Filters
total: 430
filtered: 412
Search results for: DATA SECURITY
-
Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid
PublicationA unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublicationThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
Global energy transition: From the main determinants to economic challenges regions
PublicationDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublicationThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublicationIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems
PublicationKnowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...
-
Digital Public Service Innovation: Framework Proposal
PublicationThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET
PublicationIn recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublicationHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublicationArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
The investment process in the power supply industry
PublicationThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
Urban Food Self-Production in the Perspective of Social Learning Theory: Empowering Self-Sustainability
PublicationUrban food production is becoming an increasingly significant topic in the context of climate change and food security. Conducting research on this subject is becoming an essential element of urban development, deepening knowledge regarding the benefits, challenges, and potential for the development of urban agriculture as an alternative form of food production. Responding to this need, this monograph presents the results of...
-
Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis
PublicationThe paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....
-
Student Perspectives on the 2017 ESA Concurrent Engineering Challenge
PublicationIn September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublicationOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublicationIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Using the Fingerprinting Method to Customize RTLS Based on the AoA Ranging Technique
PublicationReal-time Locating Systems (RTLSs) have the ability to precisely locate the position of things and people in real time. They are needed for security and emergency applications, but also for healthcare and home care appliances. The research aims for developing an analytical method to customize RTLSs, in order to improve localization performance in terms of precision. The proposed method is based on Angle of Arrival (AoA), a ranging...
-
Tracking of the broadband source of the underwater noise in the very shallow water conditions
PublicationThe paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...
-
Oxygen vacancy-enriched V2O5·nH2O nanofibers ink for universal substrates-tolerant and multi means-integratable NH3 sensing
PublicationUniversal substrates-tolerant and multi means-integratable ammonia (NH3) sensing is highly desired in future Internet of Things in environmental monitoring, food security and early diagnosis of human diseases, however, is still less than satisfactory. Here, an oxygen vacancy-governed NH3 sensing has been developed with V2O5·nH2O nanofibers (NFs) ink, via combined thermal decomposition of ammonium metavanadate and dilution. As-obtained...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublicationWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
Urban city lights. Light pollution as one of the effects of incorrectly designed external illumination. How can a successful lighting masterplan diminish its impact?
PublicationIn the modern world, artificial lighting brings many tangible benefits such as the ability to extend working hours and so increase production, recreational use of the city after dark, or the possibility to travel regardless of the time of day. However, this flexibility comes at a price and negatively impacts on the environment. One such negative phenomenon is Light Pollution ‐ a term used to describe excessive nighttime artificial...
-
Overview of Metamaterials-Integrated Antennas for Beam Manipulation Applications: The Two Decades of Progress
PublicationMetamaterials (MMs) are synthetic composite structures with superior properties not found in naturally occurring materials. MMs have gained massive attention over the last two decades because of their extraordinary properties, such as negative permittivity and permeability. These materials enable many applications in communication subsystems, especially in the field of antenna design, to enhance gain, bandwidth, and efficiency,...
-
Customization of UWB 3D-RTLS Based on the New Uncertainty Model of the AoA Ranging Technique
PublicationThe increased potential and effectiveness of Real-time Locating Systems (RTLSs) substantially influence their application spectrum. They are widely used, inter alia, in the industrial sector, healthcare, home care, and in logistic and security applications. The research aims to develop an analytical method to customize UWB-based RTLS, in order to improve their localization performance in terms of accuracy and precision. The analytical...
-
Wyzwania metodyczne w procesie zarządzania bezpieczeństwem elektrowni jądrowych
PublicationW pracy przedstawiono aktualne zagadnienia i wyzwania metodyczne dotyczące zarządzania bezpieczeństwem elektrowni jądrowych. Nawiązuje się m.in. do publikacji Międzynarodowej Agencji Energii Atomowej z siedzibą w Wiedniu w sprawie zintegrowanego podejścia do zarządzaniu bezpieczeństwem (safety) i ochroną (security). Podkreśla się znaczenie projektowania niezależnych barier w systemie zabezpieczeń i zwiększania roli pasywnych układów...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublicationExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia
PublicationTrolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...
-
Hybrid no-signaling-quantum correlations
PublicationFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Calibration of acoustic vector sensor based on MEMS microphones for DOA estimation
PublicationA procedure of calibration of a custom 3D acoustic vector sensor (AVS) for the purpose of direction of arrival (DoA) estimation, is presented and validated in the paper. AVS devices working on a p-p principle may be constructed from standard pressure sensors and a signal processing system. However, in order to ensure accurate DoA estimation, each sensor needs to be calibrated. The proposed algorithm divides the calibration process...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublicationWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Functional safety and reliability analysis methodoloogy for hazardous industrial plants
PublicationThis monograph is devoted to current problems and methods of the functional safety and reliability analyses of the programmable control and protection systems for industrial hazardous plants. The results of these analyses are useful in the process of safety management in life cycle, for effective reducing relevant risks at the design stage, and then controlling these risks during the operation of given installation. The methodology...
-
The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation
PublicationIn this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...
-
On symmetric extendibility of quantum states and its applications
PublicationThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Greencoin: a Proenvironmental Action-Reward System
PublicationThe massive destruction of the natural environment is rapidly eroding the world’s capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles – understood in terms of both pro-environmental behaviors and green self-image on the one hand, and to build sustainable local and global communities, on the other, we put forward an idea of a novel action-reward system based...
-
Comprehensive thermodynamic analysis of steam storage in a steam cycle in a different regime of work: A zero-dimensional and three-dimensional approach
PublicationDue to the current trends aiming to reduce carbon dioxide emissions by increasing the use of renewable energy sources, changes are required in the operation of coal-fired steam units. The unstable nature of renewable energy sources, depending on weather conditions, means that the amount of energy produced varies and is not always in line with peak demand. To ensure the security and stability of energy supplies in the energy system,...
-
Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review
PublicationChildren with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublicationIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublicationThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublicationDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...