Filters
total: 8185
filtered: 5821
-
Catalog
- Publications 5821 available results
- Journals 632 available results
- Conferences 249 available results
- Publishing Houses 1 available results
- People 341 available results
- Inventions 1 available results
- Projects 22 available results
- Research Teams 1 available results
- Research Equipment 2 available results
- e-Learning Courses 262 available results
- Events 7 available results
- Open Research Data 846 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: CYBER-PHYSICAL SYSTEMS
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publicationn order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
A New Critical Risk on the Block: Cyber Risks as an Example of Technical Knowledge Risks in Organizations
PublicationThe breakout of the COVID-19 pandemic has intensified the appearance of many additional technical knowledge risks in organizations. Cyber risks in particular are becoming a great challenge for organizations. At the same time, academic research on cyber risks, their costs, consequences and ability of overcoming them is still scarce and fragmented. In order to fill this gap, the paper is aimed to identify different types of cyber...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublicationEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Smart Decisional DNA Technology to Enhance Industry 4.0 Environment in Conjunction with Conventional Manufacturing
PublicationKnowledge-based support has become an indispensable part not only to the traditional manufacturing set-ups but also to the new fast-emerging Industry 4.0 scenario. In this regard, successful research has been performed and extensively reported to develop Decisional DNA based knowledge representation models of engineering object and engineering process called Virtual engineering object (VEO), Virtual engineering process (VEP) and...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Contextual Knowledge to Enhance Workplace Hazard Recognition and Interpretation in a Cognitive Vision Platform
PublicationThe combination of vision and sensor data together with the resulting necessity for formal representations builds a central component of an autonomous Cyber Physical System for detection and tracking of laborers in workplaces environments. This system must be adaptable and perceive the environment as automatically as possible, performing in a variety of plants and scenes without the necessity of recoding the application for each...
-
Face recognition by humans with gaze-tracking system Cyber-Eye
PublicationW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko [3]. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
Towards an experience based collective computational intelligence for manufacturing
PublicationKnowledge based support can play a vital role not only in the new fast emerging information and communication technology based industry, but also in traditional manufacturing. In this regard, several domain specific research endeavors have taken place in the past with limited success. Thus, there is a need to develop a flexible domain independent mechanism to capture, store, reuse, and share manufacturing knowledge. Consequently,...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Badanie rozpoznawania twarzy przez człowieka z wykorzystaniem systemu śledzenia fiksacji wzroku Cyber-Oko
PublicationW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Awareness evaluation of patients in vegetative state employing eye-gaze tracking system
PublicationApplication of eye-gaze tracking system to awareness evaluation is demonstrated. Hitherto awareness evaluation methods are presented. The assumptions of proposed method based on analysis of visual activity of patients in vegetative state are demonstrated. The eye-gaze tracking system ''Cyber-Eye'' developed at the Multimedia Systems Department employed to conducted experiments is presented. Research described in the paper indicates...
-
Implementing Virtual Engineering Objects (VEO) with the Set of Experience Knowledge Structure (SOEKS)
PublicationThis paper illustrates the idea of Virtual Engineering Object (VEO) powered by Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). A VEO is the knowledge representation of an engineering object, having embodiment of all its associated knowledge and experience within it. Moreover, VEO is a specialization of Cyber-Physical System (CPS) in terms of that its extension in knowledge gathering and reuse, whereas CPS...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Cross-domain applications of multimodal human-computer interfaces
PublicationDeveloped multimodal interfaces for education applications and for disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and audio interface for speech stretching for hearing impaired and stuttering people and intelligent pen allowing for diagnosing and ameliorating developmental dyslexia. The eye-gaze tracking system named...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
A Plan for Training Global Leaders in Cybersecurity
PublicationReferat prezentuje wizję globalnego uniwersytetu, który będzie kształcił potencjalnych liderów w obszarze globalnego cyber-bezpieczeństwa. Opisuje on profil absolwenta z uwzględnieniem kompetencji technicznych, organizacyjnych, psychologiczno-socjologicznych i etycznych, a następnie przedstawia drogę realizacji tej wizji z uwzględnieniem istniejących zasobów.
-
Rozprzestrzenianie się w podtorzu skutków katastrof kolejowych z udziałem materiałów niebezpiecznych
PublicationDuża część przewozów materiałów niebezpiecznych prowadzona jest koleją. W związku z tym bezpieczeństwo tych przewozów nabiera coraz większego znaczenia. Każda katastrofa z udziałem materiałów niebezpiecznych ma negatywny wpływ na uczestników tego zdarzenia oraz na otaczające środowisko, bowiem jej zasięg na ogół nie jest lokalny. Z tego wynika, że w przypadku zaistnienia katastrofy należy minimalizować jej skutki oraz w dalszych...
-
Zastosowanie wyłącznika bezpiecznikowego do formowania impulsu wielkiej mocy
PublicationW wielu układach fizycznych i technicznych konieczne jest wytwarzanie impulsów wielkiej mocy o krótkim czasie trwania (rzędu ułamków µs). Impulsy te uzyskuje się stosując układy formujące zasilane ze źródła impulsowego wielkiej mocy, o długim czasie trwania impulsu, rzędu kilkudziesięciu µs. Jednym z układów formujących jest bezpiecznik wyłącznikowy. W pracy metodą symulacyjną badano wpływ parametrów bezpiecznika wyłącznikowego...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublicationMultimodal interfaces development history is reviewed briefly in the introduction. Some applications of multimodal interfaces to education software for disabled people are presented. One of them, the LipMouse is a novel, vision-based human-computer interface that tracks user’s lip movements and detect lips gestures. A new approach to diagnosing Parkinson’s disease is also shown. The progression of the disease can be measured employing...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Objectivization of Audio-Visual Correlation analysis
PublicationSimultaneous perception of audio and visual stimuli often causes the concealment or misrepresentation of information actually contained in these stimuli. Such effects are called the ''image proximity effect'' or the ''ventriloquism effect'' in literature. Until recently, most research carried out to understand their nature was based on subjective assessments. The Authors of this paper propose a methodology based on both subjective...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublicationMultimodal interfaces development history is reviewed briefly in the introduction. Examples of applications of multimodal interfaces to education software and for the disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and the audio interface for speech stretching for hearing impaired and stuttering people. The Smart...
-
Prądy łożyskowe w układach napędowych z silnikami indukcyjnymi
PublicationW pracy przedstawiono problemy występujące w układach napędowych z silnikami indukcyjnymi zasilanymi z falownika napięcia. Zwrócono uwagę na rosnącą liczbę uszkodzeń silników w napędach przekształtnikowych. Wskazano przyczyny wynikające z charakteru zasilania przekształtnikowego silnika. Główną uwagę poświęcono prądowi łożyskowemu, który odpowiada za większość awarii maszyn. Przedstawiono rodzaje prądów łożyskowych, wyjaśniając...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
O strumieniu mocy w silniku lub w układzie napędowym
PublicationW silniku lub w układzie napędowym wielkość strumienia mocy rośnie w kierunku przeciwnym do kierunku przepływu mocy. Straty energetyczne i sprawność energetyczna silnika lub układu napędowego powinny być przedstawiane jako funkcje wielkości fizycznych niezależnych od strat. Takimi wielkościami są prędkość i obciążenie silnika. Jednakże obraz strumienia mocy w silniku lub w układzie napędowym jest przedstawiany w literaturze w formie...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublicationArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
The EU's Cyber Security Strategy
Publication -
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Virtual Whiteboard: A gesture-controlled pen-free tool emulating school whiteboard
PublicationIn the paper the so-called Virtual Whiteboard is presented which may be an alternative solution for modern electronic whiteboards based on electronic pens and sensors. The presented tool enables the user to write, draw and handle whiteboard contents using his/her hands only. An additional equipment such as infrared diodes, infrared cameras or cyber gloves is not needed. The user's interaction with the Virtual Whiteboard computer...
-
Studies on the influence of β-cyclodextrin derivatives on the physical stability of famotidine
PublicationThe usage of Fourier transform infrared spectroscopy, near infrared spectroscopy, differential scanning calorimetry and microscopy is presented in this work focused on the exploration of the effect of CD on the physical stability of famotidine (FAM). The most significant information was achieved by analysis of the second derivatives ofnear infrared (NIR) spectra recorded. Changes in the shape of spectra derivatives allow...
-
The added value of using the HEPA PAT for physical activity policy monitoring: a four-country comparison
PublicationBackground Public policy is increasingly recognized as an important component of physical activity promotion. This paper reports on the current status of physical activity policy development and implementation in four European countries based on the Health-Enhancing Physical Activity Policy Audit Tool (HEPA PAT) developed by WHO. It compares the findings to previous studies and discusses the general utility of this tool and its...
-
Borders of Digital Art in the Context of the Information Society
PublicationThe article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...
-
Physical models in the education of architectural history
PublicationIn this article, the authors present the long tradition and common use of physical models in the process of teaching the history of architecture in higher education institutions. The research described in the article is focused on the use of physical models and mock-ups as stimulants during architectural history classes to support lectures and increase the learning capabilities of students. The authors also cover the general use...
-
Methods for physical impairment constrained routing with selected protection in all-optical networks
PublicationIn this paper, we investigate the problem of survivable all-optical routing in WDM networks with physical impairments. One of the recent key issues in survivable optical network design refers to maximization of the ratio of routeable demands while keeping the overall network cost low. In WDM networks, this goal can be achieved by routing as many demands in all-optical way as possible. Based on the latest technical trends driven...
-
PHYSICAL MODELLING OF GEOTECHNICAL STRUCTURES IN PORTS AND OFFSHORE
PublicationThe physical modelling of subsoil behaviour and soil-structure interaction is essential for the proper design of offshore structures and port infrastructure. A brief introduction to such modelling of geoengineering problems is presented and some methods and experimental devices are described. The relationships between modelling scales are given. Some examples of penetration testing results in centrifuge and calibration chamber...
-
On structural physical approximations and entanglement breaking maps
PublicationVery recently, a conjecture saying that the so-called structural physical approximations (SPAs) to optimal positive maps (optimal entanglement witnesses) give entanglement breaking (EB) maps (separable states) has been posed (Korbicz et al 2008 Phys. Rev. A 78 062105). The main purpose of this contribution is to explore this subject. First, we extend the set of entanglement witnesses supporting the conjecture. Then, we ask whether...
-
A Hyperdense Semantic Domain for Discontinuous Behavior in Physical System Models
PublicationMultiple time models have been proposed for the formalization of hybrid dynamic system behavior. The superdense notion of time is a well-known time model for describing event-based systems where several events can occur simultaneously. Hyperreals provide a domain for defining the semantics of hybrid models that is elegantly aligned with first principles in physics. This paper discusses the value of both time models and shows how...
-
Physical Properties of the Noncentrosymmetric SuperconductorMg10Ir19B16
Publication -
The Physical Activity Environment Policy Index for monitoring government policies and actions to improve physical activity
PublicationBackground A multifaceted response, including government action, is essential to improve population levels of physical activity (PA). This article describes the development process of the ‘Physical Activity Environment Policy Index’ (PA-EPI) monitoring framework, a tool to assess government policies and actions for creating a healthy PA environment. Methods An iterative process was undertaken. This involved a review of policy...
-
A history of the physical and chemical stability of pharmaceuticals : a review
Publication: There is a great need for a broad range review of stability tests of active pharmaceutical ingredients (APIs) in comparison with current requirements contained in the pharmacopoeia. This review focuses on a pharmaceutical history of physical and chemical stability determination. Traditional knowledge must be considered in the context of physical stability, while new knowledge must be applied and acquired in terms of identification...
-
METHODS FOR THE IDENTIFICATION OF CYBER RISKS: AN ANALYSIS BASED ON PATENT DATA
Publication