Filters
total: 205
filtered: 187
Search results for: threats
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublicationConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
Publication -
Wireless Systems of Threats Monitoring
Publication -
Wireless systems of threats monitoring
Publication -
Wireless systems of threats monitoring
Publication -
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
ChatGPT - opportunities or threats in the educational process
Publication -
Malware - a survey on threats and mitigation techniques
PublicationThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
Threats to Rural Landscape and Its Protection in Poland
PublicationThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS
PublicationAccess to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...
-
Investigation of Noise Threats and Their Impact on Hearing in Selected Schools
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Early detection of imminent threats in social relation graphs
PublicationWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublicationThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
WP1 of INDECT Project: Intelligent Monitoring and Automatic Detection of Threats
Publication -
WP1: Intelligent Monitoring and Automatic Detection of Threats - partners cooperation
Publication -
WP1: Intelligent monitoring and automatic detection of threats -introduction to the WP1
Publication -
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublicationThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publication -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublicationIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publication -
Vaccination Against Measles, Mumps, and Rubella in the Light of Current Epidemic Threats: Unjustified Postponement
Publication -
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublicationIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Innovative consciousness and threats estimation connected with implementation of innovations to SMEs cooperating with shipbuilding industry
PublicationPodejmowanie działań innowacyjnych przez małe i średnie przedsiębiorstwa nie jest szeroko rozpowszechnione. Wynika to, między innymi, ze specyfiki tego sektora. MSP często dysponują ograniczonymi środkami finansowymi i nisko wykwalifikowanymi pracownikami, co stanowi w wielu przypadkach barierę we wprowadzaniu innowacji. Nie mniej istotne są inne podmioty działające w otoczeniu MSP włączające się w realizacje procesu innowacyjnego....
-
THE IMPLICATIONS OF ECONOMIC DEVELOPMENT, CLIMATE CHANGE AND EUROPEAN WATER POLICY ON SURFACE WATER QUALITY THREATS
Publication -
Zagrożenia środowiska podczas eksploatacji gazociągów podmorskich = Environmental threats during oparation of subsea gas pipelines
PublicationPrzedstawiono wybrane zagadnienia eksploatacji gazociągów podmorskich, w tym zagrożenia dla rekreacyjnego i gospodarczego korzystania z morza. Uszkodzenie gazociągu podmorskiego jest zazwyczaj spowodowane korozją, działaniami morskimi lub zagrożeniami naturalnymi. W określonych warunkach mogą wytrącić się kryształy hydratów węglowodorów gazowych, co może prowadzić do zablokowania linii przesyłowej
-
Occurrence of Trichocolea tomentella (Ehrh.) Dumort. (Marchantiophyta, Trichocoleaceae) in the Polish Carpathians: distribution, habitat preferences, current threats, and recommendations
Publication -
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
GeoSPAR Project. Validation and selection methods of geoinformation analysis using GIS for ranking and forecasting of terrorist threats and criminal events
PublicationThe paper presents the description of work activities which have already been done within the first two stages – WorkPackage 1 and WorkPackage 2 - of the GeoSPAR Project. In such a context the general conceptual design of the GIS system and associate web service was presented and analysed. In addition, the operational and technical requirements for the GeoSPAR system have been specified and discussed; with special emphasis on system...
-
Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń
PublicationRozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...
-
A city and a wind farm. Landscape perspective
PublicationThe aim of the paper is to present the problems of the location of the wind farms in close neighbourhood to the historical cities, and the ways to minimize the potential landscape threats. The production of clean energy is obligatory in EU. In spite of how positive to the environment the wind energy production is, it may cause negative effects. The results of landscape studies of two towns in Poland prove that the location of such...
-
The green waterfront of a city. Where are the limits of good planning? Gdansk case
PublicationThe aim of the article is to present the role of green public areas of waterfronts in shaping the image of cities, and the threats to such landscape which may be caused by wrong planning decisions. The case study of Gdansk sea-shore area in Poland is presented as an example to illustrate the values and potential of the waterfront landscape which can be easily destroyed by inadequate spatial development. Some theoretical studies...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
Badania systemów powstrzymujących pojazd przed wypadnięciem z drogi - cz. I
PublicationTransportation systems are designed and used so as to effectively and safely relocate people, goods and services. Despite this there are numerous hazards that disrupt or damage these systems. Risks such as extreme weather conditions, terrorist threats, landsliders or earthquakes are difficult to predict, manage and mitigate. One of the hazards for transportation systems are accidents, and their impact on the transport functioning...
-
Small city and a bridge. Landscape perspective
PublicationThe aim of the paper is to present the problems connected with the location of big infrastructure objects; like bridges; in close neighbourhood to the small cities located in valuable environment and landscape; and the ways to minimize the potential threats. The case study of the small town Wyszogrod in central Poland will be presented to illustrate the values of the environment and landscape; which could have been easily destroyed...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Acoustics - new services for urban planning, research and education
PublicationThe main purpose of the presented design is twofold, namely: providing detailed information about the noise threats that occur every day in city areas and preventing the noise induced hearing loss especially among young people. An experimental system designed for the continuous monitoring of the acoustic climate of urban areas was developed and implemented within the PLGrid Plus project. The assessment of environmental threats...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
The networking of the justice system as part of public court networks
PublicationThe goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...
-
Security Assessment of a Turbo-Gas Power Plant
PublicationCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
Landscape as a Potential Key Concept in Urban Environmental Planning: The Case of Poland
PublicationRapid urban development increases the consumption of materials, energy, and water, resulting in an overproduction of waste and emissions. These cause many environmental threats, such as ozone layer depletion and rain acidification, leading to climate change. Therefore, the question arises on how to improve the effectiveness of tools that strengthen environmental protection. This discursive article presents an approach stressing...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Case studies of resonance phenomena in high voltage overhead power lines with shunt reactors
PublicationMisguided design of the towers of power transmission lines can lead to serious problems such as voltage asymmetry, overvoltages, electric arc extinction difficulties or resonance – in case of double circuit line with shunt reactors. The paper points out those threats on example of 400 kV double circuit overhead transmission line with shunt reactors.
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Rospuda - czy wszędzie budować mosty?
PublicationStreszczenie - SummaryThe article presents the problem of planning transport system in the areas of high natural and landscape values. Bridges and roads crossing valuable areas undergo Environmental Impact Assessment (EIA) Procedure. This procedure in Poland is often treated only as formal requirement, not as an instrument helping to solve conflicts and to minimise negative environmental and landscape effects. The potential of...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Sources of investment risk in urban regeneration projects
PublicationThe scope of the article includes multidimensional risk analysis of urban regeneration projects, whose base is to identify areas of its occurrence. Authors thoroughly analyze the sources of potential threats and attempts to answer the question, what is their contribution into overall urban regeneration’ investment risk. The target concept will be used to assess the level of investment risk at the stage of initiation, preparation...
-
Concrete versus green corridors in road planning. Gdansk case
PublicationThe aim of an article is to present the threats which may be caused by the construction of the transit road inside the city structure, and some mitigation measures aiming to eliminate or minimize environmental and landscape damages and social problems. Theoretical guidelines and conclusions will be followed by the example illustrating the problem. As an answer, some guidelines enabling sustainable road planning will be presented....
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublicationRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Determining and visualizing safe motion parameters of a ship navigating in severe weather conditions
PublicationThe paper presents a method of determining, organizing and displaying ship collision avoidance information, which is based on the Collision Threat Parameters Area (CTPA) technique. The method makes it possible to visualize navigational threats as well as possible collision avoidance manoeuvres. The solution is focused on supporting navigation in severe weather conditions. Normally collision avoidance decisions are made taking into...
-
Mobility Oriented Development (MOD): Public-Private Partnership in Urban Parking & Traffic Management with the Use of Autonomous Automobiles, Car-Sharing, Ridesharing Modes of Transport & Mobility as a Service (MaaS)
PublicationThe focus of the following research are relations between mobility technologies and metropolitan (urban and suburban) spatial structures. In this paper the author discusses various urban modes of transport (automobile, mass transit) in the context of emerging technical (autonomous vehicles, self-driving cars and driverless shuttles) and organizational (carpooling, ridesharing, car-sharing, on-demand mobility) solutions for " mobility...
-
Nowe wyzwania, nowe rozwiązania. Jak przedsiębiorstwo branży IT odnajduje się w erze VUCA?
PublicationZmienność, niepewność, złożoność i niejednoznaczność, określane akronimem VUCA (volatility, uncertainty, complexity, ambiguity) towarzyszą funkcjonowaniu każdego przedsiębiorstwa. Jak wykorzystać te nieodłączne cechy otoczenia przedsiębiorstw jako szanse dla ich rozwoju to wy-zwania stojące przed nimi, a zarazem pytanie badawcze artykułu. Celem artykułu jest wykazanie, na przykładzie przedsiębiorstwa branży IT, że analiza zmienności,...
-
Profesjonalizacja zawodu dziennikarza w obliczu konwergencji mediów
PublicationCelem artykułu jest poszerzenie stanu obecnej wiedzy na temat zmian zachodzących w dziennikarstwie, spowodowanych digitalizacją oraz konwergencją mediów. Autorzy przeprowadzili badania wśród dziennikarzy, które dotyczyły ich opinii na temat profesjonalizacji, procesu zmian w mediach oraz możliwości i zagrożeń spowodowanych przez nowe media.
-
Photolytic and Photocatalytic Recreational Water Treatment
PublicationDisinfection is one of the most important steps during recreational water treatment. Nevertheless, disinfection by-products are formed by conventional disinfectants, which pose several health threats. The concentration of disinfection by-products can be decreased by photolytic and photocatalytic treatment. Medium-pressure mercury lamp, UV-LEDs and solar irradiation were investigated and evaluated considering emitted wavelength,...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Method of sacrificial anode transistor-driving in cathodic protection system
PublicationA magnesium anode driving system has been proposed. A PNP driving transistor has been used. Electrochemical testing in 3%NaCl, results and comparison of the driving system and classic direct anode to cathode connection are presented. The driving system reduced the protection current and stabilized the working conditions of the anode. Higher anode efficiency was achieved. Overprotection and hydrogen embrittlement threats were prevented...
-
Diagnostics in ballast water management
Publication. Diagnostics in ballast water management is the main remedy to protect against the threat of spreading invasive species that can be carried in ships' ballast tanks. This phenomenon is getting better known and understood. New and more effective methods of preventing threats related to this are being developed. Procedures are created to ensure environmental safety in the face of ever-increasing transport by sea. The article characterizes...
-
Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?
PublicationPositive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublicationThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Frequently updated noise threat maps created with use of supercomputing grid
PublicationAn innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed services were developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers....
-
Influence of Operation Conditions on Temperature Hazard of Lithium-Iron-Phosphate (LiFePO4) Cells
PublicationThe article presents and discusses the results of research on hazard, especially temperature, for selected lithium-ion-phosphate cells operated in accordance with the manufacturer’s recommendations but used under onerous mining conditions. This applies to the performance of cells in battery sets without the application of any management system (BMS). On the basis of the obtained test results, first of all, the influence of the...
-
Biopolymers in designing modern antimicrobial medical materials. Part I. Biopolymer medical materials - collagen, chitosan
PublicationThe article is a review of the literature concerning the possible use of biopolymers for the preparation of dressings with antimicrobial activity. Authors show the potential of biopolymers: collagen and chitosan - which have the ability to immobilize and control the release of various active compounds - for providing the appropriate antibacterial, bacteriostatic and wound healing properties. Types of threats, for which the dressing...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Oczekiwania stron konfliktu i mediatorów wobec e-mediacji. Czy e-mediacja ma przyszłość?
PublicationArtykuł prezentuje możliwości prowadzenia mediacji – skutecznej i korzystnej, ale rzadko wykorzystywanej w Polsce metody pozasądowego rozstrzygania sporów - z wykorzystaniem profesjonalnej platformy internetowej. Na podstawie badań przeprowadzonych na grupie mediatorów oraz stron konfliktów określono oczekiwania dotyczące prowadzenia e-mediacji i wyzwania, jakie stawia przed mediatorami mediacja on-line.
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Forecasted climate changes and their influence on cities and regions in 2050 in terms of extreme hydrological events
PublicationGlobal climate change is a problem which arises numerous theories and uncertainties, especially in terms of speculated human impact. Independent from the fact, what is the main driver for the changes, some of the climate shifts are visible already nowadays. Both contemporary and future cities will have to face such problems. Although climate change may cause numerous effects on different fields, a special stress in this article...
-
Analysis of the Usefulness of Cheap Audio Recorders for Spectral Measurement of Environmental Noise
PublicationEnvironmental noise pollution is nowadays one of the most serious health threats. The impact of noise on the human body depends not only on the sound level but also on its spectral distribution. Reliable measurements of the environmental noise spectrum are often hampered by the very high price of top quality measuring devices. This paper explores the possibility of using much cheaper audio recorders for the frequency analysis....
-
EHV transmission lines wires location on line operation issues - case studies
PublicationTransmission lines towers construction affects the line parameters and influences on its operation in the future. Misguided design of the tower can lead to serious problems such as overvoltages, electric arc extinction difficulties, voltage asymmetry, resonance phenomena or increasing of magnetic field near the line. The paper points out those threats on example of 400 kV double circuit overhead transmission line with shunt reactors....
-
Trudności ochrony środowiska w planowaniu przestrzennym–struktura problemu
PublicationArtykuł zawiera ogólną systematykę negatywnych oddziaływań na środowisko przyrodnicze. Autor omawia trudności zapobiegania przez planowanie przestrzenne zagrożeniom środowiska. Analizuje strukturę problemu, wskazując czynniki: społeczne, gospodarcze, prawne i polityczne, w tym rolę: motywacji, hierarchii wartości, świadomości ekologicznej, przekonań. Autor wskazuje też działania prowadzące do ograniczenia zagrożeń.
-
Youth attitude to entrepreneurship in Eastern and Central European countries: Gender aspect
PublicationCurrent business conditions pose new challenges to youth entrepreneurship, which is a significant component of countries’ economic growth. In addition, Generation Z differs from previous generations and requires new approaches. In this context, a comprehensive study of the peculiarities and various aspects of youth entrepreneurship development is highly-demanded and relevant. Furthermore, the lower representation of women among...
-
Forecasting risks and challenges of digital innovations
PublicationForecasting and assessment of societal risks related to digital innovation systems and services is an urgent problem, because these solutions usually contain artificial intelligence algorithms which learn using data from the environment and modify their behaviour much beyond human control. Digital innovation solutions are increasingly deployed in transport, business and administrative domains, and therefore, if abused by a malicious...
-
Systemowe ujęcie wpływu destabilizatorów na poszukiwanie równowagi adaptacyjnej w procesie doskonalenia jakości w podmiotach leczniczych
PublicationW niniejszym opracowaniu zaprezentowano metodyczne aspekty poszukiwania równowagi adaptacyjnej w doskonaleniu jakości w podmiotach leczniczych. Tego typu sytuacja wynikać może miedzy innymi z pojawienia się szeregu destabilizatorów zakłócających realizację działań doskonalących. Istotne staje się także zidentyfikowanie szans i unikanie zagrożeń wynikających z tego typu destabilizacji, a w dalszej konsekwencji podjęcie działań adaptatywnych...
-
ICT and social development. Conceptual considerations.
PublicationThis chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...
-
Human Factors and Cognitive Engineering in Functional Safety Analysis
PublicationHuman factors and cognitive engineering are considered nowadays as important multidisciplinary domains that focus on improving the relations between humans, technology and systems to be supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are usually designed and implemented according to the functional safety requirements....
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
The Brain of the city
PublicationIn order to highlight the characteristics of the West End of Wrocław, we conducted a site analysis. Using the strengths of the site, we were able to create a unique concept of the district while minimizing the impacts of weaknesses by design. The purpose of redesigning the West End of Wrocław is to attract new people to the district through the transformation of an identity. Initially, we conducted a SWOT analysis to identify the...
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Developing Novel Solutions to Realise the European Energy - Information Sharing & Analysis Centre
PublicationFor more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...
-
IDENTYFIKACJA CZYNNIKÓW WPŁYWAJĄCYCH NA BEZPIECZEŃSTWO EKSPLOATACJI STATKU NA ŚRÓDLĄDOWEJ DRODZE WODNEJ W DELCIE WISŁY
PublicationKażdego roku w Polsce, na śródlądowych drogach wodnych rejestrowane są przez Urzędy Żeglugi Śródlądowej, Państwową Straż Pożarną i Policję wypadki i incydenty, prowadzące zarówno do uszkodzenia infrastruktury jak i uszczerbku na zdrowiu. Poprawa poziomu bezpieczeństwa wymaga dogłębnej analizy i wyciągania wniosków z zaistniałych sytuacji awaryjnych. Istotną rzeczą jest identyfikacja i usystematyzowanie zagrożeń występujących w...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublicationA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
The Innovative Faculty for Innovative Technologies
PublicationA leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublicationThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublicationIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Expert systems in assessing the construction process safety taking account of the risk of disturbances
PublicationThe objective of the paper is to present the issue of safety manage-ment during the construction process. Threats in the form of disturb-ances may occur in the preparatory phase, during the execution of the construction project and also during its operational use. The arti-cle presents the concept of applying the methodology based, among others, on Learning Bayesian Networks, Artificial Neural Networks and Support Vector Machine,...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Cognitive engineering and functional safety technology for reducing risks in hazardous plants
PublicationCognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...
-
Calibration of precipitation estimation algorithm with particular emphasis on the Pomeranian region using high performance computing
PublicationFast and accurate precipitation estimation is an important element of remote atmosphere monitoring, as it allows, for example, to correct short-term weather forecasts and the prediction of several types of meteorological threats. The paper presents methodology for calibrating precipitation estimation algorithm based on MSG SEVIRI sensor data, and Optimal Cloud Analysis product available via EumetCast transmission. Calibration is...
-
AGREEprep – Analytical greenness metric for sample preparation
PublicationThis work proposes for the first time, a metric tool that gives prominence to sample preparation. The developed metric (termed AGREEprep) was based on 10 categories of impact that were recalculated to 0 e1 scale sub-scores, and then used to calculate the final assessment score. The criteria of assessment evaluated, among others, the choice and use of solvents, materials and reagents, waste generation, energy consumption, sample...