Filters
total: 1280
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY CONTROLS AND MEASURES
-
Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych
PublicationAutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublicationW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
No-local-broadcasting theorem for multipartite quantum correlations
PublicationWe prove that the correlations present in a multipartite quantum state have an operational quantum character even if the state is unentangled, as long as it does not simply encode a multipartite classical probability distribution. Said quantumness is revealed by the new task of local broadcasting, i.e., of locally sharing preestablished correlations, which is feasible if and only if correlations are stricly classical. Our operational...
-
Laminated plates and shells - first ply failure analysis within 6-parameter shell theory
PublicationThis work describes Tsai-Wu and Hashin criteria modifications, dictated by nonlinear 6-parameter shell theory with asymmetric strain measures and drilling rotation. The material law is based on standard orthotropic elastic constants for a non-polar continuum, under plane state of stress. First ply failure loads of cylindrical panel subjected to pressure and flat compressed plate are estimated by means of Finite Element Analysis....
-
THE POSSIBILITIES OF ESTIMATING THE RELIABILITY OF SHIP PIPELINES’ ELEMENTS INCLUDING DESTRUCTIVE PHENOMENA ACTING ON THEM
PublicationIn the article an approach to the problem of estimating reliability data based on physical models is proposed. The possibility of reliability assessment for selected elements of ship pipelines, based on the recognition of the destructive physical phenomena taking place in them, is discussed. To do this, an overview of these phenomena has been made. In addition, a preliminary review of existing measures of destruction of materials...
-
Interactive Information Search in Text Data Collections
PublicationThis article presents a new idea for retrieving in text repositories, as well as it describes general infrastructure of a system created to implement and test those ideas. The implemented system differs from today’s standard search engine by introducing process of interactive search with users and data clustering. We present the basic algorithms behind our system and measures we used for results evaluation. The achieved results...
-
Testing the durability and function of road traffic management devices
PublicationTraffic management measures (vertical signs and horizontal marking, reflective elements) are used for guiding vehicles optically, indicating road mileage, marking objects in road gauge, marking vehicle and pedestrian safeguards and driver information and warning. This paper presents a synthesis of a literature study and the results of research conducted under stage one of the project LifeRoSE. The requirements for different traffic...
-
The shape of an ROC curve in the evaluation of credit scoring models
PublicationThe AUC, i.e. the area under the receiver operating characteristic (ROC) curve, or its scaled version, the Gini coefficient, are the standard measures of the discriminatory power of credit scoring. Using binormal ROC curve models, we show how the shape of the curves affects the economic benefits of using scoring models with the same AUC. Based on the results, we propose that the shape parameter of the fitted ROC curve is reported...
-
Badania systemów powstrzymujących pojazd przed wypadnięciem z drogi - cz. I
PublicationTransportation systems are designed and used so as to effectively and safely relocate people, goods and services. Despite this there are numerous hazards that disrupt or damage these systems. Risks such as extreme weather conditions, terrorist threats, landsliders or earthquakes are difficult to predict, manage and mitigate. One of the hazards for transportation systems are accidents, and their impact on the transport functioning...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Music Information Retrieval – Soft Computing versus Statistics . Wyszukiwanie informacji muzycznej - algorytmy uczące versus metody statystyczne
PublicationMusic Information Retrieval (MIR) is an interdisciplinary research area that covers automated extraction of information from audio signals, music databases and services enabling the indexed information searching. In the early stages the primary focus of MIR was on music information through Query-by-Humming (QBH) applications, i.e. on identifying a piece of music by singing (singing/whistling), while more advanced implementations...
-
State Interventionism in Tax System - Example of Action in a COVID-19 Crisis
PublicationThe following article presents and classifies changes in tax systems of selected countries as well as counts them as the response to the emergence of the crisis caused by the COVID-19 pandemic. Such actions were undertaken the context of state interventionism in the tax system. In order to achieve the objective of presenting the state interventionism in the context of tax rates, an analysis of the literature on the phenomenon described,...
-
International Conference on Internet of Things, Big Data and Security
Conferences -
International Conference on Trust, Privacy and Security in Digital Business
Conferences -
IEEE International Symposium on Security in Networks and Distributed Systems
Conferences -
IEEE Symposium on Computational Intelligence for Security and Defence Applications
Conferences -
International Conference on the Theory and Application of Cryptology and Information Security
Conferences -
CoRBAC – kontekstowo zorientowany model bezpieczeństwa
PublicationZaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.
-
Challenges in providing support for management of evidence-based arguments
PublicationThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Modeling the impact of surface currents in a harbor using graph theory
PublicationEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublicationThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublicationIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
Systemowe ujęcie wpływu destabilizatorów na poszukiwanie równowagi adaptacyjnej w procesie doskonalenia jakości w podmiotach leczniczych
PublicationW niniejszym opracowaniu zaprezentowano metodyczne aspekty poszukiwania równowagi adaptacyjnej w doskonaleniu jakości w podmiotach leczniczych. Tego typu sytuacja wynikać może miedzy innymi z pojawienia się szeregu destabilizatorów zakłócających realizację działań doskonalących. Istotne staje się także zidentyfikowanie szans i unikanie zagrożeń wynikających z tego typu destabilizacji, a w dalszej konsekwencji podjęcie działań adaptatywnych...
-
Evaluation of a sat-type fairness mechanism implemented in a dual-ring network
PublicationThe fairness problem was presented. Popular fairness concepts and measures were shown. The RPR fairness mechanism and the SAT mechanism were described. A modification of the SAT algorithm, adapted to the possibilities of Ethernet cards used for implementation of a dual-ring RPR-based network, was proposed. Performance of the proposed modification was measured. Jain's and Chen's fairness indexes were calculated. Effectiveness comparison...
-
Collective Uncertainty Entanglement Test
PublicationFor a given pure state of a composite quantum system we analyze the product of its projections onto aset of locally orthogonal separable pure states. We derive a bound for this product analogous to theentropic uncertainty relations. For bipartite systems the bound is saturated for maximally entangled statesand it allows us to construct a family of entanglement measures, we shall call collectibility. As thesequantities are experimentally...
-
Mixed 4-node shell element with assumed strain and stress in 6-parameter theory
PublicationWe propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...
-
Simulation research on the tool cycle in automated manufacturing system at selected tool duplication levels
PublicationThe paper presents results of the research concerning impact of applied tool exchange rule on the efficiency of an automated manufacturing system. The research consider the tool duplication levels that constrain realisation of a manufacturing process. Presented study was based on the real industrial system data. The operating of the investigated system of manufacture, including tools necessary for its realisation, was modelled...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Mixed 4-node shell element with assumed strain and stress in 6-parameter theory
PublicationWe propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...
-
Stability analysis of a road scarp in the Carpathian Mountains and methods of its protection
PublicationThe purpose of the study was to analyse the stability of a road scarp endangered by a landslide and to consider some measures for its stabilization. The potential landslide could unfavourably alter the shape of the slope, thus a religious sanctuary situated above the slope. The present research has resulted in suggestions of possible protection methods, namely, drainage, soil nailing, installation of piles, supporting the scarp...
-
On FEM analysis of Cosserat-type stiffened shells. Static and stability linear analysis
PublicationThe present research investigates the theory and numerical analysis of shells stiffened with beams in the framework based on the geometrically exact theories of shells and beams. Shell’s and beam’s kinematics are described by the Cosserat surface and the Cosserat rod respectively, which are consistent including deformation and strain measures. A FEM approximation of the virtual work principle leads to the conforming shell and beam...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Impact evaluation of a cycling promotion campaign using daily bicycle counters data: The case of Cycling May in Poland
PublicationThe promotion of active and sustainable transport modes as an alternative to motorised individual transport has become a key policy priority in Europe, to reduce air pollution, road congestion, noise, traffic injuries, and the adverse health outcomes of sedentary lifestyles. Policymakers are implementing a wide range of measures to encourage this shift in attitudes and behaviours. These interventions are most valuable when targeting...
-
The Polish adaptation of the Burnout Assessment Tool (BAT-PL) by W. Schaufeli et al.
PublicationAim. The study aimed to present the Polish version of the Burnout Assessment Tool (BAT-PL) by Schaufeli et al. and to assess its validity and reliability. The tool measures the core symptoms of burnout (BAT-C): exhaustion, mental distance, cognitive and emotional impairment, and its secondary symptoms (BAT-S): psychosomatic complaints and psychological distress. Method. The participants were 255 nursing staff members. The construct...
-
Human Computer Interface for Tracking Eye Movements Improves Assessment and Diagnosis of Patients With Acquired Brain Injuries
PublicationOne of the first clinical signs differentiating the minimally conscious state from the vegetative state is the presence of smooth pursuit eye movements occurring in direct response to moving salient stimuli. Glasgow Coma Scale (GCS) is one of the most commonly used diagnostic tools for acute phase assessment of the level of consciousness, together with a neurological examination. These classic measures are limited to qualitative...
-
Agnieszka Ubowska dr hab. inż.
PeopleAgnieszka Ubowska, PhD Dsc Eng was born in 1978 in Piła, where she graduated from the Secondary School of Environmental Protection. In the years 1998-2003 she studied at the Faculty of Technology and Chemical Engineering of the Szczecin University of Technology, majoring in environmental protection. She obtained her doctorate in technical sciences in 2008, defending her thesis entitled "Hybrid hydrophilic acrylamide (co)polymers"....
-
Transient detection for speech coding applications
PublicationSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
Measurements of power supply system properties of "Magnetic SpeedLine" ultra-fast robot prototype for IML labeling
Open Research DataTests of the power supply system of "SpeedLine magnetic" ultra-fast industrial robot for IML labeling were carried out to analyze the effect of the active power filter (APF) parameters on the power quality. at the target duty cycle. Tests were performed with the target duty cycle. Linear synchronous motors with permanent magnets were used to drive...
-
The effect of pH change of ketoprofen solutions on the germination of Sorghum bicolor (sorghum) seeds
Open Research DataIn these studies, an attempt was also made to determine whether (and, if so, to what extent) the change in pH affects the toxicity of ketoprofen will affect the germination of Sorghum bicolor (sorghum) seeds. As reported by Kudlak B, Wieczerzak M, Yotova G, Tsakovski S, Simeonov V, Namieśnik J (2016) Environmental risk assessment of Polish wastewater...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublicationA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublicationResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublicationThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
System Weryfikacji Autentyczności Podpisu Odręcznego
PublicationW referacie przedstawiono system statycznej i dynamicznej weryfikacji autentyczności podpisu odręcznego, składanego piórem biometrycznym, wyposażonym w 2 akcelerometry, 2 żyroskopy i 3 czujniki ścisku, na rezystancyjnej powierzchni dotykowej, łączącym się bezprzewodowo z urządzeniami komputerowymi. We wstępie przedstawiono architekturę sieciową wielomodalnego systemu biometrii. Przedstawiono warstwę sprzętową systemu weryfikacji...