Search results for: economic security - Bridge of Knowledge

Search

Search results for: economic security

Filters

total: 333
filtered: 329

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: economic security

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publication
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Year 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Full text available to download

  • Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review

    Publication
    • K. D. Bartl-Pokorny
    • P. Uluer
    • D. E. Barkana
    • A. Baird
    • H. Kose
    • T. Zorcec
    • B. Robins
    • B. Schuller
    • A. Landowska
    • M. Pykała

    - IEEE Access - Year 2021

    Children with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...

    Full text available to download

  • Greencoin: a Pro­environmental Action-­Reward System

    Publication

    The massive destruction of the natural environment is rapidly eroding the world’s capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles – understood in terms of both pro-environmental behaviors and green self-image on the one hand, and to build sustainable local and global communities, on the other, we put forward an idea of a novel action-reward system based...

    Full text available to download

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Comprehensive thermodynamic analysis of steam storage in a steam cycle in a different regime of work: A zero-dimensional and three-dimensional approach

    Due to the current trends aiming to reduce carbon dioxide emissions by increasing the use of renewable energy sources, changes are required in the operation of coal-fired steam units. The unstable nature of renewable energy sources, depending on weather conditions, means that the amount of energy produced varies and is not always in line with peak demand. To ensure the security and stability of energy supplies in the energy system,...

    Full text available to download

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Year 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Full text available to download

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publication

    - Year 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...

    Full text available to download

  • Protection System Design of Induction Motor for Industries

    Publication

    - Year 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Full text to download in external service

  • Protection System Design of Induction Motor for Industries

    Publication

    - Modelling and Simulation in Engineering - Year 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Full text to download in external service

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Audio content analysis in the urban area telemonitoring system

    Publication

    Artykuł przedstawia możliwości rozwinięcie monitoringu miejskiego o automatyczną analizę dźwięku. Przedstawiono metody parametryzacji dźwięku, które możliwe są do zastosowania w takim systemie oraz omówiono aspekty techniczne implementacji. W kolejnej części przedstawiono system decyzyjny oparty na drzewach zastosowany w systemie. System ten rozpoznaje dźwięki niebezpieczne (strzał, rozbita szyba, krzyk) wśród dźwięków zarejestrowanych...

    Full text to download in external service

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage

    Publication

    - Internet Research - Year 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Full text to download in external service

  • A Simple Neural Network for Collision Detection of Collaborative Robots

    Publication

    Due to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...

    Full text available to download

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Year 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Full text available to download

  • Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings

    Publication

    The stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...

    Full text to download in external service

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publication

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can...

    Full text available to download

  • Sensors for Rapid Detection of Environmental Toxicity in Blood of Poisoned People

    Publication

    - Year 2016

    Recently, the diagnosis and treatment of poisoned person can be done only in specialized centers. Furthermore, currently used clinical methods of intoxication diagnosis are not sufficient for early detection. Conventional laboratory tests based on urine and blood require professional, high skilled staff, high cost equipment as well as they are arduous and lasting analytical procedures. There is a need to elaborate relatively cheap...

    Full text to download in external service

  • Information-driven network resilience: Research challenges and perspectives

    Publication
    • J. Rak
    • D. Papadimitriou
    • H. Niedermayer
    • P. Romero

    - Optical Switching and Networking - Year 2017

    Internet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...

    Full text to download in external service

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publication

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Year 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Full text to download in external service

  • Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework

    Publication

    - OCEAN & COASTAL MANAGEMENT - Year 2024

    The rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...

    Full text to download in external service

  • Functional safety and managing competence

    Publication

    - Year 2007

    Są nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...

  • System of monitoring of the Forest Opera in Sopot structure and roofing

    The authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...

    Full text to download in external service

  • Influence of Thermal Imagery Resolution on Accuracy of Deep Learning based Face Recognition

    Publication

    Human-system interactions frequently require a retrieval of the key context information about the user and the environment. Image processing techniques have been widely applied in this area, providing details about recognized objects, people and actions. Considering remote diagnostics solutions, e.g. non-contact vital signs estimation and smart home monitoring systems that utilize person’s identity, security is a very important factor....

    Full text available to download

  • Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego

    Wypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...

    Full text available to download

  • Koncepcja zdalnego sterowania i monitoringu urządzeń trakcyjnych z wykorzystaniem technologii teleinformatycznych

    Publication

    Advancement in wireless communication enables engineers to apply sophisticated and relatively inexpensive technologies in new fields of industry, which were previously designated solely to wire-based solutions. One of those fields is railway transportation system. In effect of a high reliability and safety demands, this area was resistive to new technologies. Nowadays, increased security and reliability of wireless sensor networks...

  • Impact of laser beam welding on mechanical behaviour of 2.25Cr–1Mo (P22) steel

    Publication
    • S. Sirohi
    • S. M. Pandey
    • V. Tiwari
    • D. Bhatt
    • D. Fydrych
    • C. Pandey

    - INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING - Year 2023

    The use of welding processes in the manufacturing and repair of structures intended for the energy industry plays a key role in the guarantee of a continuous supply of fossil fuels, which is the basic condition for ensuring energy security. A square butt joint of 10 mm thick plate of 2.25Cr–1Mo (P22) steel was fabricated by autogenous laser beam welding process and then post-weld heat treatment (PWHT) for two sets of process parameters...

    Full text to download in external service

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej

    Publication

    - Year 2018

    W monografii przedstawiono aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach i systemach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone, których nieprawidłowe...

    Full text to download in external service

  • Energy policy and the role of bioenergy in Poland

    Publication

    - ENERGY POLICY - Year 2006

    Przedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...

    Full text to download in external service