Filters
total: 1896
filtered: 392
Search results for: NODE-TARGETED ATTACKS
-
The Effect of Steaming Beech, Birch and Maple Woods on Qualitative Indicators of the Surface
PublicationThis work presents the effect of steaming beech, birch and maple woods on the resulting quality of the milled wood surface. The steaming process of the studied woods results in a targeted change in the color of the wood, which changes from the original light white-gray color to fine reddishbrown to dark brown color shades that are more or less saturated depending on the temperature of the saturated water steam. The color changes...
-
Intra-operative biopsy in chronic sinusitis detects pathogenic Escherichia coli that carry fimG/H, fyuA and agn43 genes coding biofilm formation
PublicationThe aim of this study was to investigate whether or not surgical biopsy of sinus tissue in chronic sinusitis, not responsive to treatment, would detect E. coli. We intended to evaluate E. coli virulence genes, therefore dispute the causal role of such an unusual microorganism in chronic sinusitis, as well as consider effective pathogen-targeted therapy. Patients with E. coli isolated by intra-operative puncture biopsy were included...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Polysaccharides-Based Hybrid Materials for Bio- and Non-Bio Sectors. Edytorial
PublicationThis special edition spotlights the recent research in the design, development, and emerging applications of polysaccharides-based hybrid materials for biotechnological and biomedical purposes. All the articles published in this issue underscore the significance of materials derived from cellulose, alginate, chitosan, starch, and carrageenan for various applications, including enzyme production, encapsulation, targeted drug delivery,...
-
E-textbook technologies for academics in medical education
PublicationPublic universities in Poland receive fairly limited financial support for creating e-textbooks and lack the appropriate ICT competences among teaching staff, especially in the case of non-technical universities. The authors propose a pedagogical and technological paradigm for e-textbooks in medical education using open source software with minimal IT skills required. Technologies used to develop e-textbooks are connected with:...
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublicationIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Finding small-width connected path decompositions in polynomial time
PublicationA connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...
-
Dynamical description of quantum computing: generic nonlocality of quantumnoise
PublicationWe develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
PublicationDisaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Visual Object Tracking System Employing Fixed and PTZ Cameras
PublicationThe paper presents a video monitoring system utilizing fixed and PTZ cameras for tracking of moving objects. First type of camera provides image for background modelling, being employed for foreground objects localization. Estimated objects locations are then utilised for steering of PTZ cameras when observing targeted objects with high close-ups. Objects are classified into several classes, then basic event detection is being...
-
Considerations of Computational Efficiency in Volunteer and Cluster Computing
PublicationIn the paper we focus on analysis of performance and power consumption statistics for two modern environments used for computing – volunteer and cluster based systems. The former integrate computational power donated by volunteers from their own locations, often towards social oriented or targeted initiatives, be it of medical, mathematical or space nature. The latter is meant for high performance computing and is typically installed...
-
VUV photofragmentation of the six-membered heterocyclic molecules containing oxygen
PublicationCancer is a significant public health concern worldwide, which results in millions of deaths each year. The standard cure routine for cancer is surgery, and nowadays, radiotherapy or a hadrontherapy. Depending on the type of cancer, patients may undergo additional treatment, including targeted therapy. A combination of radio- or hadron-therapy with proper drug treatment can inhibit the proliferation of cancer cells and thus can...
-
Closed-loop stimulation of temporal cortex rescues functional networks and improves memory
PublicationMemory failures are frustrating and often the result of ineffective encoding. One approach to improving memory outcomes is through direct modulation of brain activity with electrical stimulation. Previous efforts, however, have reported inconsistent effects when using open-loop stimulation and often target the hippocampus and medial temporal lobes. Here we use a closed-loop system to monitor and decode neural activity from direct...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Analysis of measurement uncertainty for contact-less method used to measure the position of catenary contact wire, performed with the use of Monte Carlo method
PublicationCurrently the majority of main railway lines in Europe are electrified, and electric trains have the biggest share in the entire amount of rail transport. Reliability of electrified railways is closely related to the issue of supplying traction vehicles with energy. The problems connected with diagnostics of energy consumption node, namely the contact line and the current collector, are therefore of fundamental importance for maintaining...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Analiza i ocena smarności olejów w ujęciu energetycznym i działania układu tribologicznego = Analysis and evaluation of oil lubricity from the viewpoint of energy apects and of the tribological system action
PublicationBased on measurement results, an interpretation is presented of the tribological system boundary layer action in the form of a four-ball tester friction node. The evaluation was performed of the boundary layer action understood as transfer of energy Ep resulting from loading the tribological system in a determined time t with work Lp, which may lead to breaking the boundary layer. That energy and time are the values unequivocally...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublicationGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Zastosowanie modułu symulacji dynamicznej programu CAD w analizie układu napędowego elektronarzędzia
PublicationW referacie przedstawiono analizę mechanicznego układu przeniesienia napędu elektronarzędzia (wyrzynarki elektrycznej) przy zastosowaniu Modułu Symulacji Dynamicznej (MSD) programu Autodesk Inventor (AI). Opracowano modele 3D poszczególnych części elektronarzędzia i połączono je przy zachowaniu tzw. kinematyki odwrotnej. Przeprowadzono analizę wpływu poszczególnych węzłów kinetycznych na przebieg momentu na wale silnika elektrycznego....
-
EMI mitigation of GaN power inverter leg by local shielding techniques
PublicationThis paper presents local shielding techniques applied to a half-bridge inverter leg with the aim to reduce the common mode (CM) current noise at converter’s DC input. The research study is conducted for 650V Enhancement mode Gallium Nitride (GaN) power transistor switches. Main contributors of parasitic capacitances referred to the inverter-leg middle point node are identified. Then, shielding solutions are proposed to reduce...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Use of ICT infrastructure for teaching HPC
PublicationIn this paper we look at modern ICT infrastructure as well as curriculum used for conducting a contemporary course on high performance computing taught over several years at the Faculty of Electronics Telecommunications and Informatics, Gdansk University of Technology, Poland. We describe the infrastructure in the context of teaching parallel programming at the cluster level using MPI, node level using OpenMP and CUDA. We present...
-
Influence of lubricating oil improvers on performance of crankshaft seals
PublicationThis paper presents an original method for checking influence of lubricating oil improvers on performance of crankshaft seals of combustion piston engine. Crankshaft seals were tested with the use of a modified friction node of T-02 four- ball apparatus in laboratory conditions. The tests were conducted according to a worked-out algorithm. Their results confirmed usefulness of the method for determining „harmful” performance...
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublicationArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Bacteriophages as potential tools for use in antimicrobial therapy and vaccine development
PublicationThe constantly growing number of people suffering from bacterial, viral, or fungal infections, parasitic diseases, and cancers prompts the search for innovative methods of disease prevention and treatment, especially based on vaccines and targeted therapy. An additional problem is the global threat to humanity resulting from the increasing resistance of bacteria to commonly used antibiotics. Conventional vaccines based on bacteria...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Wpływ smarowności na działania układu tribologicznego (impact of lubricity on the tribological system action)
Publicationthe paper presents analysis and evaluation, based on tests results, of the impact of lubricity of the used lubricating oils (shell argina t 40) on the action of boundary layer of sulzer 6zl40/48 engines aboard the ''włocławek'' sea-going ship. for comparison purposes, the same oils were tested with the ceramizer four-stroke engine (all types of the vidar four-stroke engines) regeneration agent added. so understood boundary layer...
-
Reliability model of slide bearings with particular attention given to lubricating oil
PublicationThe paper presents the slide bearing with circulating lubrication as a system of series three-element structure, where lubricating oil is the weakest link. In accordance with the Pierce statement that ''strength of chain is the strength of its weakest link'', a bearing reliability model has been developed. It allows to use the lubricating oil to evaluate the probability of correct working of the whole slide bearing, i.e. the reliability....
-
A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPI Applications
PublicationThe paper presents a fail-safe NVRAM based mechanism for creation and recovery of data copies during parallel MPI application runtime. Specifically, we target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload...
-
Structural response of existing spatial truss roof construction based on Cosserat rod theory
PublicationPaper presents the application of the Cosserat rod theory and newly developed associated finite elements code as the tools that support in the expert-designing engineering practice. Mechanical principles of the 3D spatially curved rods, dynamics (statics) laws, principle of virtual work are discussed. Corresponding FEM approach with interpolation and accumulation techniques of state variables are shown that enable the formulation...
-
Timber Frame Houses with Different Insulation Materials - Seismic Analysis
PublicationThe aim of this article is to present results of a dynamic numerical analysis focused on the response of two timber frame building structures exposed to seismic excitations. The first structure was insulated with mineral wool, while the second one with polyurethane foam. Specifications and technology involved in the models' construction are based on the previously conducted experimental study, upon which numerical structural models...
-
Novel Adaptive Method for Data Streams Allocation Based on the Estimate of Radio Channel Parameters in Heterogeneous WBAN Network
PublicationThe new adaptive method for data streams allocation in heterogeneous Wireless Body Area Networks and meas-urement equipment is presented. The results obtained using the developed method compared with the selected algorithms likely to be used in those networks. The pro-posed adaptive data streams allocation method based on radio channel parameters makes it even twice as efficient to use in terms of resources usage in a WBAN heterogeneous...