Filters
total: 2446
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 583 available results
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
European Symposium On Research In Computer Security
Conferences -
International Conference on Availability, Reliability and Security
Conferences -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
SUBJECTIVE PERCEPTION OF MUSIC GENRES IN THE FIELD OF MUSIC INFORMATION RETRIEVAL SYSTEMS
PublicationThe aim of this paper is to evaluate the relationship between perception of music genres and subjective features of music that can be assigned to them. For this purpose a group of subjective features such as loudness, melody, rhythm, volume, instrumentation was chosen to describe music genres. A group of 30 listeners with normal hearing, ranging from 20 to 40, was created. Each sub-ject participating in listening tests was asked...
-
SUBJECTIVE PERCEPTION OF MUSIC GENRES IN THE FIELD OF MUSIC INFORMATION RETRIEVAL SYSTEMS
PublicationThe aim of this paper is to evaluate the relationship between perception of music genres and subjective features of music that can be assigned to them. For this purpose a group of subjective features such as loudness, melody, rhythm, volume, instrumentation was chosen to describe music genres. A group of 30 listeners with normal hearing, ranging from 20 to 40, was created. Each sub-ject participating in listening tests was asked...
-
Asia Conference on Information, Computer and Communications Security (ACM Symposium on Information, Computer and Communications Security)
Conferences -
Application of ANN and PCA to two-phase flow evaluation using radioisotopes
PublicationIn the two-phase flow measurements a method involving the absorption of gamma radiation can be applied among others. Analysis of the signals from the scintillation probes can be used to determine the number of flow parameters and to recognize flow structure. Three types of flow regimes as plug, bubble, and transitional plug – bubble flows were considered in this work. The article shows how features of the signals in the time and...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Review of the Complexity of Managing Big Data of the Internet of Things
PublicationTere is a growing awareness that the complexity of managing Big Data is one of the main challenges in the developing feld of the Internet of Tings (IoT). Complexity arises from several aspects of the Big Data life cycle, such as gathering data, storing them onto cloud servers, cleaning and integrating the data, a process involving the last advances in ontologies, such as Extensible Markup Language (XML) and Resource Description...
-
Online Sound Restoration for Digital Library Applications
PublicationA system for sound restoration was conceived and engineered having the following features: no special sound restoration software is needed to perform audio restoration by the user, the process of restoration employs automatic reduction of noise, wow and impulse distortions performed in the online mode, no skills in digital signal processing from the user are needed. The principles of the created system and its features as well...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
A Paradigm for HV, MV, LV Distribution Grid Development Planning
PublicationIn the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...
-
Surface texture of pine wood beams after planing in industrial conditions
PublicationMeasuring the surface features of wooden components after planing is connected with the rising demands regarding to the quality of the painted window frames. In the paper the complex surface texture analysis especially identifying of surface damages using non-contact 3D measurement techniques for precise area measurement were presented.This enabled the study of irregular surface features with sufficient fidelity and resolution....
-
Composition Patterns of Contemporary Polish Residential Building Facades
PublicationThis study aims to define the types of composition patterns of contemporary Polish multi-family building facades. The authors define the compositional patterns to determine their frequency. Analyses carried out on the basis of photos and visualizations of 113 examples of architecture from Poland identified groups of common features of facades. Statistical analyses of these features resulted in six types of compositions. Clear differences...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Improving the quality of speech in the conditions of noise and interference
PublicationThe aim of the work is to present a method of intelligent modification of the speech signal with speech features expressed in noise, based on the Lombard effect. The recordings utilized sets of words and sentences as well as disturbing signals, i.e., pink noise and the so-called babble speech. Noise signal, calibrated to various levels at the speaker's ears, was played over two loudspeakers located 2 m away from the speaker. In...
-
Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską
PublicationArtykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...
-
Pipeline geometry defects in high resolution pig's data
PublicationMost of the pipelines have been inspected at least once using intelligent pigging. The problem of specific software for interactive presentation, analysis and comparison of features revealed during the consecutive geometry surveys is emphasized. Capabilities of a simultaneous measurement of internal geometry and metal loss features in a single run are illustrated. Advantages of application of statistical characteristics of both...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublicationThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Current risk analysis and management issues in technical systems.
PublicationDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Smart Services supporting Drivers in Effective Cars Parking
PublicationThe paper shows how to design and implement intelligent, service oriented systems for management of free places in distributed car parks. The idea of SOA technology is widely used. It is assumed that a state of every car park is automatically determined by a special electronic infrastructure including IoT solutions. The information received from such an infrastructure is sent to the main management system, which processes it and,...
-
Open smart glasses development platform for AAL applications
PublicationThis paper describes an open platform for multi sensory electronic glasses that supports new and enhanced methods for intelligent interaction with patients, with smart objects, or to be used as new data input modalities like proximity sensor or smart textile interfaces. All the activities have been developed, investigated and evaluated within EU CHIST-ERA eGlasses project...
-
Data Mining Applications and Methods in Medicine
PublicationIn this paper we describe the research area of data mining and its applications in medicine. The origins of data mining and its crucial features are shortly presented. We discuss the specificity of medicine as an application area for computer systems. Characteristic features of the medical data are investigated. Common problems in the area are also presented as well as the strengths and capabilities of the data mining methods....
-
Methodology of Constructing and Analyzing the Hierarchical Contextually-Oriented Corpora
PublicationMethodology of Constructing and Analyzing the Hierarchical structure of the Contextually-Oriented Corpora was developed. The methodology contains the following steps: Contextual Component of the Corpora’s Structure Building; Text Analysis of the Contextually-Oriented Hierarchical Corpus. Main contribution of this study is the following: hierarchical structure of the Corpus provides advanced possibilities for identification of the...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Satellite Image Classification Using a Hierarchical Ensemble Learning and Correlation Coefficient-Based Gravitational Search Algorithm
PublicationSatellite image classification is widely used in various real-time applications, such as the military, geospatial surveys, surveillance and environmental monitoring. Therefore, the effective classification of satellite images is required to improve classification accuracy. In this paper, the combination of Hierarchical Framework and Ensemble Learning (HFEL) and optimal feature selection is proposed for the precise identification...
-
A mobile hospital – its advantages and functional limitations
PublicationThe idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublicationTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublicationIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model
PublicationThe objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...
-
International Workshop on Critical Information Infrastructures Security
Conferences