Filters
total: 1281
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY CONTROLS AND MEASURES
-
Marek Przyborski dr hab. inż.
PeopleMarek Przyborski (b. March 20, 1964. Chełmża) - His fields of interest are remote sensing and close range photogrammetry. He conducts research on the use of so-called "high-speed cameras" to analyze the rapidly-changing phenomena. Co-author and author of publications dealing with the wide meaning of remote sensing applications related to the construction, transport, engineering, environment and homeland security. He is the author...
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Medium to High and high road sections
Open Research DataData contain road sections with the highest number of accidents and victims on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019. Measures used to assess the level of risk is: minimum 4 accidents or 4 seriously injured or fatalities per one kilometer (5 classes: low, low to medium, medium, medium to high, high):
-
THE INVESTMENT ENVIRONMENT MANAGEMENT SYSTEM IN THE FRAMEWORK OF LEGAL SUPPORT AS A FACTOR OF NATIONAL SAFETY
Publication -
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES
PublicationThis paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...
-
Modified dynamic time warping method applied to handwritten signature authenticity verification
PublicationA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method’s efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Valorization of waste cabbage leaves by postharvest photochemical treatments monitored with a non-destructive fluorescence-based sensor
PublicationThe biosynthesis of polyphenolic compounds in cabbage waste, outer green leaves of white head cabbage (Brassica oleracea L. var. capitata subvar. alba), was stimulated by postharvest irradiation with UVB lamps or sunlight. Both treatments boosted the content of kaempferol and quercetin glycosides, especially in the basal leaf zone, as determined by the HPLC analysis of leaf extracts and by a non-destructive optical sensor. The...
-
Wetlands in flux: looking for the drivers in a central European case
PublicationPlanet Earth is undergoing significant changes which are driven by natural and anthropogenic factors. However, it is difficult to identify the drivers and their effect on the environment and ecosystems because there are many interdependencies. In this study we present a multi-parameter approach to assess the effect of changes in human-induced and natural drivers on a wetland ecosystem. The study area is one of the most prominent...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublicationFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
The Evaluation of Use of Colors in Graphical User-Interfaces in Healthcare
PublicationIn this paper, color difference/contrast measures are investigated in reference to results of experiments with the participation of average, color-normal observers and with individuals with deuteranopia. Additionally, a new method for the automatic analysis of color contrast is proposed, which supports designers of graphical user- interfaces in healthcare. The method was verified using the GUI phantom of a vital signs monitor (the...
-
Quantitative Storytelling in the Making of a Composite Indicator
PublicationThe reasons for and against composite indicators are briefly reviewed, as well as the available theories for their construction. After noting the strong normative dimension of these measures—which ultimately aim to ‘tell a story’, e.g. to promote the social discovery of a particular phenomenon, we inquire whether a less partisan use of a composite indicator can be proposed by allowing more latitude in the framing of its construction....
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublicationZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Design and Application of Magnetic Photocatalysts for Water Treatment. The Effect of Particle Charge on Surface
PublicationCore-interlayer-shell Fe3O4/SiO2/TiO2, CoFe2O4/SiO2/TiO2 and BaFe12O19/SiO2/TiO2 magnetic photocatalysts were obtained. A water-in-oil microemulsion system with suitable surfactants was used for functionalization of the magnetic core with silica interlayer and TiO2-based photocatalyst. Uncoated and coated particles were characterized by electrophoretic meaurements, X-ray diffractometry (XRD), scanning electron microscopy (SEM),...
-
Modelowanie podziału zadań przewozowych w obszarach zurbanizowanych
PublicationNiniejsza rozprawa doktorska dotyczy problematyki modelowania podziału zadań przewozowych w procesie modelowania podróży. Wykonane analizy wykazały zasadność zastosowania dodatkowych czynników w modelowaniu wyboru środka transportu z uwagi na ich istotny wpływ na jakość modelu dla wybranych motywacji podróży. W pracy zawarto przykładowe modele uwzględniające każdy z analizowanych czynników. Z wykorzystaniem badań heurystycznych...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublicationW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
Aestheticization of Flowcharts
PublicationOne of the important issues of diagrams is their aesthetics. In this paper a method of its formalization for freehand drawn flowcharts is proposed. In order to formalize the evaluation of flowcharts' aesthetics a criterion consisting of several measures is proposed. Based on this criterion the algorithms for automatic optimization of flowcharts' appearance are proposed.
-
Planning of the green road system as an element of spatial management in suburbs and small towns
PublicationThe premise for the development of sustainable forms of road infrastructure in small towns is the appropriate plan at an early stage or modifi cation in the case of existing spaces. A multi-directional approach is extremely important, which takes into account the specifi city of the regional (country) road system, availability, and capacity of traffi c network, but also social and environmental factors. Effi cient management...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublicationW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublicationThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublicationThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
The reliability of tree and star networks
PublicationThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
Ekonometryczna analiza konsumpcji w Polsce w latach 1995-2018- statyczne modele wydatków konsumpcyjnych w wartościach nominalnych
PublicationW artykule przeprowadzono badania makroekonomicznych związków pomiędzy konsumpcją globalną (C) a produktem krajowym brutto (PKB). W części teoretycznej artykułu: • zdefiniowano postacie analityczne przyczynowo-skutkowych makromodeli konsumpcji, • sformułowano interpretację mierników opisujących badane zależności, • sformułowano założenia stochastyczne dla rozważanych makromodeli konsumpcji, W części empirycznej artykułu:...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
International Conference on Information Security and Assurance
Conferences -
International Conference on Security in Pervasive Computing
Conferences -
International Conference on Computational Intelligence and Security
Conferences -
International Workshop on Visualization for Cyber Security
Conferences -
Australian Information Security Management Conference
Conferences -
Information Hiding and Multimedia Security Workshop
Conferences -
International Conference on Information and Communications Security
Conferences -
International Conference on Information Theoretic Security
Conferences -
International Conference on Principles of Security and Trust
Conferences -
IFIP Information Security & Privacy Conference
Conferences -
Australasian Conference on Information Security and Privacy
Conferences -
International Workshop on Information Security Applications
Conferences -
International IEEE Security in Storage Workshop
Conferences -
International Conference on Information Security and Cryptology
Conferences -
Workshop on Security and Privacy in e-Commerce
Conferences -
Computational Intelligence in Security for Information Systems
Conferences -
International Conference on Security of Information and Networks
Conferences -
International Conference on Information Systems Security
Conferences -
Australian Information Warfare and Security Conference
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
International Conference on Information Security and Cryptography
Conferences -
International Symposium on Information Assurance and Security
Conferences -
Australasia Conference on Information Security and Privacy
Conferences