Filters
total: 2706
-
Catalog
- Publications 1602 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 33 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 836 available results
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublicationThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Robotic manipulators, Lab, MiBM, st. I, sem.6 (PG_00053663) 03.2022 Fri
e-Learning CoursesThe course Manipulators and Industrial Robots (laboratory) is for students of the 6th semester of a full-time bachelor's degree studies of Mechatronics. The course includes laboratory classes in the field of industrial manipulators - their construction, features, components, control, and modular robots - their programming and models.
-
Robotic manipulators, Lab, MiBM, st. I, sem.6 (PG_00053663) 03.2023
e-Learning CoursesThe course Manipulators and Industrial Robots (laboratory) is for students of the 6th semester of a full-time bachelor's degree studies of Mechatronics. The course includes laboratory classes in the field of industrial manipulators - their construction, features, components, control, and modular robots - their programming and models.
-
Robotic manipulators, Lab, MiBM, st. I, sem.6 (PG_00053663) 03.2024 kopia 1
e-Learning CoursesThe course Manipulators and Industrial Robots (laboratory) is for students of the 6th semester of a full-time bachelor's degree studies of Mechatronics. The course includes laboratory classes in the field of industrial manipulators - their construction, features, components, control, and modular robots - their programming and models.
-
Robotic manipulators, Lab, MiBM, st. I, sem.6 (PG_00053663) 03.2024
e-Learning CoursesThe course Manipulators and Industrial Robots (laboratory) is for students of the 6th semester of a full-time bachelor's degree studies of Mechatronics. The course includes laboratory classes in the field of industrial manipulators - their construction, features, components, control, and modular robots - their programming and models.
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublicationW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublicationNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Robotics, Lab, MiBM, st. II, sem.1 (PG_00057380) 03.2022 Thu
e-Learning CoursesThe course Robotics (laboratory) is for students of the 1st semester of a full-time Master degree studies of Machine Design. The course includes laboratory classes in the field of industrial manipulators - their construction, features, components, control, and modular robots - their programming and models.
-
Marek Przyborski dr hab. inż.
PeopleMarek Przyborski (b. March 20, 1964. Chełmża) - His fields of interest are remote sensing and close range photogrammetry. He conducts research on the use of so-called "high-speed cameras" to analyze the rapidly-changing phenomena. Co-author and author of publications dealing with the wide meaning of remote sensing applications related to the construction, transport, engineering, environment and homeland security. He is the author...
-
THE INVESTMENT ENVIRONMENT MANAGEMENT SYSTEM IN THE FRAMEWORK OF LEGAL SUPPORT AS A FACTOR OF NATIONAL SAFETY
Publication -
COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES
PublicationThis paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...
-
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublicationFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublicationZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
A Generalized SDP Multi-Objective Optimization Method for EM-Based Microwave Device Design
PublicationIn this article, a generalized sequential domain patching (GSDP) method for efficient multi-objective optimization based on electromagnetics (EM) simulation is proposed. The GSDP method allowing fast searching for Pareto fronts for two and three objectives is elaborated in detail in this paper. The GSDP method is compared with the NSGA-II method using multi-objective problems in the DTLZ series, and the results show the GSDP method...
-
Świat i jego ekosystem mobilny – dane statystyczne i perspektywy rozwoju
PublicationGłówną uwagę położono na szeroką prezentację technologii informacyjno-komunikacyjne, które, jak się powszechnie oczekuje, będą, podobnie jak w ostatnich dwóch dziesięcioleciach, istotnym elementem rozwoju i katalizatorem zmian zachodzących we wszystkich obszarach bazujących na wymianie, przetwarzaniu, przechowywaniu i udostępnianiu informacji cyfrowych, wpływając na rozwój i kreowanie różnorodnych ekosystemów cyfrowych. zaprezentowano...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublicationW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublicationDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublicationW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublicationThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublicationThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
International Conference on Information Security and Assurance
Conferences -
International Conference on Security in Pervasive Computing
Conferences -
International Conference on Computational Intelligence and Security
Conferences -
International Workshop on Visualization for Cyber Security
Conferences -
Australian Information Security Management Conference
Conferences -
Information Hiding and Multimedia Security Workshop
Conferences -
International Conference on Information and Communications Security
Conferences -
International Conference on Information Theoretic Security
Conferences -
International Conference on Principles of Security and Trust
Conferences -
IFIP Information Security & Privacy Conference
Conferences -
Australasian Conference on Information Security and Privacy
Conferences -
International Workshop on Information Security Applications
Conferences -
International IEEE Security in Storage Workshop
Conferences -
International Conference on Information Security and Cryptology
Conferences -
Workshop on Security and Privacy in e-Commerce
Conferences -
Computational Intelligence in Security for Information Systems
Conferences -
International Conference on Security of Information and Networks
Conferences -
International Conference on Information Systems Security
Conferences -
Australian Information Warfare and Security Conference
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
International Conference on Information Security and Cryptography
Conferences -
International Symposium on Information Assurance and Security
Conferences -
Australasia Conference on Information Security and Privacy
Conferences -
International Conference on Cryptology and Network Security
Conferences -
Symposium on Requirements Engineering for Information Security
Conferences -
SKLOIS Conference on Information Security and Cryptology
Conferences