Search results for: SECURITY - Bridge of Knowledge

Search

Search results for: SECURITY

Search results for: SECURITY

  • Analysis of human behavioral patterns

    Publication

    - Year 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Full text to download in external service

  • Agnieszka Ubowska dr hab. inż.

    Agnieszka Ubowska, PhD Dsc Eng was born in 1978 in Piła, where she graduated from the Secondary School of Environmental Protection. In the years 1998-2003 she studied at the Faculty of Technology and Chemical Engineering of the Szczecin University of Technology, majoring in environmental protection. She obtained her doctorate in technical sciences in 2008, defending her thesis entitled "Hybrid hydrophilic acrylamide (co)polymers"....

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Multi-Stage Video Analysis Framework

    The chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....

    Full text to download in external service

  • The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications

    Publication

    - Logistyka - Year 2010

    The study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...

  • Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym

    Publication

    A method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...

  • A Novel Multicast Architecture of Programmable Networks

    Publication

    - Year 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Full text to download in external service

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Publication

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Full text available to download

  • PROJEKT ZESPOŁOWY [DK][2023/24]

    e-Learning Courses
    • D. Karkosiński

    CCCLECTURE and Classes: Power supply systems for industrial facilities. Devices and main circuits of MV power stations. Short-circuit calculation. Power protection automation. Security classification according to American ANSI standards used in the EU. Microprocessor protection relays. Drive systems for medium power and medium voltage pumps. Roving inverters. PROJECT: Design of a MV switching station for a medium-power pumping...

  • PROJEKT ZESPOŁOWY [ET][DK][2024/25]

    e-Learning Courses
    • D. Karkosiński

    CCCLECTURE and Classes: Power supply systems for industrial facilities. Devices and main circuits of MV power stations. Short-circuit calculation. Power protection automation. Security classification according to American ANSI standards used in the EU. Microprocessor protection relays. Drive systems for medium power and medium voltage pumps. Roving inverters. PROJECT: Design of a MV switching station for a medium-power pumping...

  • Phan Van Hung Dr

    People

    Phan Van Hung graduated as an Engineer in Marine Navigation and Master Eng. Of Science in Navigation in 2010, 2013 from Vietnam Maritime University, respectively. He received a Doctor’s Degree, specializing in Maritime Safety System Engineering, at the Department of Maritime Transportation System, Mokpo National Maritime University, South Korea on August 24th, 2018. Since 2010, he has been with Vietnam Maritime University. His...

  • Automatic Analysis of Trajectories of Moving Objects

    Publication

    Ongoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...

    Full text available to download

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis

    Publication

    - Year 2013

    A novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...

    Full text to download in external service

  • Public spaces connecting cities. Green and Blue Infrastructures potential.

    Publication

    A city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....

    Full text to download in external service

  • Framework for RIDM within functional safety management process

    The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Full text available to download

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Edible black ant Smith (Carebara vidua) as human food – A systematic review

    Publication
    • S. A. Siddiqui
    • L. Ho
    • S. Adimulam
    • A. Nagdalian
    • B. Yudhistira
    • R. Castro Munoz
    • S. Ibrahim

    - Journal of Insects as Food and Feed - Year 2024

    Meeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...

    Full text available to download

  • Expert assessment of arguments: a method and its experimental evaluation

    Publication

    - Year 2008

    Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...

    Full text to download in external service

  • A framework for automatic detection of abandoned luggage in airport terminal

    Publication

    A framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...

  • Data Domain Adaptation in Federated Learning in the Breast Mammography Image Classification Problem

    We are increasingly striving to introduce modern artificial intelligence techniques in medicine and elevate medical care, catering to both patients and specialists. An essential aspect that warrants concurrent development is the protection of personal data, especially with technology's advancement, along with addressing data disparities to ensure model efficacy. This study assesses various domain adaptation techniques and federated...

    Full text to download in external service

  • Nuclear power plant as a source of electrical energy and heat

    In this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...

  • Eye-Gaze Tracking-Based Telepresence System for Videoconferencing

    An approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...

    Full text to download in external service

  • Bezpieczeństwo w IP Multimedia Subsystem

    Abstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...

  • Political Parties in the Digital World

    Publication

    - Year 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components

    Publication

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Full text available to download

  • In Situ Verification of Numerical Model of Water Hammer in Slurries

    Publication

    This paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...

    Full text available to download

  • KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR

    Przedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...

    Full text to download in external service

  • Support for argument structures review and assessment

    Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...

    Full text available to download

  • Using EO satellite data in Safe City and Coastal Zone web-GIS

    The paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...

    Full text to download in external service

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publication

    - Year 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes

    Publication

    - Year 2020

    E-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...

    Full text available to download

  • Health monitoring services based on off-the-shelf mobile devices

    Publication

    - Year 2013

    Development of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...

  • A model-based approach to analysis of authentication protocols.

    Publication

    - Year 2004

    W referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...

  • Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk

    Publication

    - Year 2016

    Ensuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...

    Full text to download in external service

  • Deep Learning: A Case Study for Image Recognition Using Transfer Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Deep Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • I, Robot: between angel and evil

    Publication

    - Year 2020

    The boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...

    Full text to download in external service

  • A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji

    The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...

  • Electricity demand prediction by multi-agent system with history-based weighting

    Publication

    - Year 2016

    Energy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...

    Full text to download in external service

  • The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art

    Commemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...

    Full text to download in external service

  • Reconfigurable Antennas for Trustable Things

    Publication

    In modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...

    Full text to download in external service

  • Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure

    Safety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...

    Full text to download in external service

  • Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard

    Security of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...

    Full text available to download

  • Coastal zone monitoring using Sentinel-1 SAR polarymetry data

    Publication

    In recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...

    Full text available to download

  • ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS

    Publication

    The paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...

    Full text available to download

  • Techniczne aspekty implementacji nowoczesnej platformy e-learningowej

    Zaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.

    Full text available to download

  • Bartosz Sawik

    People

    Dr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....