optical coherence tomography allows the detection of micro- and macroscopic heterogeneities of a structure. The set-up was used to perform measurements of agar and agar-carrageenan gels, which are the basis for more complex phantoms for magnetic...
-
Multi-criterion decision making in distributed systems by quantum evolutionary algorithms
PublicationDecision making by the AQMEA (Adaptive Quantum-based Multi-criterion Evolutionary Algorithm) has been considered for distributed computer systems. AQMEA has been extended by a chromosome representation with the registry of the smallest units of quantum information. Evolutionary computing with Q-bit chromosomes has been proofed to characterize by the enhanced population diversity than other representations, since individuals represent...
-
Port-Based Modelling of Distributed-Lumped Parameter Systems
PublicationThere in the paper is presented an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of the distributed system has been defined by application of bond graph methodology and distributed transfer function method (DTFM). The approach proposed combines versatility of port-based modelling and accuracy of distributed transfer function method. The concise representation of lumped-distributed...
-
Application of IR UWB Spectrum Shaping to IEEE 802.15.4a Standard
PublicationCoexistence of existing narrowband systems and new ultra wideband devices in the same frequency range requires using some interference mitigation techniques, for example based on spectrum shaping. This paper presents efficiency of impulse radio spectrum shaping methods, applied to IEEE 802.15.4a UWB alternate physical layer signals. Basic parameters of 802.15.4a signal structure and outline of proposed spectrum shaping methods...
-
Software for calculation of noise maps implemented on the supercomputer
PublicationThis paper presents investigation results relevant to the implementation of the algorithms for the calculation of noise maps. The aim of the implementation of the algorithms on the computer cluster is explained. Selected implementation details of the software called the noise propagation model are described. The interaction of the software with the data acquisition system is presented. Noise maps obtained by exploitation of the...
-
Intelligent turbogenerator controller based on artifical neural network
PublicationThe paper presents a desing of an intelligent controller based on neural network (ICNN). The ICNN ensures at the same time two fundamental functions : the maintaining of generator voltage at the desired value and the damping of the electromechanical oscillations. Its performance is evaluted on a single machine infinite bus power system through computer simulations. The dynamic and transient operation of the proposed controller...
-
Polyhedral Ramsey Numbers
PublicationGiven two polygons or polyhedrons P1 and P2, we can transform these figures to graphs G1 and G2, respectively. The polyhedral Ramsey number Rp(G1,G2) is the smallest integer n such that every graph, which represents polyhedron on n vertices either contains a copy of G1 or its complement contains a copy of G2. Using a computer search together with some theoretical results we have established some polyhedral Ramsey numbers, for example...
-
Impact of Spatial Noise Correlation on Bearing Accuracy in DIFAR Systems
PublicationDIFAR type underwater passive systems are one of the more commonly used tools for detecting submarines. At the design stage, which usually uses computer simulations, it is necessary to generate acoustic noise of the sea. It has been shown that correlating noise significantly reduces these errors compared to the assumption that noise is uncorrelated. In addition, bearing errors have been shown to be the same in systems with a commonly...
-
ANFIS-Based NPC Population Control in Video Games
PublicationModern computer games aim at providing rich, vivid worlds. The aim is to encourage the player to explore and interact with the in-game world. To describe the complex relations between in-game NPCs and their surrounding fuzzy logic is used. The paper presents ANFIS based population control in the video game. We present an approach allowing stabilizing the number of NPCs in-game by providing a certain amount of food to the environment....
-
Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds
PublicationWe propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...
-
THEORETICAL AND EXPERIMENTAL INVESTIGATION OF THIN-WALLED BEARING SHELL’S DESIGN PARAMETERS AND ASSEMBLY CONDITIONS ON THE HOLDING TORQUE INSIDE A HOUSING BORE OF A CONNECTING ROD
PublicationThe aim of the work was the experimental and theoretical evaluation of the influence of the most important parameters determining the holding torque of a thin-walled bearing shell inside a housing bore of a connecting rod. The main investigated parameters were defned by authors experience in this feld. In the frst stage of research, a special test stand was designed in order to allow measuring the real values of the friction torque...
-
FEM ANALYSIS AND EXPERIMENTAL TESTS OF RIGID RISER HANGING SYSTEM
PublicationThe article presents the analysis, project, and experimental examination of an original rigid riser for Coil Tubing Pipes. The principle of riser operation is based on the use of friction forces. The research included the FEM analysis of the designed riser, calculations of the required bolt tensions, and checking the effect of the clamping force on stress distribution in the pipeline. The results of computer simulation were verified...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Genetic Programming for Interaction Efficient Supporting in Volunteer Computing Systems
PublicationVolunteer computing systems provide a middleware for interaction between project owners and great number volunteers. In this chapter, a genetic programming paradigm has been proposed to a multi-objective scheduler design for efficient using some resources of volunteer computers via the web. In a studied problem, genetic scheduler can optimize both a workload of a bottleneck computer and cost of system. Genetic programming has been...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Towards neural knowledge DNA
PublicationIn this paper, we propose the Neural Knowledge DNA, a framework that tailors the ideas underlying the success of neural networks to the scope of knowledge representation. Knowledge representation is a fundamental field that dedicates to representing information about the world in a form that computer systems can utilize to solve complex tasks. The proposed Neural Knowledge DNA is designed to support discovering, storing, reusing,...
-
System of protection against electric shock for circuits with power electronics converters
PublicationModern low voltage circuits are very often equipped with power electronics converters, therefore in these circuits non-sinusoidal earth currents (touch currents) may occur. For non-sinusoidal currents safety criteria should be modified. This paper presents these modified criteria and a computer system of protection against electric shock which can be implemented in circuits with power electronics converters. The system is based...
-
EFFECT OF WORKING FLUID SELECTION ON THERMAL PERFORMANCE OF HEAT EXCHANGER FILLED BY THE POROUS MATERIAL
PublicationThermal management of electronics semiconductor technologies that are located i.e. in a novel marine power plants or computer server rooms become very important issue for designers of such systems. Motivation and need for research in development of novel cooling strategies for modern electronics is of paramount importance. Heat exchangers filled by the porous material are a novel research topic in current heat pipe science. The...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublicationWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Using Physiological Signals for Emotion Recognition
PublicationRecognizing user’s emotions is the promising area of research in a field of human-computer interaction. It is possible to recognize emotions using facial expression, audio signals, body poses, gestures etc. but physiological signals are very useful in this field because they are spontaneous and not controllable. In this paper a problem of using physiological signals for emotion recognition is presented. The kinds of physiological...
-
Fitting the mobile device characteristics to the user's hearing preferences
PublicationA method for fitting the mobile computer audio characteristics to the user's hearing preferences is proposed. The process consists of two stages: calibration and dynamics processing. During the calibration phase the user performs a loudness scaling test giving their response regarding the perceived loudness. The dynamics processing made on above basis sets the loudness to the most comfortable level. The processing accounts both...
-
A quaternion-based modified feistel cipher for multimedia transmission
PublicationIn this paper a quaternion-based modified Feistel Cipher is proposed. The algorithm is based on the scheme proposed by Sastry and Kumar (2012). Our algorithm uses special properties of quaternions to perform rotations of data sequences in 3D space for each of the cipher rounds. The plaintext (image in gray-tone) is divided into two square matrices of equal size which consist of Lipschitz quaternions. A modular arithmetic was implemented...
-
Improving web user experience with caching user interface
PublicationIn human-computer interaction, response time is assumed generally not to exceed significantly 1-2 seconds. While the natural competition in the Internet public Web serving ensures adhering widely to such limits, some Web environments are less competitive and offer much worse user experience in terms of response time. This paper describes a solution to significantly improve user experience in terms of response time with only modification...
-
Computational simulation of motion of a rescue module during its launching from ship at rough sea
PublicationThis paper is a continuation of the work titled : “A comp utational model for simulation of motion of rescue module during its launching from stern ramp of a ship at rough sea”. It presents results of computer simulations of motion of a rescue module with embarked persons during its launching on rollers along stern ramp of a ship at rough sea. The simulations were conducted for a selected ship fitted with a launching ramp , for...
-
Asphalt Overlay Enhancement with Fatigue High-Performing Multiaxial Geocomposite
PublicationThe use of gecomposite incorporating multiaxial geogrid and non-woven fabric of high bitumen retention in asphalt overlays results in the increase of life of the designed pavement structure. Such an approach can offer an opportunity to increase the fatigue life (higher traffic capacity) without the need to increase asphalt overlay thickness or to reduce the thickness of asphalt overlay without reduction of pavement life eventually....
-
Study the impact of design method preference on the usefulness of concrete and on CO2 emissions
PublicationPurpose – The research investigates the impact of concrete design methods on performance, emphasizing environmental sustainability. The study compares the modified Bolomey method and Abrams’ law in designing concretes. Significant differences in cement consumption and subsequent CO2 emissions are revealed. The research advocates for a comprehensive life cycle assessment, considering factors like compressive strength, carbonation...