Filters
total: 2699
filtered: 1596
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 836 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
Dosimetric features of strontium orthosilicate (Sr2SiO4) doped with Eu2+
Publication -
Persons' identification techniques based on characteristic features of face
PublicationIstnieje wiele metod identyfikacji osób opartych na ich cechach charakterystycznych. Metody te ograniczone są poprzez warunki, w których zdjęcie zostało wykonane jak na przykład oświetlenie. Autorzy artykułu proponują zastosowanie rozmytych reguł decyzyjnych oraz skonstruowanie miary podobieństwa na podstawie względnych odległości pomiędzy niezmienniczymi w czasie cechami charakterystycznymi twarzy do usunięcia ograniczeń istniejących...
-
Bimodal Emotion Recognition Based on Vocal and Facial Features
PublicationEmotion recognition is a crucial aspect of human communication, with applications in fields such as psychology, education, and healthcare. Identifying emotions accurately is challenging, as people use a variety of signals to express and perceive emotions. In this study, we address the problem of multimodal emotion recognition using both audio and video signals, to develop a robust and reliable system that can recognize emotions...
-
Ranking Speech Features for Their Usage in Singing Emotion Classification
PublicationThis paper aims to retrieve speech descriptors that may be useful for the classification of emotions in singing. For this purpose, Mel Frequency Cepstral Coefficients (MFCC) and selected Low-Level MPEG 7 descriptors were calculated based on the RAVDESS dataset. The database contains recordings of emotional speech and singing of professional actors presenting six different emotions. Employing the algorithm of Feature Selection based...
-
Testing a Variety of Features for Music Mood Recognition. Testowanie zestawu parametrów w celu rozpoznawania nastroju w muzyce
PublicationMusic collections are organized in a very different way depending on a target, number of songs or a distribution method, etc. One of the high-level feature, which can be useful and intuitive for listeners, is “mood”. Even if it seems to be the easiest way to describe music for people who are non-experts, it is very difficult to find the exact correlation between physical features and perceived impressions. The paper presents experiments...
-
Compact 4 × 4 butler matrix with non‐standard phase differences for IoT applications
PublicationButler matrices represent a popular class of feeding networks for antenna arrays. Large dimensions and the lack of flexibility in terms of achievable output phase difference make conventional Butler structures of limited use for modern communication devices. In this work, a compact planar 4 × 4 matrix with non-standard relative phase shifts of –30º, 150º, –120º, and 60º has been proposed. The structure is designed to operate at...
-
Time window based features extraction from temperature modulated gas sensors for prediction of ammonia concentration
PublicationElectronic gas recognition systems, in literature commonly referred as electronic noses, enable the recognition of a type and a concentration of various volatile compounds. Typical electronic gas-analyzing device consists of four main elements, namely, gas delivery subsystem, an array of gas sensors, data acquisition and power supply circuits and data analysis software. The commercially available metal-oxide TGS sensors are widely...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publication -
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Challenges in security and safety management of critical systems and infrastructures
PublicationReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Extraction and evaluation of gas-flow-dependent features from dynamic measurements of gas sensors array
PublicationGas analyzers based on gas sensors are the devices which enable recognition of various kinds of volatile compounds. They have continuously been developed and investigated for over three decades, however there are still limitations which slow down the implementation of those devices in many applications. For example, the main drawbacks are the lack of selectivity, sensitivity...
-
In uence of Low-Level Features Extracted from Rhythmic and Harmonic Sections on Music Genre Classi cation
PublicationWe present a comprehensive evaluation of the infuence of 'harmonic' and rhythmic sections contained in an audio file on automatic music genre classi cation. The study is performed using the ISMIS database composed of music files, which are represented by vectors of acoustic parameters describing low-level music features. Non-negative Matrix Factorization serves for blind separation of instrument components. Rhythmic components...
-
DIAGNOSIS OF MALIGNANT MELANOMA BY NEURAL NETWORK ENSEMBLE-BASED SYSTEM UTILISING HAND-CRAFTED SKIN LESION FEATURES
PublicationMalignant melanomas are the most deadly type of skin cancer but detected early have high chances for successful treatment. In the last twenty years, the interest of automated melanoma recognition detection and classification dynamically increased partially because of public datasets appearing with dermatoscopic images of skin lesions. Automated computer-aided skin cancer detection in dermatoscopic images is a very challenging task...
-
Adaptive Positioning Systems Based on Multiple Wireless Interfaces for Industrial IoT in Harsh Manufacturing Environments
PublicationAs the industrial sector is becoming ever more flexible in order to improve productivity, legacy interfaces for industrial applications must evolve to enhance efficiency and must adapt to achieve higher elasticity and reliability in harsh manufacturing environments. The localization of machines, sensors and workers inside the industrial premises is one of such interfaces used by many applications. Current localization-based systems...
-
Electrophysiological features in patients with sinus node dysfunction and vasovagal syncope
PublicationThe aim of the study was to identify electrophysiological criteria that can be used for identification of patients with sinus node dysfunction and concurrent vasovagal syncope.
-
A computational view on nanomaterial intrinsic and extrinsic features for nanosafety and sustainability
Publication -
The Multiplatform Environment for Simulation and Features Estimation of Mixed-Signal Devices
PublicationThe use of simulation laboratories is gaining popularity in thedomains of engineering programs. However, the experience in teaching showsthat the simulation itself is not very effective in didactic processes. Teachingprocesses in thefield of specialist subjects, designed for students of technicaluniversities, should be based on direct operations performed by the student onreal devices. At the same time, at the later stages of didactic...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Techniques of acquiring additional features of the responses of individual gas sensors
PublicationGas sensors usually exhibit lack of selectivity, require fre quent calibration, exhibit drift of the response and a lot of factors, such as humidity or ambient temperature, influen ce their performance. Different approaches can be used to overcome this shortcomings. Building arrays of different sensors and usage of pattern recognition methods to analyze responses of elements...
-
Anodized multi – component titanium alloys carrying antibacterial features
Publication -
Real-Time Aerial Mapping by Image Features Extraction and Matching
Publication -
Playback detection using machine learning with spectrogram features approach
PublicationThis paper presents 2D image processing approach to playback detection in automatic speaker verification (ASV) systems using spectrograms as speech signal representation. Three feature extraction and classification methods: histograms of oriented gradients (HOG) with support vector machines (SVM), HAAR wavelets with AdaBoost classifier and deep convolutional neural networks (CNN) were compared on different data partitions in respect...
-
Rapid Yield Optimization of Miniaturized Microwave Passives by Response Features and Variable-Fidelity EM Simulations
PublicationThe operation of high-frequency devices, including microwave passive components, can be impaired by fabrication tolerances but also incomplete knowledge concerning operating conditions (temperature, input power levels) and material parameters (e.g., substrate permittivity). Although the accuracy of manufacturing processes is always limited, the effects of parameter deviations can be accounted for in advance at the design phase...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Implementation and testing of Level 2 security architecture for the IIP System
PublicationSystem IIP definiuje kilka równoległych Internetów (PI), w tym jeden oparty na IPv6, dwa na rozwiązaniach post-IP oraz sieć zarządzania, pracujących na wspólnej infastrukturze komunikacyjnej. System ma architekturę 4-poziomową, w której poziom 2 odpowiada za tworzenie zasobów wirtualnych PI. W artykule omawiana jest trójwarstwowa architektura bezpieczeństwa proponowana dla przeciwdziałania zagrożeniom wprowadzania obcego ruchu...
-
The Poland-United States Security Relations in the light of Asymmetry Theory
Publication -
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
Publication -
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Adaptation of various persons' identification techniques as a solution for security and safety
PublicationPrzedstawiono różne metody identyfikacji osób w oparciu o ich cechy biometryczne w zastosowaniu do bezpieczeństwa i zabezpieczeń. Takimi biometrycznymi cechami mogą być właściwości fizjologiczne jak odciski palców, kształt dłoni, właściwości tęczówki jak również cechy behawioralne jak sposób pisania lub wypowiadania się.
-
The practical implementation of security models and strategies in an academic network infrastuctures
PublicationArtykuł prezentuje modele i strategie bezpieczeństwa dotyczące infrastruktury sieciowej. Rozważone zostały typowe zagrożenia oraz mechanizmy bezpieczeństwa sieci komputerowej. Wymienione zostały także różnice w polityce bezpieczeństwa pomiędzy komputerową siecią komercyjną a akademicką. Opisano proces analizy ryzyka dla akademickiej sieci komputerowej oraz wskazany został sposób oszacowania wymaganego poziomu bezpieczeństwa sieci.
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
A model-based approach to analysis of security protocols - a case study
PublicationArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
Security of energy supply under the demonopolization of energy production in Poland,
PublicationOmówiono wzrost zapotrzebowania na energie elektryczną, udział nośników energii pierwotnej w pokryciu zapotrzebowania na paliwa. Omówiono pokrótce akty prawne związane z ochrona środowiska i energetyka. Scharakteryzowano proces starzenia się elektrowni w Polsce i rolę dużych elektrowni systemowych. Na tym tle przedstawiono rozproszone źródła energii elektrycznej i ich wpływ na bezpieczeństwo dostaw energii w sytuacjach ekstremalnych,...
-
Flood Security Strategy - Case Studies from Gdańsk Region
Publication.
-
Innovative method for utilization of wastewater for security and safety in rural areas
PublicationIn the rural areas building of sewerage systems and central wastewater treatment plants (WWTPs) often brings too high costs, due to high distances from one farm to another and terrain configuration. Individual treatment systems for each farm are a good solution. The teratment wetlands for nine individual farms were constructed in Kaszubian Lake District in summer and autumn 2009. Three configurations of reed beds were chosen. In...
-
LRIT - a novel system of vessels monitoring for maritime security and safety
PublicationW artykule przedstawiono propozycję architektury przyszłego, globalnego systemu monitorowania statków LRIT (Long Range ship's Identification and Tracking) podlegających konwencji SOLAS. Przedstawiono i scharakteryzowano poszczególne komponenty systemu ze szczególnym uwzględnieniem aspektów radiokomunikacyjnych.
-
Computer-Aided Diagnosis of COVID-19 from Chest X-ray Images Using Hybrid-Features and Random Forest Classifier
PublicationIn recent years, a lot of attention has been paid to using radiology imaging to automatically find COVID-19. (1) Background: There are now a number of computer-aided diagnostic schemes that help radiologists and doctors perform diagnostic COVID-19 tests quickly, accurately, and consistently. (2) Methods: Using chest X-ray images, this study proposed a cutting-edge scheme for the automatic recognition of COVID-19 and pneumonia....
-
On Accelerated Metaheuristic-Based Electromagnetic-Driven Design Optimization of Antenna Structures Using Response Features
PublicationDevelopment of present-day antenna systems is an intricate and multi-step process requiring, among others, meticulous tuning of designable (mainly geometry) parameters. Concerning the latter, the most reliable approach is rigorous numerical optimization, which tends to be re-source-intensive in terms of computing due to involving full-wave electromagnetic (EM) simu-lations. The cost-related issues are particularly pronounced whenever...
-
Convolutional Neural Networks for C. Elegans Muscle Age Classification Using Only Self-Learned Features
PublicationNematodes Caenorhabditis elegans (C. elegans) have been used as model organisms in a wide variety of biological studies, especially those intended to obtain a better understanding of aging and age-associated diseases. This paper focuses on automating the analysis of C. elegans imagery to classify the muscle age of nematodes based on the known and well established IICBU dataset. Unlike many modern classification methods, the proposed...
-
Features of irregularity in examples of Polish multi-family architecture constructed in 2011–2021 and nominated for the Mies van der Rohe award
PublicationThis article is devoted to the analysis of contemporary Polish multi-family architecture in the context of aesthetic irregularity. The research was limited to constructions from 2011–2021 and nominated for the Mies van der Rohe award as the objects with the greatest potential impact on shaping further trends. In their research, the authors focused on searching for the features of irregularities, which, in their opinion, have become...
-
Reduced-cost surrogate modeling of input characteristics and design optimization of dual-band antennas using response features
PublicationIn this article, a procedure for low-cost surrogate modeling of input characteristics of dual-band antennas has been discussed. The number of training data required for construction of an accurate model has been reduced by representing the antenna reflection response to the level of suitably defined feature points. The points are allocated to capture the critical features of the reflection characteristic, such as the frequencies...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublicationTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Comparative Assessment of Geomorphological and Landscape Features Around the Small Aral Sea
Publication -
Molecular features of thymidine analogues governing the activity of human thymidine kinase
Publication