Search results for: SUPERVISORY OR SECURITY SYSTEMS - Bridge of Knowledge

Search

Search results for: SUPERVISORY OR SECURITY SYSTEMS

Filters

total: 6854
filtered: 4613

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: SUPERVISORY OR SECURITY SYSTEMS

  • Imminent threats analysis and security level evaluation in social networks

    Publication

    - Year 2011

    Rozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...

  • The Poland-United States Security Relations in the light of Asymmetry Theory

    Publication

    Full text to download in external service

  • The practical implementation of security models and strategies in an academic network infrastuctures

    Publication

    - Year 2005

    Artykuł prezentuje modele i strategie bezpieczeństwa dotyczące infrastruktury sieciowej. Rozważone zostały typowe zagrożenia oraz mechanizmy bezpieczeństwa sieci komputerowej. Wymienione zostały także różnice w polityce bezpieczeństwa pomiędzy komputerową siecią komercyjną a akademicką. Opisano proces analizy ryzyka dla akademickiej sieci komputerowej oraz wskazany został sposób oszacowania wymaganego poziomu bezpieczeństwa sieci.

  • Ad hoc routing protocols - security objectives, threats and solution

    Publication

    Zaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.

  • Adaptation of various persons' identification techniques as a solution for security and safety

    Publication

    - Year 2005

    Przedstawiono różne metody identyfikacji osób w oparciu o ich cechy biometryczne w zastosowaniu do bezpieczeństwa i zabezpieczeń. Takimi biometrycznymi cechami mogą być właściwości fizjologiczne jak odciski palców, kształt dłoni, właściwości tęczówki jak również cechy behawioralne jak sposób pisania lub wypowiadania się.

  • A model-based approach to analysis of security protocols - a case study

    Publication
    • M. (. Olszewski

    - Year 2005

    Artykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...

  • Security of energy supply under the demonopolization of energy production in Poland,

    Publication

    - Year 2005

    Omówiono wzrost zapotrzebowania na energie elektryczną, udział nośników energii pierwotnej w pokryciu zapotrzebowania na paliwa. Omówiono pokrótce akty prawne związane z ochrona środowiska i energetyka. Scharakteryzowano proces starzenia się elektrowni w Polsce i rolę dużych elektrowni systemowych. Na tym tle przedstawiono rozproszone źródła energii elektrycznej i ich wpływ na bezpieczeństwo dostaw energii w sytuacjach ekstremalnych,...

  • LRIT - a novel system of vessels monitoring for maritime security and safety

    Publication

    - Year 2006

    W artykule przedstawiono propozycję architektury przyszłego, globalnego systemu monitorowania statków LRIT (Long Range ship's Identification and Tracking) podlegających konwencji SOLAS. Przedstawiono i scharakteryzowano poszczególne komponenty systemu ze szczególnym uwzględnieniem aspektów radiokomunikacyjnych.

  • Implementation and testing of Level 2 security architecture for the IIP System

    Publication

    - Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne - Year 2012

    System IIP definiuje kilka równoległych Internetów (PI), w tym jeden oparty na IPv6, dwa na rozwiązaniach post-IP oraz sieć zarządzania, pracujących na wspólnej infastrukturze komunikacyjnej. System ma architekturę 4-poziomową, w której poziom 2 odpowiada za tworzenie zasobów wirtualnych PI. W artykule omawiana jest trójwarstwowa architektura bezpieczeństwa proponowana dla przeciwdziałania zagrożeniom wprowadzania obcego ruchu...

  • INNOVATIVE RUN FLAT SYSTEMS

    Publication

    - Journal of KONES - Year 2015

    One of the most essential threats to the mobility of wheeled vehicles is their relatively high sensitivity to tire damage. Tires can be damaged as a result at vehicle-targeting fire, after running on a mine or an improvised charge. The purpose of the article is to analyze the current technical solutions in wheeled vehicle tires, allowing for the unobstructed use of the vehicle despite the damage of one or several tires (RUN FLAT...

    Full text available to download

  • Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure

    Safety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...

    Full text to download in external service

  • Implementation of integrated control In drinking water distribution systems - IT system proposal

    Publication

    Implementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...

    Full text to download in external service

  • Research on GNSS satellite navigation systems

    This article contains results of research on two GNSS systems, i.e. GPS and GLONASS. Architectures, signal structures and navigation messages of both systems have been described. Some selected investigation results, concerning receiver performance in presence of interference, have been presented.

  • Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems

    Rapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...

    Full text available to download

  • Systems of Nonlinear Fractional Differential Equations

    Using the iterative method, this paper investigates the existence of a unique solution to systems of nonlinear fractional differential equations, which involve the right-handed Riemann-Liouville fractional derivatives D(T)(q)x and D(T)(q)y. Systems of linear fractional differential equations are also discussed. Two examples are added to illustrate the results.

    Full text to download in external service

  • Utilising IT-based systems in regatta management

    Publication

    - Year 2016

    The development and increasing accessibility of new technologies has brought changes to the management of sailing regattas. Organisational and promotional difficulties faced by the organisers are now being tackled with software-based systems. This article considers various information technology (IT) systems, designed to support the organisation and presentation of sailing regattas and explores how they are perceived by regatta...

  • The consideration to the dynamic systems parameter identification

    In this paper, a concept for continuous-time dynamic systems parameter identification using modulating function approach is presented. It refers to linear as well as selected non-linear systems. It shows the possibility of direct application without converting differential equation. In particular cases direct application can decrease the amount of computation in non-linear system identification, which generally requires Fourier...

    Full text to download in external service

  • Towards automation of IT systems repairs

    Publication

    - SOFTWARE QUALITY JOURNAL - Year 2016

    Monitoring and repair are two sides of the on-the-fly maintenance of IT systems.Monitoring is well supported by automatic tools. In contrast, repairs involve much higherhuman intervention which negatively affects reliability and efficiency. The paper intro-duces a method of automating repairs of IT systems which can be integrated with any ofthe existing monitoring mechanisms. The method is described as a collection of modelsand...

    Full text available to download

  • Verification of a Novel Method of Detecting Faults in Medium-Voltage Systems with Covered Conductors

    Publication

    - Metrology and Measurement Systems - Year 2017

    This paper describes the use of new methods of detecting faults in medium-voltage overhead lines built of covered conductors. The methods mainly address such faults as falling of a conductor, contacting a conductor with a tree branch, or falling a tree branch across three phases of a medium-voltage conductor. These faults cannot be detected by current digital relay protection systems. Therefore, a new system that can detect the...

    Full text available to download

  • Alternative Energy: Photovoltaic Modules and Systems

    Publication

    Use of solar energy does not contribute to global warming. The light-to-current conversion (photovoltaic conversion) takes place within solar cells, which in most cases are made of silicon. Solar module consists of many solar cells, which are electrically connected and placed between glass or Tedlar® and framed by an aluminium frame. A number of solar modules and other components form photovoltaic systems. In this entry, a brief...

    Full text to download in external service

  • Semantic Integration of Heterogeneous Recognition Systems

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2011

    Computer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...

  • PHONEME DISTORTION IN PUBLIC ADDRESS SYSTEMS

    Publication

    - Year 2015

    The quality of voice messages in speech reinforcement and public address systems is often poor. The sound engineering projects of such systems take care of sound intensity and possible reverberation phenomena in public space without, however, considering the influence of acoustic interference related to the number and distribution of loudspeakers. This paper presents the results of measurements and numerical simulations of the...

  • A Review of Antennas for Indoor Positioning Systems

    Publication

    - International Journal of Antennas and Propagation - Year 2012

    This paper provides a review of antennas applied for indoor positioning or localization systems. The desired requirements of thoseantennas when integrated in anchor nodes (reference nodes) are discussed, according to different localization techniques and theirperformance. The described antennas will be subdivided into the following sections according to the nature of measurements:received signal strength (RSS), time of flight (ToF),...

    Full text available to download

  • Test Design Patterns for Embedded Systems,

    Publication
    • J. Zander
    • A. M. Perez
    • I. Schieferdecker
    • Z. R. Dai

    - Year 2007

    Test suites for embedded systems are typically created from scratch using dif- ferent, often inadequate methods. In consequence, industry branches dealing with software-intensive embedded systems have to cope with quality problems, even though test processes are particularly time-consuming and costly. Based on an evolving model-based testing methodology we introduce test design patterns for simplifying and accelerating...

    Full text to download in external service

  • The Efficiency of Post‐Communist Countries’ Health Systems

    Publication

    - Year 2017

    Health‐care costs are a major financial burden for the transition economies, which have experienced rapidly increasing demand for health‐care services. The former communist countries of the Central and Eastern Europe and Central Asia needed to reform the financing of their health‐care systems and make efforts to strengthen the role of primary care while limiting the role of hospital care. The growing health needs and, consequently,...

    Full text to download in external service

  • Fuel systems of high power stationary engine

    Publication

    The use of alternative fuels and, in the future, synthetic fuels has forced changes in the design of fuel supply systems in internal combustion engines. When operating a stationary engine at constant load, the possibility of using lean fuel mixtures appears. The selection of a precise operating mixture ignition system requires changes in traditional fuel systems. The article presents the current designs of fuel supply systems and...

    Full text available to download

  • Knowledge processing methodologies in intelligent autonomous systems

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2011

    Przedstawiono najnowsze trendy oraz stan badań światowych w zakresie wspomagania procesów zarządzania wiedzą w inteligentnych systemach autonomicznych.

    Full text to download in external service

  • Quality Modeling in Grid and Volunteer-Computing Systems

    Publication

    - Year 2013

    A model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...

  • EU's Energy Policy and Assessing Europe's Spiraling Energy Security Crises

    Publication
    • M. Bharti

    - Year 2023

    Full text to download in external service

  • INDO–FRENCH DEFENCE PARTNERSHIP AND REGIONAL SECURITY BALANCE IN SOUTH ASIA

    Publication
    • M. Bharti

    - Torun International Studies - Year 2023

    Full text to download in external service

  • Topology improvements in scale-free networks when assuring security and survivability

    Publication

    - Year 2005

    W artykule zaproponowano heurystyczny algorytm iteracyjny (NEA) kontrolowanego rozrostu sieci, zmniejszający stopień jej bezskalowości. Pokazano, że odpowiednia kontrola rozrostu sieci, prowadzi do uzyskania sieci o topologii zbliżonej do regularnej, a więc w duzym stopniu odpornej na celowe działania niszczące - ataki. Właściwości algorytmu zostały przebadane przy pomocy dedykowanego symulatora dla reprezentatywnej próby inicjalnych...

  • Systematics of intelligent transport systems services

    Recent years have seen a more intensified deployment of Intelligent Transport Systems (ITS) in Polish cities. Work is also underway on the implementation of ITS on the national roads within the National Traffic Management System (KSZR). The research project RID-4D (part of Road Innovations), is designed to fill the gap, which is the lack of systematics of ITS services in Poland. The paper presents a proposal of ITS services systematics,...

    Full text available to download

  • Adaptive Dynamical Systems Modelling of Transformational Organizational Change with Focus on Organizational Culture and Organizational Learning

    Publication

    - Cognitive Systems Research - Year 2023

    Transformative Organizational Change becomes more and more significant both practically and academically, especially in the context of organizational culture and learning. However computational modeling and a formalization of organizational change and learning processes are still largely unexplored. This paper aims to provide an adaptive network model of transformative organizational change and translate a selection of organizational...

    Full text available to download

  • Solving the Problem of Dynamic Adaptability of Artificial Intelligence Systems that Control Dynamic Technical Objects

    Publication

    - CYBERNETICS AND SYSTEMS ANALYSIS - Year 2018

    This paper investigates the increase in the response speed and stability of artificial intelligence systems that control dynamic technical objects. The problem of calculating the optimal time of switching an artificial intelligence system between software classes by the criterion of the rigidity degree of the model of a control object is considered. The solution of this problem is proposed for the general case of the control object...

    Full text to download in external service

  • Assessment of Road Restraint Systems in Polish Conditions

    Key to understanding the needs and tools of road infrastructure management is identifying the hazards and their sources involved in having no or faulty road restraint systems. Clarity is also needed on why the systems are wrongly designed, constructed, built and operated. To ensure that the problem is adequately understood, research and site observations were conducted and...

    Full text available to download

  • Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data

    The paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...

    Full text to download in external service

  • Modelling of Mechatronic Systems with Distributed Parameter Components

    Publication

    - Year 2010

    The paper presents an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of distributed system has been defined by application of the bond graph methodology and the distributed transfer function method (DTFM). The proposed method of modelling enables to formulate input data for computer analysis by application of the DTFM. The computational package for the analysis of complex...

  • Innovative Research Into Road Restraint Systems

    Key to understanding the needs and building road infrastructure management tools to prevent and mitigate run-off-road accidents is to identify hazards and their sources which are a result of wrong design, construction, installation and maintenance of road restraint systems [1]. Building such tools requires advanced studies with field tests, simulations and models to demonstrate the effects of selected parameters on road user safety...

    Full text available to download

  • A Concept of Modeling and Optimization of Applications in Large Scale Systems

    Publication

    - Year 2013

    The chapter presents the idea that includes modeling and subsequent optimization of application execution on large scale parallel and distributed systems. The model considers performance, reliability and power consumption. It should allow easy modeling of various classes of applications while reflecting key parameters of both the applications and two classes of target systems: clusters and volunteer based systems. The chapter presents...

  • Clarke duality for Hamiltonian systems with nonstandard growth

    Publication

    We consider the existence of periodic solutions to Hamiltonian systems with growth conditions involving G-function. We introduce the notion of symplectic G-function and provide relation for the growth of Hamiltonian in terms of certain constant CG associated to symplectic G-function G. We discuss an optimality of this constant for some special cases. We also provide applications to the Φ-laplacian type systems.

    Full text available to download

  • Optimum Control of Gyroscopic Systems

    Publication

    The problem of optimum control of transverse rotor vibrations with gyroscopic interactions has been described and solved in the paper. An integral performance index has been defined for such system in order to minimize vibration level of a chosen rotor point. For this reason, an efficient way of finding the weight coefficients of integral performance index for multi-degrees-of-freedom system with gyroscopic interactions has been...

    Full text to download in external service

  • Smart Embedded Systems with Decisional DNA Knowledge Representation

    Publication

    - Year 2020

    Embedded systems have been in use since the 1970s. For most of their history embedded systems were seen simply as small computers designed to accomplish one or a few dedicated functions; and they were usually working under limited resources i.e. limited computing power, limited memories, and limited energy sources. As such, embedded systems have not drawn much attention from researchers, especially from those in the artificial...

    Full text to download in external service

  • Losses and energy efficiency of drive motors and systems

    Publication

    Losses and energy efficiency of every drive motor must be presented as functions of physical quantities independent of losses in the motor. Such quantities are speed and load required by the machine or device driven by the motor, changing in the drive operating field. Speed and load of the motor decide of the instantaneous useful power of the motor and also in a differentiated way of kinds and values of losses occurring in the...

    Full text available to download

  • Losses and energy efficiency of drive motors and systems

    Publication

    - Year 2013

    Losses and energy efficiency of every drive motor must be presented as functions of physical quantities independent of losses in the motor. Such quantities are speed and load required by the machine or device driven by the motor, changing in the drive operating field. Speed and load of the motor decide of the instantaneous useful power of the motor and also in a differentiated way of kinds and values of losses occurring in the...

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Generic invariant measures for iterated systems of interval homeomorphisms

    Publication

    - ARCHIV DER MATHEMATIK - Year 2020

    It is well known that iterated function systems generated by orientation preserving homeomorphisms of the unit interval with positive Lyapunov exponents at its ends admit a unique invariant measure on (0, 1) provided their action is minimal. With the additional requirement of continuous differentiability of maps on a fixed neighbourhood of {0,1} { 0 , 1 } , we present a metric in the space of such systems which renders it complete....

    Full text available to download

  • Towards Robust Identification of Nonstationary Systems

    Publication

    The article proposes a fast, two-stage method for the identification of nonstationary systems. The method uses iterative reweighting to robustify the identification process against the outliers in the measurement noise and against the numerical errors that may occur at the first stage of identification. We also propose an adaptive algorithm to optimize the values of the hyperparameters that are crucial for this new method.

    Full text to download in external service

  • Towards automating repairs of IT systems

    Publication

    - Year 2009

    This paper presents formal description of working principles of the repair library, being the essential component of the Repair Management Framework (RMF), which aims at automating the process of repairing IT systems, and consists also of the Repair Management Model (RMM) and the Repair Management System (RMS). RMM introduces two mathematical models (model of monitoring and model of repair processes), general enough to cover the...

  • The analysis of turbine propulsion systems in nuclear submarines

    Publication

    The article systematises submarines, which are presently in service, according to their propulsion types (both conventional and nuclear), power output, and submersion depth. Contemporary types of propulsion systems installed and used in submarines are discussed. Calculations were performed for the PWR (Pressurized Water Reactor) type nuclear propulsion system and the supercritical turbine propulsion system (supercritical reactor...

    Full text to download in external service

  • Camera sabotage detection for surveillance systems

    Publication

    Camera dysfunction detection algorithms and their utilization in realtime video surveillance systems are described. The purpose of using the proposed analysis is explained. Regarding image tampering three algorithms for focus loss, scene obstruction and camera displacement detection are implemented and presented. Features of each module are described and certain scenarios for best performance are depicted. Implemented solutions...

    Full text to download in external service