Filters
total: 4127
filtered: 3142
-
Catalog
- Publications 3142 available results
- Journals 264 available results
- Conferences 82 available results
- Publishing Houses 2 available results
- People 72 available results
- Projects 8 available results
- e-Learning Courses 52 available results
- Events 1 available results
- Open Research Data 504 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: PHYSICAL LAYER SECURITY
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublicationThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
Searching for road deformations using mobile laser scanning
PublicationMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Global energy transition: From the main determinants to economic challenges regions
PublicationDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublicationPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublicationIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Nanotubular Oxide Layer Formed on Helix Surfaces of Dental Screw Implants
PublicationSurface modification is used to extend the life of implants. To increase the corrosion resistance and improve the biocompatibility of metal implant materials, oxidation of the Ti-13Nb- 13Zr titanium alloy was used. The samples used for the research had the shape of a helix with a metric thread, with their geometry imitating a dental implant. The oxide layer was produced by a standard electrochemical method in an environment of...
-
Crystal structure, chemical bonding, and physical properties of layered AIrSn2 (A = Sr and Ba)
PublicationWe report the experimental and theoretical investigation of structure, chemical bonding interactions, and physical properties of new ternary stannides AIrSn2 (A = Sr and Ba). AIrSn2 (A = Sr and Ba) crystallizes in the orthorhombic Re3B-type structure with the space group Cmcm (No. 64). According to single-crystal X-ray diffraction results, the structure of AIrSn2 (A = Sr and Ba) can be considered as a Zintl-type compound with heterogeneous...
-
Estimation of Stresses in a Dry Sand Layer Tested on Shaking Table
PublicationTheoretical analysis of shaking table experiments, simulating earthquake response of a dry sand layer, is presented. The aim of such experiments is to study seismic-induced compaction of soil and resulting settlements. In order to determine the soil compaction, the cyclic stresses and strains should be calculated first. These stresses are caused by the cyclic horizontal acceleration at the base of soil layer, so it is important...
-
CeCu2O4 as a functional layer on solid oxide fuel cells for synthetic biogas reforming
PublicationSolid Oxide Fuel Cells (SOFC) are one of the most promising electrochemical devices, which can convert chemical energy to the electrical energy these days. Their ability to work with different kind of fuel makes them noteworthy. SOFC can work with biogas. The problem arises when solid carbon starts to be deposited in anode. That leads to degradation of fuel cell. Simple solution is to apply catalytic functional layer, which is...
-
The Impact of Homogeneity of High Modulus Asphalt Concrete Layer on Low-Temperature Cracking
PublicationDuring winter season of 2012 numerous transverse cracks developed in high-modulus asphalt concrete (HMAC) base of newly constructed motorway. Pavement cracked both in transverse joint locations and in the area between them. Research which was conducted during investigation of the causes and mechanisms of cracking consisted of: field examination, laboratory testing of specimens cored out of the existing pavement, computational analyses...
-
Optimal reshaping and stress controlling of double-layer spherical structures under vertical loadings
PublicationOptimal reshaping and stress controlling of double-layer spherical structures under vertical loadings
-
Corrosion Study of Ceria Protective Layer Deposited by Spray Pyrolysis on Steel Interconnects
PublicationSingle fuel cells and electrolysis cells are assembled into stacks using interconnects in order to increase power and gas production capacity. The most common choice for the interconnect material is stainless steel. It has good electrical and mechanical properties and is also cost effective. One of the problems when using steel is the formation of a thermally grown oxide scale during use which has a lower electrical conductivity...
-
Health Enhancing Physical Activity Policies in Poland: Findings from the HEPA PAT Survey
PublicationInsufficient physical activity (PA) is one of major risk factors for serious diseases and premature mortality worldwide. Public policies to enhance PA across society are recognized as an effective tool against the problem. This paper presents the results of a comprehensive assessment of national-level PA policy approach in Poland. A standardized survey of Word Health Organization named the Health-Enhancing Physical Activity Policy...
-
Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0
PublicationThis paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....
-
Green Physical Activity Indicator: Health, Physical Activity and Spending Time Outdoors Related to Residents Preference for Greenery
Publication -
Network-centric warfare: a strategy for homeland security
PublicationPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Web-based marine gis for littoral security
PublicationW artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...
-
Lab security improvement using RFID technologies
PublicationTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Assessment of port facilities security in crisis management
PublicationZ punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...
-
Sectarianism as a Factor Shaping Persian Gulf Security
Publication -
Water resources security and management for sustainable communities
Publication -
Climate Changes in Southeastern Poland and Food Security
Publication -
Functional safety and security management in critical systems
PublicationGłównym celem referatu jest przedstawienie wybranych kwestii zarządzania bezpieczeństwem i ochroną w systemach podwyższonego ryzyka i systemach krytycznych. Zarysowuje się kilka praktycznych problemów analizy bezpieczeństwa funkcjonalnego w celu podejmowania decyzji zgodnie z normami międzynarodowymi IEC 61508 i IEC 61511. Podkreśla się, że aspekty związane z ochroną powinny być starannie rozpatrzone zarówno w fazie projektowania,...
-
Hierarchical approach to security monitoring and risk evaluation
PublicationPrzedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.
-
Security level estimation as a function of residual risks
PublicationArtykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.
-
Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies
PublicationCyber Physical Systems and Internet of Things have grown significant attention from industry and academia during the past decade. The main reason behind this interest is the capabilities of such technologies to revolutionize human life since they appear as seamlessly integrating classical networks, networked objects and people to create more efficient environments. However, enhancing these technologies with intelligent skills becomes...
-
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Few-Layer Black Phosphorus/Chitosan Nanocomposite Electrodes via Controlled Electrodeposition for Enhanced Electrochemical Kinetic Performance
PublicationThis study presents the preparation and characterization of few-layer black phosphorus (FLBP) chitosan electrodes by controlled electrochemical deposition of chitosan nanoparticles on FLBP-modified glassy carbon electrodes. FLBP was prepared by solvent-assisted exfoliation of bulk BP and was further modified with chitosan forming together a nanocomposite, including easy cross-linking with nanomaterials and film-forming properties....
-
Pressure field in a plane layer
PublicationPraca prezentuje wyniki badań teoretycznych i numerycznych zagadnienia przejścia fal płaskich przez warstwę. Omówiono zagadnienie tworzenia i rozchodzenia się fal w poszczególnych warstwach. Zaproponowano model matematyczny opisujący zmiany ciśnienia wewnątrz warstwy. Analizowano ciśnienie wewnątrz warstwy, fale bieżące i odbite wewnątrz warstwy oraz w ośrodku otaczającym. Przedstawiono wyniki badań numerycznych.
-
Assessment of microstructure, physical and thermal properties of bitumen modified with LDPE/GTR/elastomer ternary blends
PublicationLDPE/GTR/elastomer ternary blends with variable LDPE/GTR ratio and constant elastomer content were prepared via melt-compounding. Obtained LDPE/GTR/elastomer blends were applied as thermoplastic modifiers into bitumen. Microstructure, physical and thermal properties of the modified bitumen were determined. It was observed that chemical composition of LDPE/GTR/elastomer blends has significant influence on their density and rheological...
-
The Application of Granulated Expanded Glass Aggregate with Cement Grout as an Alternative Solution for Sub-Grade and Frost-Protection Sub-Base Layer in Road Construction
PublicationThe purpose of the research was to assess the possibility of using granulated expanded glass aggregate (GEGA) with cement grout as a replacement of a sub-grade and frost-protection layer, made of natural fine aggregates (NATU), stabilized with a hydraulic binder. Instead of traditional parts of the road construction, such as the sub-grade and frost-protection layer with the application of fine aggregate, stabilized with cement,...
-
The Influence of the Depth of Cut in Single-Pass Grinding on the Microstructure and Properties of the C45 Steel Surface Layer
PublicationThe paper contains the results of a metallographic examination and nanoindentation test conducted for the medium carbon structural steel with low content of Mn, Si, Cu, Cr, and Ni after its grinding to a depth ranging from 2 μm to 20 μm, at constant cutting speed (peripheral speed) of vs = 25 ms−1 and constant feed rate of vft = 1 m/min. Applied grinding parameters did not cause the surface layer hardening, which could generate...
-
PHYSICAL MODEL OF ENERGY-RELATED PROCESSES IN A ROTATING MECHANICAL SYSTEM FOR THE PURPOSES OF DIAGNOSIS OF TRANSMISSION SHAFTS
PublicationIn the present article, selected problems connected with identification of slowly changing energy-related processes accompanying high cyclic fatigue of construction materials of simple mechanical systems, with special consideration of transmission shafts, are mentioned for diagnostic purposes. The article also presents physical models of object and processes that in a simplified way reflect mechanical energy transmission from transmission...
-
Application of boron-doped diamond film and ZnO layer in the Fabry-Pérot interferometer
PublicationIn this article there have been presented the use of boron-doped diamond films for sensor applications. The low-finesse Fabry-Pérot interferometer working in the reflective mode has been implemented. Two kinds of reflective layers have been elaborated: boron-doped diamond thin films and zinc-oxide (ZnO) layer. Thin ZnO layers were deposited by Atomic Layer Deposition (ALD) on the face of a standard telecommunication single-mode...
-
Mechanical Behavior of Bi-Layer and Dispersion Coatings Composed of Several Nanostructures on Ti13Nb13Zr Alloy
PublicationTitanium implants are commonly used because of several advantages, but their surface modification is necessary to enhance bioactivity. Recently, their surface coatings were developed to induce local antibacterial properties. The aim of this research was to investigate and compare me-chanical properties of three coatings: multi-wall carbon nanotubes (MWCNTs), bi-layer composed of an inner MWCNTs layer and an outer TiO2 layer, and...
-
China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond
Publication -
The investment process in the power supply industry
PublicationThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems
PublicationKnowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Digital Public Service Innovation: Framework Proposal
PublicationThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublicationHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublicationArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
Automated Valuation Model based on fuzzy and rough set theory for real estate market with insufficient source data
PublicationObjective monitoring of the real estate value is a requirement to maintain balance, increase security and minimize the risk of a crisis in the financial and economic sector of every country. The valuation of real estate is usually considered from two points of view, i.e. individual valuation and mass appraisal. It is commonly believed that Automated Valuation Models (AVM) should be devoted to mass appraisal, which requires a large...
-
CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET
PublicationIn recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...
-
CMGNet: Context-aware middle-layer guidance network for salient object detection
PublicationSalient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature...
-
Performance of a single layer fuel cell based on a mixed proton-electron conducting composite
PublicationMany of the challenges in solid oxide fuel cell technology stem from chemical and mechanical incompatibilities between the anode, cathode and electrolyte materials. Numerous attempts have been made to identify compatible materials. Here, these challenges are circumvented by the introduction of a working single layer fuel cell, fabricated from a composite of proton conducting BaCe0.6Zr0.2Y0.2O3-δ and a mixture of semiconducting...