Filters
total: 26352
filtered: 4028
-
Catalog
- Publications 4028 available results
- Journals 585 available results
- Conferences 262 available results
- Publishing Houses 2 available results
- People 516 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 1 available results
- e-Learning Courses 130 available results
- Events 3 available results
- Open Research Data 20801 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION%20SECURITY
-
Distributed Representations Based on Geometric Algebra: the Continuous Model
PublicationAuthors revise the concept of a distributed representation of data as well as two previously developed models: Holographic Reduced Representation (HRR) and Binary Spatter Codes (BSC). A Geometric Analogue (GAc - ''c'' stands for continuous as opposed to its discrete version) of HRR is introduced - it employs role-filler binding based on geometric products. Atomic objects are real-valued vectors in n-dimensional Euclidean space...
-
Automatic Detection and Monitoring of Cyanobacterial Blooms in the Context of the Marine Cadastre
PublicationIn the wake of the European and global spatial data infrastructures (SDI) it is important to build information systems which use and serve thematic data in compliance with the INSPIRE Directive. In the context of hydrographic data, the Directive requires EU member states to collect and share information on maritime areas divided into regions and sub-regions, as well as coastal zone management areas. These data are part of recently...
-
Testing of the longest span soil-steel bridge in Europe – new quality in measurements
PublicationThe article describes interdisciplinary and comprehensive diagnostic tests of final bridge inspection and acceptance proposed for a soil – steel bridge made of corrugated sheets, being the European span length record holder (25.74 m). As an effect of an original concept a detailed and precise information about the structure response was collected. The load test design was based on the nonlinear numerical simulations performed by...
-
Assessment Of the Relevance of Best Practices in The Development of Medical R&D Projects Based on Machine Learning
PublicationMachine learning has emerged as a fundamental tool for numerous endeavors within health informatics, bioinformatics, and medicine. However, novices among biomedical researchers and IT developers frequently lack the requisite experience to effectively execute a machine learning project, thereby increasing the likelihood of adopting erroneous practices that may result in common pitfalls or overly optimistic predictions. The paper...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Stimulated by cyclodextrins high yield synthesis of azocrown analogues comprising pyrrole or imidazole residues
PublicationThe influence of cyclodextrins (CDs) on the formation of azocrown ethers comprising pyrrole, imidazole and substituted imidazole has been studied. Pyrrole, imidazole, 2-methyl-, 4-methyl- and 4-phenylimidazole were coupled with bisdiazonium salts derived from bis-1,5-(2-aminophenoxy)-3-oxapentane or bis-1,8-(2-aminophenoxy)-3,6-dioxaoctane to form macrocyclic compounds with two azo units. The syntheses were performed under standard...
-
Feature extraction in detection and recognition of graphical objects
PublicationDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Decision making techniques for electronic communication: an example for Turkey
PublicationCommunication is the way for people exchanging information with each other by using various tools. Electronic communication or Ecommunication is the process of sending, receiving and processing information or messages electronically. Electronic communication that is closely related to the development levels of countries, has made considerable progress especially in terms technology, innovation and entrepreneur. In this study, it...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
SOLAP GIS in maritime research
PublicationMultidimensional Geographical Information System is a system especially designed to acquire, distribute, analyze and visualize complicated spatio-temporal data. Modern Geographical Information System technology can provide easy-to-use, near real-time solutions to many problems from different areas of research. In the article, authors summarize recent works on Spatial Online Analytical Processing (SOLAP) and multidimensional Geographical...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublicationWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
Development of the System Assurance Reference Model for Generating Modular Assurance Cases
PublicationAssurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...
-
New RFID readers for scalable RFID system
PublicationRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublicationStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework
PublicationThe rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublicationW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublicationThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
Interactions in Ternary Aqueous Solutions of NMA and Osmolytes—PARAFAC Decomposition of FTIR Spectra Series
PublicationIntermolecular interactions in aqueous solutions are crucial for virtually all processes in living cells. ATR-FTIR spectroscopy is a technique that allows changes caused by many types of such interactions to be registered; however, binary solutions are sometimes difficult to solve in these terms, while ternary solutions are even more difficult. Here, we present a method of data pretreatment that facilitates the use of the Parallel...
-
Eurozone or National Inflation Projections: Which has Greater Impact on Consumer Expectations?
PublicationWe compare the dependence of consumer inflation expectations on European Central Bank (ECB) inflation projections with that on national central bank (NCB) projections in four economies: Austria, Belgium, Finland, and Germany. We aim to assess whether the information published by central banks affects consumers, and whether inflation projections published by NCBs are more relevant to consumers than those published for the entire...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publication -
Fake News: Possibility of Identification in Post-Truth Media Ecology System
PublicationThe main aim of the article is identification of the attitudes towards the processes of identification and verification of fake news in the environment of digital media. The subject of the research refers to the users’ attitudes towards fake news. As indicated by the research, the attitudes towards fake news are not unambiguous. About 2/3 of the respondents claim that they are not able to distinguish fake news from true information;...
-
Organisational Competence vs Transferability of Knowledge in Cluster Organisations and Technology Parks
PublicationPurpose. The main paper aims to evaluate the impact of organisational competence on knowledge and information flows within cluster organisations and technology parks, with particular emphasis on innovative content knowledge. The paper addresses the research question: “What set of competencies of cooperating companies allows access to information and knowledge in cluster and parks structures?" Methodology. The authors report their...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Investigation of the 0.4C-35Cr-45Ni-Nb Alloy after Service in High-Temperature Steam and Hydrocarbons Environment
PublicationThe paper presents the results of investigation of the 0.4C-35Cr-45Ni-Nb alloy, which operated in the cracked hydrocarbon feeds and dilution steam at 1125 C. The material originated from the pyrolytic furnace coil tubes, of which internal walls were in contact with the aforementioned medium, whereas the external walls were in contact with the flue gases. The examination included metallographic and mechanical tests on the material...
-
Preserving Trees in Automata
PublicationWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects
PublicationOpen Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...
-
Wireless paging system
PublicationAssistance to patients at hospitals and nursing homesoften encounters problems related to obtaining information onthe current needs of the patient. Traditionally, patient informshospital stuff by wire and wireless paging systems. WirelessPaging Systems allow one to overcome the limitations of theirwire counterparts, which include high installation costs (cabling)and lack of patient mobility. The main difference betweenpresented...
-
Determination of impurities in pharmaceutical products using LC-MS
PublicationPharmaceutical products can be contaminated by residues of solvents, reagents (used for the synthesis) or degradation products. Impurities in drug may pose a risk to human health and life, therefore analysis and identification of impurities in pharmaceutical products is veryimportant and inevitable.High performance liquid chromatography coupled with mass spectrometry (MS) is very useful technique for identification impurities in...
-
Fluctuation-Enhanced Sensing
PublicationFluctuation-enhanced sensing (FES) is an exciting and relatively new research field that promises to extend the range of information that can be extracted from a single sensor. In FES, the stochastic fluctuations of the sensor signal, rather than its average value, are recorded and analyzed. Typical components of such fluctuations are due to interactions at the microscopic level. Proper statistical analysis provides optimum sensory...
-
The aluminium and polycarbonate covering to the roof over the stadium in Gdańsk
PublicationThis paper presents information about structural elements of the roof covering to the stadium in Gdansk built for the 2012 European Football Championship in Poland and the Ukraine. The paper discusses elements of the polycarbonate covering, the supporting structure and the drainage system. It also provides information about tests and research performed prior to construction, which determined the solutions adopted as well as...
-
Micellar aggregation of Triton X-100 surfactant in imidazolium ionic liquids
PublicationIn this work we investigated aggregation behavior of a nonionic surfactant Triton X-100 in eighteen imidazolium ionic liquids (ILs) with two to eight carbon atoms in cations alkyl chain, namely 1-ethyl-3-methylimidazolium, [EMIM], 1-butyl-3-methylimidazolium, [PrMIM], 3-methyl-1-propylimidazolium, [BMIM], 1-hexyl-3-methylimidazolium, [PMIM], 3-methyl-1-pentyl-imidazolium, [HMIM], and 1-octyl-3-methylimidazolium, [OMIM], and with...
-
Signatures and acoustic images of objects moving in water
PublicationObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Influence of temperature and interactions with ligands on dissociation of dsDNA and ligand-dsDNA complexes of various types of binding : an electrochemical study.
PublicationSeveral medicinally important compounds that bind to dsDNA strands via intercalation (C-1311, C-1305, EtBr), major groove binding (Hoechst 33258) and covalent binding (cis-Pt) were examined. The obtained results suggest that both the transfer of conformation B to C and the denaturation process, for the ligand-dsDNA complexes, except for covalently bound cis-Pt, took place at higher temperatures compared to the unbound helix. Furthermore,...
-
Down-Sampling of Large LiDAR Dataset in the Context of Off-Road Objects Extraction
PublicationNowadays, LiDAR (Light Detection and Ranging) is used in many fields, such as transportation. Thanks to the recent technological improvements, the current generation of LiDAR mapping instruments available on the market allows to acquire up to millions of three-dimensional (3D) points per second. On the one hand, such improvements allowed the development of LiDAR-based systems with increased productivity, enabling the quick acquisition...
-
Smart Decisional DNA Technology to Enhance Industry 4.0 Environment in Conjunction with Conventional Manufacturing
PublicationKnowledge-based support has become an indispensable part not only to the traditional manufacturing set-ups but also to the new fast-emerging Industry 4.0 scenario. In this regard, successful research has been performed and extensively reported to develop Decisional DNA based knowledge representation models of engineering object and engineering process called Virtual engineering object (VEO), Virtual engineering process (VEP) and...
-
Wroclaw University of Technology Knowledge Repository - project objectives
PublicationKnowledge Repository is a project created in the Library and Scientific Information Centre of Wroclaw University of Technology (WrUT). Its main task will be collecting, sharing, and promoting scientific publications of researchers, postgraduates and students of WrUT. It will be also used for bibliometric analysis and reporting research output of WrUT scientific community.Knowledge Repository will closely cooperate with other databases...
-
Quantum mechanical which-way experiment with an internal degree of freedom
PublicationFor a particle travelling through an interferometer, the trade-off between the available which-way information and the interference visibility provides a lucid manifestation of the quantum mechanical wave-particle duality. Here we analyse this relation for a particle possessing an internal degree of freedom such as spin. We quantify the trade-off with a general inequality that paints an unexpectedly intricate picture of wave-particle...
-
Event-Triggered Communication in Cooperative, Adaptive Model Predictive Control of a Nuclear Power Plant’s Turbo–Generator Set
PublicationThis paper discusses the issue of optimizing the communication between the components of a cooperating control system formed by a pair of MPC controllers of a nuclear power plant turbine set using online recursive least squares identification. It is proposed to use event-triggered communication, i.e., sending information only at selected time instants, as opposed to the standard approach where communication is triggered by time...
-
Increasing K-Means Clustering Algorithm Effectivity for Using in Source Code Plagiarism Detection
PublicationThe problem of plagiarism is becoming increasingly more significant with the growth of Internet technologies and the availability of information resources. Many tools have been successfully developed to detect plagiarisms in textual documents, but the situation is more complicated in the field of plagiarism of source codes, where the problem is equally serious. At present, there are no complex tools available to detect plagiarism...
-
Smart Services for Improving eCommerce
PublicationThe level of customer support provided by the existing eCom-merce solutions assumes that the person using the functionality of theshop has sufficient knowledge to decide on the purchase transaction. Alow conversion rate indicates that customers are more likely to seekknowledge about the particular product than finalize the transaction.This is facilitated by the continuous development of customers’ digi-tal...
-
Solving highly-dimensional multi-objective optimization problems by means of genetic gender
PublicationPaper presents a computational optimization study using a genetic gender approach for solving multi-objective optimization problems of detection observers. In this methodology the information about an individual gender of all the considered solutions is applied for the purpose of making distinction between different groups of objectives. This information is drawn out of the fitness of individuals and applied during a current parental...
-
Solving highly-dimensional multi-objective optimization problems by means of genetic gender
PublicationPaper presents a computational optimization study using a genetic gender approach for solving multi-objective optimization problems of detection observers. In this methodology the information about an individual gender of all the considered solutions is applied for the purpose of making distinction between different groups of objectives. This information is drawn out of the fitness of individuals and applied during a current parental...
-
Ontologie w Sieci Semantycznej
PublicationWraz z nastaniem ery Internetu i jego gwałtownym rozwojem, zasadniczym problemem dla współczesnej informatyki stała się automatyzacja pozyskiwania olbrzymich zasobów wiedzy ludzkiej w nim zgromadzonych. Wiedza ta ma bardzo zróżnicowany charakter z uwagi na wielość formatów zapisu danych, a przede wszystkim z uwagi na różny stopień jej ustrukturalizowania. Jedną z najbardziej popularnych idei dążących do systematycznego podejścia...
-
The Internet as a knowledge source in Knowledge Views
PublicationArtykuł ten przedstawia koncepcję widoków na bazę wiedzy, jak może ona zostać wykorzystana w celu zbierania informacji z różnych źródeł, wnioskowania nad tymi informacjami i udostępnienia ich w postaci wymaganej przez aplikację. Korzystając z widoków na bazę wiedzy, aplikacja może "widzieć" Internet jako pojedyncze źródło wiedzy.
-
Algebra konglomeratów jako narzędzie opisu problemów przetwarzania ontologii
PublicationW niniejszym artykule zaprezentowano nowe narzędzie przetwarzania modularnych baz wiedzy - algebrę konglomeratów. Przedstawioną propozycję wyróżnia fakt, że traktujemy moduły bazy wiedzy semantycznie. W artykule zaprezentowano doświadczenia związane z wykorzystaniem algebry (m.in. do dekompozycji bazy wiedzy oraz jako wsparcie procesu wnioskowania) oraz naszkicowano kierunki jej przyszłego rozwoju.
-
The reliability of tree and star networks
PublicationThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
Ontologia PIPSDrugs: praktyczne zastosowanie metody SIM
PublicationMetoda SIM zmniejsza złożoność ontologii oraz upraszcza proces modelowania, jednak może też wywołać niekorzystne zjawiska, np. konieczność uproszczenia modelu lub utrudnienie wnioskowania. Na pytanie, jak duży jest zasięg szkodliwych zjawisk, może odpowiedzieć tylko praktyczne zastosowanie. Ontologia POPSDrugs jest pierwszą praktyczną realizacją opisu wiedzy na podstawie reguły metody SIM.
-
Application of Knowledge Views = Zastosowanie widoków na bazę wiedzy
PublicationW artykule przedstawiono koncepcję widoków na bazę wiedzy i jej zastosowanie w inżynierii systemów. Praca ma na celu przybliżenie inżynierii wiedzy i technologii Semantic Web inżynierowi oprogramowania oraz programiście. Cel ten osiągany jest poprzez upodobnienie baz wiedzy do relacyjnych lub obiektowych baz danych oraz poprzez stosowanie wzorców znanych w inżynierii oprogramowania.
-
Ideologiczny i praktyczny model metaontologii
PublicationRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language) - języku dostępu do systemu zarządzania wiedzą RKaSeA.
-
Język KQL jako realizacja idei języka SQL dla bazy wiedzy
PublicationW ramach inicjatywy semantic web rozwijane są systemy wnioskowania z wiedzy. Ciągle otwartym problemem są również języki dostępu do takich systemów. W artykule zaproponowano nowy język dostępu do zmodularyzowanych baz wiedzy, o cechach umożliwiających jego kompleksowe wykorzystanie w systemach zarządzania wiedzą, w sposób analogiczny do wykorzystania języka sql w systemach relacyjnych baz danych.