displaying 1000 best results Help
Search results for: NODE-TARGETED ATTACKS
-
Power equalization of AES FPGA implementation
PublicationThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
The use of HPLC-Q-TOF-MS for comprehensive screening of drugs and psychoactive substances in hair samples and several “legal highs” products
PublicationNon-targeted screening of drugs present in herbal products, known as “legal high” drugs and in hair as a biological matrix commonly used in toxicological investigations was accomplished with the use of high pressure liquid chromatography coupled with quadrupole time-of-flight mass spectrometry (HPLC-Q-TOF-MS). In total, 25 and 14 therapeutical drugs and psychoactive substances/metabolites were detected in investigated hair samples...
-
The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface
PublicationIn the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...
-
Performance of FAN conception of traffic control in IP QoS networks
PublicationIn this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...
-
Energy Consumption Modeling in SPMD and DAC Applications
PublicationIn this chapter, we show a study of energy consumption during execution of SPMD and DAC application – the same applications which time of execution we modeled in the previous two chapters. We measured an average power usage at a single node of the GALERA+ cluster during application execution and then we modeled the total energy consumption by the application. Next we simulated the applications using MERPSYS and we compared the...
-
More Just Measure of Fairness for Sharing Network Resources
PublicationA more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...
-
The Effect of Steaming Beech, Birch and Maple Woods on Qualitative Indicators of the Surface
PublicationThis work presents the effect of steaming beech, birch and maple woods on the resulting quality of the milled wood surface. The steaming process of the studied woods results in a targeted change in the color of the wood, which changes from the original light white-gray color to fine reddishbrown to dark brown color shades that are more or less saturated depending on the temperature of the saturated water steam. The color changes...
-
Intra-operative biopsy in chronic sinusitis detects pathogenic Escherichia coli that carry fimG/H, fyuA and agn43 genes coding biofilm formation
PublicationThe aim of this study was to investigate whether or not surgical biopsy of sinus tissue in chronic sinusitis, not responsive to treatment, would detect E. coli. We intended to evaluate E. coli virulence genes, therefore dispute the causal role of such an unusual microorganism in chronic sinusitis, as well as consider effective pathogen-targeted therapy. Patients with E. coli isolated by intra-operative puncture biopsy were included...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Polysaccharides-Based Hybrid Materials for Bio- and Non-Bio Sectors. Edytorial
PublicationThis special edition spotlights the recent research in the design, development, and emerging applications of polysaccharides-based hybrid materials for biotechnological and biomedical purposes. All the articles published in this issue underscore the significance of materials derived from cellulose, alginate, chitosan, starch, and carrageenan for various applications, including enzyme production, encapsulation, targeted drug delivery,...
-
E-textbook technologies for academics in medical education
PublicationPublic universities in Poland receive fairly limited financial support for creating e-textbooks and lack the appropriate ICT competences among teaching staff, especially in the case of non-technical universities. The authors propose a pedagogical and technological paradigm for e-textbooks in medical education using open source software with minimal IT skills required. Technologies used to develop e-textbooks are connected with:...
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublicationIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Finding small-width connected path decompositions in polynomial time
PublicationA connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...
-
Dynamical description of quantum computing: generic nonlocality of quantumnoise
PublicationWe develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
PublicationDisaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Visual Object Tracking System Employing Fixed and PTZ Cameras
PublicationThe paper presents a video monitoring system utilizing fixed and PTZ cameras for tracking of moving objects. First type of camera provides image for background modelling, being employed for foreground objects localization. Estimated objects locations are then utilised for steering of PTZ cameras when observing targeted objects with high close-ups. Objects are classified into several classes, then basic event detection is being...
-
Considerations of Computational Efficiency in Volunteer and Cluster Computing
PublicationIn the paper we focus on analysis of performance and power consumption statistics for two modern environments used for computing – volunteer and cluster based systems. The former integrate computational power donated by volunteers from their own locations, often towards social oriented or targeted initiatives, be it of medical, mathematical or space nature. The latter is meant for high performance computing and is typically installed...
-
VUV photofragmentation of the six-membered heterocyclic molecules containing oxygen
PublicationCancer is a significant public health concern worldwide, which results in millions of deaths each year. The standard cure routine for cancer is surgery, and nowadays, radiotherapy or a hadrontherapy. Depending on the type of cancer, patients may undergo additional treatment, including targeted therapy. A combination of radio- or hadron-therapy with proper drug treatment can inhibit the proliferation of cancer cells and thus can...
-
Closed-loop stimulation of temporal cortex rescues functional networks and improves memory
PublicationMemory failures are frustrating and often the result of ineffective encoding. One approach to improving memory outcomes is through direct modulation of brain activity with electrical stimulation. Previous efforts, however, have reported inconsistent effects when using open-loop stimulation and often target the hippocampus and medial temporal lobes. Here we use a closed-loop system to monitor and decode neural activity from direct...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Analysis of measurement uncertainty for contact-less method used to measure the position of catenary contact wire, performed with the use of Monte Carlo method
PublicationCurrently the majority of main railway lines in Europe are electrified, and electric trains have the biggest share in the entire amount of rail transport. Reliability of electrified railways is closely related to the issue of supplying traction vehicles with energy. The problems connected with diagnostics of energy consumption node, namely the contact line and the current collector, are therefore of fundamental importance for maintaining...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublicationIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks
PublicationIn the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...
-
TRUSS JOINT WITH POSITIVE ECCENTRICITY EXPERIMENTAL RESEARCH
PublicationDue to the technological reasons in modern lightweight steel trusses, fabricated from cold- formed sections, positive eccentricities appear in the truss nodes what induce additional forces in the truss chords. To account for the real load-carrying capacity of truss node area the steel structure research in scale 1:1 were conducted. The experiments consisted of two parts: preliminary and proper one, when conclusions from...
-
Analiza i ocena smarności olejów w ujęciu energetycznym i działania układu tribologicznego = Analysis and evaluation of oil lubricity from the viewpoint of energy apects and of the tribological system action
PublicationBased on measurement results, an interpretation is presented of the tribological system boundary layer action in the form of a four-ball tester friction node. The evaluation was performed of the boundary layer action understood as transfer of energy Ep resulting from loading the tribological system in a determined time t with work Lp, which may lead to breaking the boundary layer. That energy and time are the values unequivocally...
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublicationGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Zastosowanie modułu symulacji dynamicznej programu CAD w analizie układu napędowego elektronarzędzia
PublicationW referacie przedstawiono analizę mechanicznego układu przeniesienia napędu elektronarzędzia (wyrzynarki elektrycznej) przy zastosowaniu Modułu Symulacji Dynamicznej (MSD) programu Autodesk Inventor (AI). Opracowano modele 3D poszczególnych części elektronarzędzia i połączono je przy zachowaniu tzw. kinematyki odwrotnej. Przeprowadzono analizę wpływu poszczególnych węzłów kinetycznych na przebieg momentu na wale silnika elektrycznego....
-
EMI mitigation of GaN power inverter leg by local shielding techniques
PublicationThis paper presents local shielding techniques applied to a half-bridge inverter leg with the aim to reduce the common mode (CM) current noise at converter’s DC input. The research study is conducted for 650V Enhancement mode Gallium Nitride (GaN) power transistor switches. Main contributors of parasitic capacitances referred to the inverter-leg middle point node are identified. Then, shielding solutions are proposed to reduce...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Use of ICT infrastructure for teaching HPC
PublicationIn this paper we look at modern ICT infrastructure as well as curriculum used for conducting a contemporary course on high performance computing taught over several years at the Faculty of Electronics Telecommunications and Informatics, Gdansk University of Technology, Poland. We describe the infrastructure in the context of teaching parallel programming at the cluster level using MPI, node level using OpenMP and CUDA. We present...
-
Influence of lubricating oil improvers on performance of crankshaft seals
PublicationThis paper presents an original method for checking influence of lubricating oil improvers on performance of crankshaft seals of combustion piston engine. Crankshaft seals were tested with the use of a modified friction node of T-02 four- ball apparatus in laboratory conditions. The tests were conducted according to a worked-out algorithm. Their results confirmed usefulness of the method for determining „harmful” performance...
-
Hardware-Software Implementation of a Sensor Network for CityTraffic Monitoring Using the FPGA- and ASIC-Based Sensor Nodes
PublicationArtykuł opisuje prototypową sieć sensorową do monitorowania ruchu pojazdów w mieście. Węzły sieci sensorowej, wyposażone w kamerę o niskiej rozdzielczości, obserwują ulice i wykrywają poruszające się obiekty. Detekcja obiektów jest realizowana w oparciu o własny algorytm segmentacji obrazów, wykorzystujący podwójne odejmowanie tła, wykrywanie krawędzi i cieni, działający na dedykowanym systemie mikroelektronicznym typu ''System...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
How to meet when you forget: log-space rendezvous in arbitrary graphs
PublicationTwo identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result...
-
Bacteriophages as potential tools for use in antimicrobial therapy and vaccine development
PublicationThe constantly growing number of people suffering from bacterial, viral, or fungal infections, parasitic diseases, and cancers prompts the search for innovative methods of disease prevention and treatment, especially based on vaccines and targeted therapy. An additional problem is the global threat to humanity resulting from the increasing resistance of bacteria to commonly used antibiotics. Conventional vaccines based on bacteria...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...