Filters
total: 1281
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY CONTROLS AND MEASURES
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Run off road accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, type of accidents: Run off road. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2019 - Poviat areas
Open Research DataData contain the number of accidents, victims, accident costs divided on poviat areas (16 areas) on regional roads (voivodeship roads) in pomorskie voivodeship in 2019. Measures used to assess the level of social risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Elderly people accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: elderly people (65+) - drivers, passengers and . vulnerable road user. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Cyclist accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: Cyclists. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Night accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, time of accidents: Night. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Excessive speed accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, cause of accidents: Excessive speed accidents. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Child accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: children - drivers, passengers and . vulnerable road user.. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Accidents, victims and risk levels on regional roads in pomorskie voivodeship, 2017-2019 - Alcohol and drug accidents
Open Research DataData contain risk classification on regional roads (voivodeship roads) in pomorskie voivodeship in 2017-2019, risk group: Offenders under influence of alcohol or drug - driver or pedestrian. Measures used to assess the level of risk are (5 classes low, low to medium, medium, medium to high, high):
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
What is important for you makes you think about the pandemic differently: moral foundations, pandemic-related fears and convictions (Lo que cada uno consideramos importante nos hace reflexionar sobre la pandemia de forma distinta: fundamentos morales, temores y convicciones sobre la pandemia)
PublicationBuilding on the Moral Foundations Theory and findings regarding the linkage of values, convictions and beliefs, the aim of the study was to compare people displaying various constellations of moral foundations regarding their tolerance of ambiguity, fear of COVID-19 (FCV), endorsement of COVID-19 conspiracy theories and the extent to which they believed in the effectiveness of five COVID-19 preventive measures. This study was...
-
Behaviometrics of Digital Games for Children with Autism Spectrum Disorder
PublicationTe paper reports current stage of the project Automated Terapy Monitoring for Children with Developmental Disorders of Autism Spectrum (AUTMON), that aims at development of methods and tools to allow for the automatic evaluation of the therapy progress among children with autism. Finding objective measures suitable for evaluating therapy progress would let create a system supporting those who diagnose autism and the therapists...
-
Concentration in ICTs sector - cross country analysis
PublicationIn the chapter below, the author present inequalities in sector of new information and communication technologies. Having in mind inequalities we can also discuss concentration issues, and the concentration itself is a problem to which the author refers on first place. The paper is organized as following: first basic measures of concentration are defined, after we can read a discussion referring to concentration in ICTs sector...
-
Mathematical models of process quality on the example of the bakery industry
PublicationThis article presents a new approach to quantitative dimensionless assessment of the efficiency and competitiveness of production processes. New concepts of process quality and relative product quality have been introduced. Process quality was expressed in vector and scalar. The process quality vector ono was expressed by the product of reliability by the vector from the sum of three components taking into account the composition...
-
Mitochondrial DNA copy number and trimethylamine levels in the blood: New insights on cardiovascular disease biomarkers
PublicationAmong cardiovascular disease (CVD) biomarkers, the mitochondrial DNA copy number (mtDNAcn) is a promising candidate. A growing attention has been also dedicated to trimethylamine-N-oxide (TMAO), an oxidative derivative of the gut metabolite trimethylamine (TMA). With the aim to identify biomarkers predictive of CVD, we investigated TMA, TMAO, and mtDNAcn in a population of 389 coronary artery disease...
-
Supervisory Control System for Adaptive Phase and Work Cycle Management of Sequencing Wastewater Treatment Plant
PublicationThe paper presents the design of the integrated control system applied to Sequencing Batch Reactor (SBR) in a biological Wastewater Treatment Plant (WWTP) in Swarzewo, which operates under activated sludge technology. Based on the real data records, ASM2d biological processes model and aeration system model, hierarchical control system for dissolved oxygen tracking and cycle management is designed. Internal Model Controller (IMC)...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublicationThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Current risk analysis and management issues in technical systems.
PublicationDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Diagnostic Analysis of Exhaust Gas with A Quick-Changing Temperature from a Marine Diesel Engine Part II / Two Factor Analysis
PublicationThe article presents a continuation of research carried out to determine the effect of input parameters (changes in engine structure parameters) on selected output parameters (diagnostic measures), based on quickly changing exhaust gas temperature. A method of determining the simultaneous influence of two input factors (the structure parameter and the engine load) on one output factor was presented, as well as an evaluation...
-
The effect of road restraint systems on the level of road safety - Polish experience
PublicationRoadside accidents happen when a vehicle runs off the road. The majority of these accidents are very severe because leaving the road is usually followed by hitting a solid obstacle (tree, pole, support, culvert front wall, barrier). Roadsides are some of the most important issues of road safety. They have been studied for years to identify roadside hazards and the effectiveness of road safety measures such as restraint systems....
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
A mobile hospital – its advantages and functional limitations
PublicationThe idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublicationTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublicationIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
International Workshop on Critical Information Infrastructures Security
Conferences -
Symposium on Stabilization, Safety, and Security of Distributed Systems
Conferences -
IEEE International Conference on Intelligence and Security Informatics
Conferences -
IEEE Symposium on Computational Intelligence in Cyber Security
Conferences -
International Conference on Information Systems Security and Privacy
Conferences -
Usenix Network and Distributed System Security Symposium
Conferences -
International Conference on Security and Privacy for Communication Networks
Conferences -
IEEE Computer Security Foundations Symposium (was CSFW)
Conferences -
Conference on Security in Network Architectures and Information Systems
Conferences -
International Conference on Risks and Security of Internet and Systems
Conferences -
International Conference on Computer Safety, Reliability and Security
Conferences -
International Conference on Applied Cryptography and Network Security
Conferences -
Formation of acoustic field in rooms
PublicationPaper describes known form literature method of sound diffusity index assesment, which utilizes impulse response of the room. Process of froming diffused sound field using this method was investigated.Increase of sound diffusity index in time was noted in rooms differing in shape,volume and reverberation time. Exponential growth of sound diffusion index was noted which correlates with other acoustical rooms measures.
-
Modeling of Composite Shells in 6-Parameter Nonlinear Theory with Drilling Degree of Freedom
PublicationWithin the framework of a 6-parameter nonlinear shell theory, with strain measures of Cosserat type, constitutive relations are proposed for thin elastic composite shells. The material law is expressed in terms of five engineering constants of classical anisotropic continuum plus an additional parameter accounting for drilling stiffness. The theory allows for unlimited displacements and rotations. A number of examples are presented...
-
Towards increasing F-measure of approximate string matching in O(1) complexity
PublicationThe paper analyzes existing approaches for approximate string matching based on linear search with Levenshtein distance, AllScan and CPMerge algorithms using cosine, Jaccard and Dice distance measures. The methods are presented and compared to our approach that improves indexing time using Locally Sensitive Hashing. Advantages and drawbacks of the methods are identified based on theoretical considerations as well as empirical evaluations...