Filters
total: 6839
filtered: 4602
-
Catalog
- Publications 4602 available results
- Journals 577 available results
- Conferences 317 available results
- Publishing Houses 1 available results
- People 307 available results
- Inventions 1 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 2 available results
- e-Learning Courses 224 available results
- Events 7 available results
- Open Research Data 776 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: SUPERVISORY OR SECURITY SYSTEMS
-
Smart Knowledge Engineering for Cognitive Systems: A Brief Overview
PublicationCognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...
-
Cognitive Systems, Concepts, Processes, and Techniques for the Age of Industry 4.0
PublicationThe aim of this Guest Edition of Cybernetics and Systems is to present a wide-ranging scale of concepts and processes being currently researched, developed, and evaluated in real life settings in anticipation of incoming Industry 4.0 era. With the fourth industrial revolution expectation, the broad spectrum of cognitive approaches have emerged as an attempt to mimic and augment, in some way, human intelligence. Intelligence, in...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Subharmonic solutions for a class of Lagrangian systems
PublicationWe prove that second order Hamiltonian systems with a potential of class C1, periodic in time and superquadratic at infinity with respect to the space variable have subharmonic solutions. Our intention is to generalise a result on subharmonics for Hamiltonian systems with a potential satisfying the global Ambrosetti-Rabinowitz condition from [P. H. Rabinowitz, Proc. Roy. Soc. Edinburgh Sect. A, 114 (1990), 33-38]. Indeed, we weaken...
-
The modelling method of discrete-continuous systems
PublicationThe paper introduces a method of discrete-continuous systems modelling. In the proposed method a three-dimensional system is divided into finite elements in only two directions, with the third direction remaining continuous. The thus obtained discrete-continuous model is described by a set of partial differential equations. General difference equations of discrete system are obtained using the rigid finite element method. The limit...
-
Systems of boundary value problems of advanced differential equations
PublicationThis paper considers the existence of extremal solutions to systems of advanced differential equations with corresponding nonlinear boundary conditions. The monotone iterative method is applied to obtain the existence results. An example is provided for illustration.
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublicationW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Lab security improvement using RFID technologies
PublicationTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Hierarchical approach to security monitoring and risk evaluation
PublicationPrzedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.
-
Network-centric warfare: a strategy for homeland security
PublicationPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Web-based marine gis for littoral security
PublicationW artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...
-
Assessment of port facilities security in crisis management
PublicationZ punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...
-
Sectarianism as a Factor Shaping Persian Gulf Security
Publication -
Water resources security and management for sustainable communities
Publication -
Climate Changes in Southeastern Poland and Food Security
Publication -
Security level estimation as a function of residual risks
PublicationArtykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Stream Reasoning to Improve Decision-Making in Cognitive Systems
PublicationABSTRACT Cognitive Vision Systems have gained a lot of interest from industry and academia recently, due to their potential to revolutionize human life as they are designed to work under complex scenes, adapting to a range of unforeseen situations, changing accordingly to new scenarios and exhibiting prospective behavior. The combination of these properties aims to mimic the human capabilities and create more intelligent and efficient...
-
Computational collective intelligence for enterprise information systems
PublicationCollective intelligence is most often understood as a kind of intelligence which arises on the basis of a group (collective) of autonomous unites (people, systems) which is taskoriented. There are two important aspects of an intelligent collective: The cooperation aspect and the competition aspect (Levy 1997). The first of them means the possibility for integrating the decisions made by the collective members for creating the decision of...
-
China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond
Publication -
Rule-Based Model for Selecting Integration Technologies for Smart Cities Systems
PublicationThe aim of this article is to present the stages of development for an information technology integration model for the design of systems for smart cities. The Introduction explains the need for integration technologies and presents a model for selecting integration technologies and the conditions for its use in designing smart cities systems. Then two verification stages of the presented model are discussed. In the first stage,...
-
Potential Application of Solar Energy Systems for Electrified Urban Transportation Systems
PublicationThe paper presents a novel approach toward the use of solar energy systems in public transportation. The concept of energy generation in PV systems for supplying a trolleybus transportation system is proposed for the city of Gdynia (Poland). The suggested way of energy production allows reducing the environmental harm impact of the municipal transportation system. Moreover, the proposed way of green energy use can be a more profitable...
-
A CONTEXT IN RECOMMENDER SYSTEMS
PublicationRecommender systems aim to propose potentially interesting items to a user based on his preferences or previous interaction with the system. In the last decade, researcher found out that known recommendation techniques are not sufficient to predict user decisions. It has been noticed that user preferences strongly depend on the context in which he currently is. This raises new challenges for the researchers such as how to obtain...
-
Periodic Solutions of Generalized Lagrangian Systems with Small Perturbations
PublicationIn this paper we study the generalized Lagrangian system with a small perturbation. We assume the main term in the system to have a maximum, but do not suppose any condition for perturbation term. Then we prove the existence of a periodic solution via Ekeland’s principle. Moreover, we prove a convergence theorem for periodic solutions of perturbed systems.
-
From Knowledge based Vision Systems to Cognitive Vision Systems: A Review
PublicationComputer vision research and applications have their origins in 1960s. Limitations in computational resources inherent of that time, among other reasons, caused research to move away from artificial intelligence and generic recognition goals to accomplish simple tasks for constrained scenarios. In the past decades, the development in machine learning techniques has contributed to noteworthy progress in vision systems. However,...
-
Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA
PublicationVisual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublicationIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Editorial: Applied intelligence and knowledge based systems: approaches and case studies - part 2
PublicationWydanie Cybernetics and Systems poswiecone zagadnieniom zarzadzania wiedza.
-
Cognitive memory for intelligent systems of decision-making, based on human psychology
PublicationA model of memory, which allows to expand the functionality of autonomous decision-making systems for robotic and human-system-interface purposes, is discussed. The model provides functions and features which make the prospective robotic and interfacing systems more human-like as well as more efficient in solving interactive issues.
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Survey of Radio Navigation Systems
PublicationAt present, there is a growing demand for radio navigation systems, ranging from pedestrian navigation to consumer behavior analysis. These systems have been successfully used in many applications and have become very popular in recent years. In this paper we present a review of selected wireless positioning solutions operating in both indoor and outdoor environments. We describe different positioning techniques, methods, systems,...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Introduction to the special issue on intelligent systems to aid the handicapped.
PublicationWśród wielu zastosowań sztucznej inteligencji i technologii bazodanowych pojawiają się zastosowania wspierające osoby niepełnosprawne. Z chwilą pojawienia są każdej nowej technologii komputerowej świat naukowy proponuje zastosowania tej technologii do celu poprawy komunikacji z osobami niepełnosprawnymi bądź technologie wspierające te osoby bezpośrednio. Niniejsze wydanie specjalne czasopisma Journal of Intelligent Information...
-
Dynamic Execution of Engineering Processes in Cyber-Physical Systems of Systems Toolchains
PublicationEngineering tools support the process of creating, operating, maintaining, and evolving systems throughout their lifecycle. Toolchains are sequences of tools that build on each others' output during this procedure. The complete chain of tools itself may not even be recognized by the humans who utilize them, people may just recognize the right tool being used at the right place in time. Modern engineering processes, however, do...
-
Geometric methods in dynamical systems modelling: electrical, mechanical and control systems
PublicationRozważono zagadnienia modelowania systemów dynamicznych z zastosowaniem metod geometrii różniczkowej. Równania dynamiczne otrzymano w postaci inkluzji różniczkowych. Przestrzenie konstytucyjne przyjęto w postaci subwiązek włóknistych. Rozważono przestrzenie konstytucyjne układów elektrycznych, układów mechanicznych i układów sterowania. Podstawowe wyniki pracy dotyczą struktury przestrzeni rozwiązań rozważanych systemów.
-
Multi agent grid systems
PublicationThis chapter presents an idea of merging grid and volunteer systemswith multi agent systems. It gives some basics concerning multi agentsystem and the most followed standard. Some deliberations concerningsuch an existing systems were made in order to finally present possibilities of introducing agents into the Comcute system.
-
Developing Methods for Building Intelligent Systems of Information Resources Processing Using an Ontological Approach
PublicationThe problem of developing methods of information resource processing is investigated. A formal procedure description of processing text content is developed. A new ontological approach to the implementation of business processes is proposed. Consider that the aim of our work is to develop methods and tools for building intelligent systems of information resource processing, the core of knowledge bases of which are ontology’s, and...
-
Combined Heat & Power Generating Systems
PublicationSteam cycles in combined heat and power plants. Efficiency of combined heat and power systems. Characteristics of steam-turbine CHP plants. Choice of equipment in CHP generating systems. Economic effects of combined heat and power production. Costs and energy produced CHP generating systems. Future development trends in CHP generating systems.
-
Identification of Continuous Systems - Practical Issues of Insensitivity to Perturbations
PublicationIn this paper the issue of continuous systems estimation, insensitive to certain perturbations, is discussed. Such an approach has rational advantages, especially when robust schemes are used to assist a target system responsible for industrial diagnostics. This requires that estimated model parameters are generated on-line, and their values are reliable and to a great extent accurate. Practical hints are suggested to challenge...
-
A system automating repairs of IT systems
PublicationThis paper presents two problems that are important nowadays: the problem of IT systems monitoring and the problem of repairing them. It shows the developed solution, aimed to automate the existing industrial repair process and to integrate it with the existing monitoring solutions and mechanisms. Described solution is a part of a bigger whole, called the Repair Management Framework (RMF). This paper presents also briefly a case...
-
Investigation of tracking systems properties in CAVE-type virtual reality systems
PublicationIn recent years, many scientific and industrial centers in the world developed a virtual reality systems or laboratories. One of the most advanced solutions are Immersive 3D Visualization Lab (I3DVL), a CAVE-type (Cave Automatic Virtual Environment) laboratory. It contains two CAVE-type installations: six-screen installation arranged in a form of a cube, and four-screen installation, a simplified version of the previous one. The...
-
Non-regular, incomplete and singular dynamical systems: impasse points indynamical systems
PublicationRozważono nieregularne, niezupełne i osobliwe różniczkowe systemy dynamicznez zastosowaniem metod geometrii różniczkowej.
-
Multiuser Stereoscopic Projection Techniques for CAVE-Type Virtual Reality Systems
PublicationDespite the development of increasingly popular head mounted displays, CAVE-type systems may still be considered one of the most immersive virtual reality systems with many advantages. However, a serious limitation of most CAVE-type systems is the generation of a three-dimensional (3-D) image from the perspective of only one person. This problem is significant because in some applications, the participants must cooperate with each...
-
Investigation of optical properties of Infitec and Active Stereo stereoscopic techniques for CAVE-type virtual reality systems
PublicationIn recent years, many scientific and industrial centres in the world developed virtual reality systems or laboratories. At present, among the most advanced virtual reality systems are CAVE-type (Cave Automatic Virtual Environment) installations. Such systems usually consist of four, five, or six projection screens arranged in the form of a closed or hemi-closed space. The basic task of such systems is to ensure the effect of user...
-
INNOVATIVE RUN FLAT SYSTEMS
PublicationOne of the most essential threats to the mobility of wheeled vehicles is their relatively high sensitivity to tire damage. Tires can be damaged as a result at vehicle-targeting fire, after running on a mine or an improvised charge. The purpose of the article is to analyze the current technical solutions in wheeled vehicle tires, allowing for the unobstructed use of the vehicle despite the damage of one or several tires (RUN FLAT...
-
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.