Filters
total: 706
-
Catalog
Search results for: SECURITY
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Bartosz Woliński dr inż.
PeopleCourses Informatization strategies (winter sem. 20/21, winter sem. 22/23) IT teams technologies (winter sem. 20/21) Decision analysis (winter sem. 20/21, winter sem. 21/22, summer sem. 22/23) Controlling in IT (summer sem. 20/21, 21/22, 22/23) Projects in enterprises (summer sem. 20/21, 22/23) Integrated enterprise information systems (winter sem. 20/21) Managing enterprise IT infrastructure and security (summer sem. 2021/22) Decision...
-
Karol Zdzisław Zalewski mgr inż.
People -
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers
PublicationThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...
-
A Paradigm for HV, MV, LV Distribution Grid Development Planning
PublicationIn the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...
-
Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską
PublicationArtykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Current risk analysis and management issues in technical systems.
PublicationDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublicationThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublicationIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
Andrzej Chybicki dr inż.
PeopleA graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Multichannel Human Body Communication
PublicationHuman Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...
-
Improvement of subsoil and railway substructure by explosive means.
PublicationQuick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublicationThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
RUSSIANS ON THE POLISH LABOUR MARKET
PublicationThe article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...
-
Józef Woźniak prof. dr hab. inż.
PeopleProfessor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublicationBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublicationThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe
PublicationThe CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....
-
BODYGUARD PROFESSION A GUIDE TO THE ART OF PERSONAL PROTECTION
PublicationThe book "Bodyguard Profession: A Guide to the Art of Personal Protection" is a comprehensive guide that introduces readers to the intricacies of professional personal protection. The author thoroughly discusses both the physical and psychological aspects of a bodyguard's work, covering elements such as stress management, self-defense techniques, and the use of modern technology in VIP protection. The guide presents...
-
Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych
PublicationAutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublicationW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
Methods of deep modification of low-bearing soil for the foundation of new and spare air runways
PublicationAfter analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich
PublicationZłożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...
-
CoRBAC – kontekstowo zorientowany model bezpieczeństwa
PublicationZaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.
-
Agnieszka Ubowska dr hab. inż.
PeopleAgnieszka Ubowska, PhD Dsc Eng was born in 1978 in Piła, where she graduated from the Secondary School of Environmental Protection. In the years 1998-2003 she studied at the Faculty of Technology and Chemical Engineering of the Szczecin University of Technology, majoring in environmental protection. She obtained her doctorate in technical sciences in 2008, defending her thesis entitled "Hybrid hydrophilic acrylamide (co)polymers"....
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublicationThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Modeling the impact of surface currents in a harbor using graph theory
PublicationEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Challenges in providing support for management of evidence-based arguments
PublicationThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...