Filters
total: 26262
-
Catalog
- Publications 3966 available results
- Journals 585 available results
- Conferences 261 available results
- Publishing Houses 2 available results
- People 507 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 1 available results
- e-Learning Courses 125 available results
- Events 3 available results
- Open Research Data 20788 available results
displaying 1000 best results Help
Search results for: INFORMATION%20SECURITY
-
BUILDING INFORMATION MODELING - ANALIZA ZAKRESU I STANU IMPLEMENTACJI W POLSKIEJ BRANŻY BUDOWLANEJ
PublicationProblematyka BIM (Building Information Modeling) jest obecnie tematem wielu publikacji naukowych, ale także przedmiotem działań podejmowanych przez uczestników szeroko pojętego procesu budowlanego. Liczne zalety i szanse płynące ze stosowania technologii BIM w kolejnych etapach cyklu życia obiektu budowlanego, należy rozpatrywać z punktu widzenia inwestora/zamawiającego, architekta, projektanta konstrukcji i instalacji, dewelopera,...
-
Implementation of spatial information for monitoring and analysis of the area around the port using laser scanning techniques
PublicationNowadays, maritime infrastructure is heavily exploited, which requires monitoring. The article presents the implementation of spatial information which are point clouds for monitoring and analysis of the area around the port (buildings and wharves). For this study, point clouds coming from terrestrial (TLS) and airborne laser scanning (ALS), each of them having different accuracy, were used. An important part of the analysis was...
-
House dust as a source of analytical information on concentration of polybrominated diphenyl ethers (PBDEs) - first approach
PublicationPolybrominated diphenyl ethers (PBDEs), which are best recognized as flame retardants, were in 2001, by virtue of Stockholm Convention, listed in a group of Persistent Organic Compounds (POPs). Increasing concentration levels of PBDEs, reported in human tissues (e.g., blood, serum, breast milk, etc.) haverecently caught worldwide concern due to their potential tendency to disrupt thyroid hormones, neurobehavioral deficits and endocrine...
-
Conception of Interactive Information and Decision Support System for Urban and Industrial Air Quality Management: Extension
Publication -
Piotr Rajchowski dr inż.
PeoplePiotr Rajchowski (Member, IEEE) was born in Poland, in 1989. He received the E.Eng., M.Sc., and Ph.D. degrees in radio communication from the Gdańsk University of Technology (Gdańsk Tech), Poland, in 2012, 2013, and 2017, respectively. Since 2013, he has been working at the Department of Radiocommunication Systems and Networks, Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, as a IT...
-
Informatica
Journals -
The experimental investigations and modelling of trak work with the use of tamping machine's diagnostic informations
PublicationW pracy przedstawiono realizowany w Katedrze Inżynierii Kolejowej Politechniki Gdańskiej program badawczy, którego idea zasadza się na wykorzystaniu podbijarki torowej w zakresie diagnostyki toru kolejowego. Skupiono się głównie na dwóch aspektach związanych z torem bezstykowym, tj. na siłach podłużnych występujących w tokach szynowych oraz na oporach poprzecznych rusztu torowego związanych głównie ze stopniem ustabilizowania podsypki...
-
Information Age Publishing
Publishing Houses -
Structural organization of video informative systems on light-emitting diodes
Publication -
The influence of plastic deformation on the magnetoelastic properties of the CSN12021 grade steel
PublicationWłasności magnetosprężyste materiałów są silnie modyfikowane przez zmiany struktury dyslokacyjnej, które są wynikiem procesów deformacji plastycznej. Zmiany te mogą być wykorzystane jako podstawa do opracowania metody nieniszczącej oceny stopnia deformacji materiału.Jak dotychczas zaproponowane zostały różne metody, oparte na pomiarach pętli histerezy magnetycznej czy też natężenia magnetycznego efektu Barkhausena. Artykuł porównuje...
-
Mitochondrial D-loop informative SNPs in identification of dog’s breed
Publication -
Deformation of the Structural Details of the Components Created by the Rapid Prototyping Method
PublicationThe paper present the results of preliminary research and describes the deformation of construction details within the process of producing small element employing a stereography system. The article discuses a scheme for changes in data conversion. Variation in construction details have been described on the basis of analysing photographs.
-
Structured deformation of granular material in the state of active earth pressure
PublicationThe paper focuses on the ability of granular materials to undergo structured deformation by analysing the data from the retaining wall model tests and discrete element simulations. The structured deformation means the movement of a granular material which produces a stable, regular pattern of multiple shear bands. The paper's primary purpose is to study this kind of deformation for the selected data representing the state of active...
-
Large deformation finite element analysis of undrained pile installation
PublicationIn this paper, a numerical undrained analysis of pile jacking into the subsoil using Abaqus software suit has been presented. Two different approaches, including traditional Finite Element Method (FEM) and Arbitrary Lagrangian–Eulerian (ALE) formulation, were tested. In the first method, the soil was modelled as a two-phase medium and effective stress analysis was performed. In the second one (ALE), a single-phase medium was assumed...
-
Effect of mesh deformation on the accuracy of 3D FEM electromagnetic analysis
PublicationIn this paper, the accuracy of 3D FEM electromagnetic simulations in parametric analysis using mesh deformation techniques is discussed. Mesh deformation techniques allow one to preserve the mesh topology while the geometry is changed. It is shown that the application of mesh deformation can provide accurate simulation results even for very large deformations. On the other hand, it is also shown that the technique has to be used...
-
The influence of the drying process on the deformation of the beech and oak wood samples
PublicationThe influence of the drying process conditions on the deformation of the beech and oak wood. The results of the deformation of beech wood (Fagus sylvatica L.) and oak wood (Quercus robur) after drying process are presented. The drying process was carried out in the same drying schedule for each wood species. During each of schedules 40 pieces of wood were dried. The samples were divided into two groups. The first group of tested...
-
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublicationUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Settlement of a historic building due to seepage-induced soil deformation
PublicationThe research paper reviews issues associated with the impact of groundwater flow on soil characteristics and parameters, hence, the entire structure of a building set on it. Water seepage through the ground, building subsoil or structural elements of buildings made of soil affects the soil skeleton and may lead to changes in the arrangement of individual grains relative to each other, i.e., a modified soil structure. Soil solid...
-
Determination of representative volume element in concrete under tensile deformation
PublicationW artykule podano sposoby określenia elementu reprezentatywnej objętości w betonie podczas rozciągania. Obliczenia wykonano przy zastosowaniu izotropowego modelu degradacji sztywności rozszerzonego o długość charakterystyczną mikrostruktury w ramach teorii nielokalnej. Zaproponowano 2 różne metody wyznaczania elementu reprezentatywnej objętości niezależnego od warunków brzegowych.
-
The Poland-United States Security Relations in the light of Asymmetry Theory
Publication -
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
Publication -
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
Adaptation of various persons' identification techniques as a solution for security and safety
PublicationPrzedstawiono różne metody identyfikacji osób w oparciu o ich cechy biometryczne w zastosowaniu do bezpieczeństwa i zabezpieczeń. Takimi biometrycznymi cechami mogą być właściwości fizjologiczne jak odciski palców, kształt dłoni, właściwości tęczówki jak również cechy behawioralne jak sposób pisania lub wypowiadania się.
-
The practical implementation of security models and strategies in an academic network infrastuctures
PublicationArtykuł prezentuje modele i strategie bezpieczeństwa dotyczące infrastruktury sieciowej. Rozważone zostały typowe zagrożenia oraz mechanizmy bezpieczeństwa sieci komputerowej. Wymienione zostały także różnice w polityce bezpieczeństwa pomiędzy komputerową siecią komercyjną a akademicką. Opisano proces analizy ryzyka dla akademickiej sieci komputerowej oraz wskazany został sposób oszacowania wymaganego poziomu bezpieczeństwa sieci.
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
A model-based approach to analysis of security protocols - a case study
PublicationArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
Security of energy supply under the demonopolization of energy production in Poland,
PublicationOmówiono wzrost zapotrzebowania na energie elektryczną, udział nośników energii pierwotnej w pokryciu zapotrzebowania na paliwa. Omówiono pokrótce akty prawne związane z ochrona środowiska i energetyka. Scharakteryzowano proces starzenia się elektrowni w Polsce i rolę dużych elektrowni systemowych. Na tym tle przedstawiono rozproszone źródła energii elektrycznej i ich wpływ na bezpieczeństwo dostaw energii w sytuacjach ekstremalnych,...
-
LRIT - a novel system of vessels monitoring for maritime security and safety
PublicationW artykule przedstawiono propozycję architektury przyszłego, globalnego systemu monitorowania statków LRIT (Long Range ship's Identification and Tracking) podlegających konwencji SOLAS. Przedstawiono i scharakteryzowano poszczególne komponenty systemu ze szczególnym uwzględnieniem aspektów radiokomunikacyjnych.
-
Flood Security Strategy - Case Studies from Gdańsk Region
Publication.
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublicationCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
Implementation and testing of Level 2 security architecture for the IIP System
PublicationSystem IIP definiuje kilka równoległych Internetów (PI), w tym jeden oparty na IPv6, dwa na rozwiązaniach post-IP oraz sieć zarządzania, pracujących na wspólnej infastrukturze komunikacyjnej. System ma architekturę 4-poziomową, w której poziom 2 odpowiada za tworzenie zasobów wirtualnych PI. W artykule omawiana jest trójwarstwowa architektura bezpieczeństwa proponowana dla przeciwdziałania zagrożeniom wprowadzania obcego ruchu...
-
Innovative method for utilization of wastewater for security and safety in rural areas
PublicationIn the rural areas building of sewerage systems and central wastewater treatment plants (WWTPs) often brings too high costs, due to high distances from one farm to another and terrain configuration. Individual treatment systems for each farm are a good solution. The teratment wetlands for nine individual farms were constructed in Kaszubian Lake District in summer and autumn 2009. Three configurations of reed beds were chosen. In...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Selfishness Detection in Mobile Ad Hoc Networks: How Dissemination of Indirect Information Turns into Strategic Issue
PublicationDla środowiska sieci mobilnej ad hoc przedyskutowano wymienność pomiędzy wydatkiem energetycznym węzła egoistycznego a obniżaniem jego metryki reputacyjnej. Badania symulacyjne wskazują, że atakom polegającym na selektywnym usuwaniu pakietów można przeciwdziałać poprzez datacentryczny system reputacyjny bazujący na potwierdzeniach końcowych, który nakazuje jednakowo uaktualniać metryki reputacyjne dla wszystkich węzłów na źle zachowującej...
-
Designing of an effective structure of system for the maintenance of a technical object with the using information from an artificial neural network
Publication -
Graph Neural Networks and Structural Information on Ionic Liquids: A Cheminformatics Study on Molecular Physicochemical Property Prediction
PublicationIonic liquids (ILs) provide a promising solution in many industrial applications, such as solvents, absorbents, electrolytes, catalysts, lubricants, and many others. However, due to the enormous variety of their structures, uncovering or designing those with optimal attributes requires expensive and exhaustive simulations and experiments. For these reasons, searching for an efficient theoretical tool for finding the relationship...
-
Analytical studies on the environmental state of the Svalbard archipelago - critical source of information about anthropogenic global impact
PublicationThe Svalbard archipelago differs from other polar regions due to its specific environmental conditions and geographic location which make the area gather pollution from long-range transport. Due to the recent development in analytical techniques it is possible to determine the concentration of pollutants at the level present there. This paper collates and discusses the information from the literature about: pollutants present in...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Experiments on Preserving Pieces of Information in a Given Order in Holographic Reduced Representations and the Continuous Geometric Algebra Model
PublicationGeometric Analogues of Holographic Reduced Representations (GAc, which is the continuous version of the previously developed discrete GA model) employ role-filler binding based on geometric products.Atomic objects are real-valued vectors in n-dimensional Euclidean space and complex statements belong to a hierarchy of multivectors. The property of GAc and HRR studied here is the ability to store pieces of information in a given...
-
Schemes of transmission of classical information via quantum channels with many senders: Discrete- and continuous-variable cases
PublicationSuperadditivity effects in the classical capacity of discrete multiaccess channels and continuous variable (CV) Gaussian MACs are analyzed. Several examples of the manifestation of superadditivity in the discrete case are provided, including, in particular, a channel which is fully symmetric with respect to all senders. Furthermore, we consider a class of channels for which input entanglement across more than two copies of the...
-
Formation of novel nanostructures using carbon nanotubes as a frame
Publication -
Aggregate formation of imidazolium ionic liquids in aqueous solution
PublicationCiecze jonowe (ILs) stanowią nową klasę związków o szerokich możliwościach przemysłowego zastosowania. Z przeglądu dostępnej literatury wynika, że niektóre ciecze jonowe tworzą agregaty w roztworach wodnych. Zrozumienie oddziaływań międzycząsteczkowych cieczy jonowych w środowisku wodnym jest niezbędne dla prawidłowego projektowania, przewidywania i kontroli ich właściwości jako współ-rozpuszczalników, a w konsekwencji procesów...