Search results for: MULTIMODAL THREAT DETECTION - Bridge of Knowledge

Search

Search results for: MULTIMODAL THREAT DETECTION

Search results for: MULTIMODAL THREAT DETECTION

  • Iwona Kochańska dr hab. inż.

    Iwona Kochańska is a graduate of Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. She received M.Sc. degree in Automation Control and Robotics, specializing in the mobile objects control. In 2012 she received Ph.D. degree in hydroacoustics. In the same year she started working as an assistant professor in the Department of Marine Electronic Systems. The main area of interest is hydroacoustis, ...

  • Molecularly targeted nanoparticles: an emerging tool for evaluation of expression of the receptor for advanced glycation end products in a murine model of peripheral artery disease

    Publication
    • M. Woźniak
    • C. J. Konopka
    • A. Płoska
    • J. Hendhli
    • A. Siekierzycka
    • M. Banach
    • R. Bartoszewski
    • L. W. Dobrucki
    • L. Kalinowski
    • I. T. Dobrucki

    - CELLULAR AND MOLECULAR BIOLOGY - Year 2021

    Abstract Background: Molecular imaging with molecularly targeted probes is a powerful tool for studying the spatio-temporal interactions between complex biological processes. The pivotal role of the receptor for advanced glycation end products (RAGE) in numerous pathological processes, aroused the demand for RAGE targeted imaging in various diseases. In the study, we evaluated the use of a diagnostic imaging agent for RAGE quantification...

    Full text available to download

  • Next Generation Digital

    The paper outlines the major objectives of the MENAID research project, eimed at novel architectures of digital documents. Such documents will enable reduction of information overflow and strain, a major threat to the growth of a digital society. They will be forward compatible, technology neutral and lightweight, allowing workers of network organizations to use personal devices of any type.

    Full text to download in external service

  • Tomasz Wąsowicz dr hab.

    Tomasz Wąsowicz's research was first related to high-resolution atomic spectroscopy and focused on measurements and analysis of the transition probabilities of the forbidden lines, the hyperfine and isotopic structure of spectral lines of heavy elements, Stark effect in the helium atom. Tomasz Wąsowicz currently studies physicochemical processes occurring during interactions of various forms of radiation with atoms and molecules...

  • Handwritten signature verification system employing wireless biometric pen

    Publication

    - Year 2017

    The handwritten signature verification system being a part of the developed multimodal biometric banking stand is presented. The hardware component of the solution is described with a focus on the signature acquisition and on verification procedures. The signature is acquired employing an accelerometer and a gyroscope built-in the biometric pen plus pressure sensors for the assessment of the proper pen grip and then the signature...

  • Effect of excitation intensity on slope stability assessed by a simplified approach

    Publication

    - Earthquakes and Structures - Year 2021

    The paper concerns the selection of a design accelerograms used for the slope stability assessment under earthquake excitation. The aim is to experimentally verify the Arias Intensity as an indicator of the excitation threat to the slope stability. A simple dynamic system consisting of a rigid block on a rigid inclined plane subjected to horizontal excitation is adopted as a slope model. Strong ground motions recorded during earthquakes...

    Full text available to download

  • EE-ISAC—Practical Cybersecurity Solution for the Energy Sector

    Publication

    - ENERGIES - Year 2022

    A recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...

    Full text available to download

  • New technologies using Trace Metals of Concern

    Publication

    - Year 2015

    This chapter discusses the occurrence, material flows, technical applications of and pollution by platinum, palladium, thallium, rare earth elements, gold , silver, and antimony, all of which are essential for global economic growth. Modern technology relies on theses chemicals for the production of various industrial goods. however, their use releases pollutants into the environment, thus posing a threat to human health.

  • Jacek Chróścielewski prof. dr hab. inż.

  • Model of ship's magnetic signature

    Ships made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...

  • Multidipoles model of ship's magnetic field

    Publication

    Ships made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...

  • Multidipoles model of ship's magnetic field

    Ships made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...

  • Wstępna analiza zagrożenia podtopieniami w zlewni Potoku Strzyża w Gdańsku.

    Charakterystyka sieci hydrograficznej Potoku Strzyża. Analiza zagrożenia podtopie - niami z wykorzystaniem hydraulicznego modelu potoku. Przedstawienie oraz analiza wyników obliczeń. Wstępne określenie odcinków newralgicznych z punktu widze - nia zagrożenia powodziowego. Wstępna analiza możliwych przyczyn występowania podtopień na terenie zlewni Potoku Strzyża.

    Full text available to download

  • Low-cost Adsorbents Derived from Agricultural By-products/Wastes for Enhancing Contaminant Uptakes from Wastewater: A Review

    A major threat to the comfort of human life has been imposed by increased industrialization and urbanization. The generation and disposal of huge amounts of toxic materials and pollutants have heavily contaminated our environment. Some Organics such as synthetic dyes (SD) and heavy metals (HM) are becoming increasingly prevalent as the most dangerous pollutants in soil and surface water environments. They are...

    Full text available to download

  • Janusz Smulko prof. dr hab. inż.

    He was born on April 25, 1964 in Kolno. He graduated in 1989 with honors from the Faculty of Electronics at Gdańsk University of Technology, specialising in measuring instruments. In 1989 he took second place in the Red Rose competition for the best student in the Pomerania Region. Since the beginning of his career ha has been associated with Gdańsk University of Technology: research assistant (1989-1996), Assistant Professor (1996-2012),...

  • Multimedia industrial and medical applications supported by machine learning

    Publication

    - Year 2023

    This article outlines a keynote paper presented at the Intelligent DecisionTechnologies conference providing a part of the KES Multi-theme Conference “Smart Digital Futures” organized in Rome on June 14–16, 2023. It briefly discusses projects related to traffic control using developed intelligent traffic signs and diagnosing the health of wind turbine mechanisms and multimodal biometric authentication for banking branches to provide...

    Full text to download in external service

  • Bringing Bathymetry LiDAR to Coastal Zone Assessment: A Case Study in the Southern Baltic

    Publication

    - Remote Sensing - Year 2020

    One of the major tasks in environmental protection is monitoring the coast for negative impacts due to climate change and anthropopressure. Remote sensing techniques are often used in studies of impact assessment. Topographic and bathymetric procedures are treated as separate measurement methods, while methods that combine coastal zone analysis with underwater impacts are rarely used in geotechnical analyses. This study presents...

    Full text available to download

  • A video monitoring system using ontology-driven identification of threats

    Publication

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Full text to download in external service

  • Karolina Sobieraj mgr inż.

    People

    MSc. Karolina Sobieraj graduated in 2018 in the field of Renewable Energy Sources and Waste Management in the specialization of Waste Management, with a scholarship from the Minister of Science and Higher Education for students for outstanding scientific achievements in the 2017/2018 academic year. From October 2019, she started studies at the UPWr Doctoral School in the discipline of environmental engineering, mining and energy....

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Full text available to download

  • A low complexity double-talk detector based on the signal envelope

    A new algorithm for double-talk detection, intended for use in the acoustic echo canceller for voice communication applications, is proposed. The communication system developed by the authors required the use of a double-talk detection algorithm with low complexity and good accuracy. The authors propose an approach to doubletalk detection based on the signal envelopes. For each of three signals: the far-end speech, the microphone...

    Full text available to download

  • Method for determining bisphenol A in biological material, diagnostic device for detection of bisphenol A in biological material, diagnostic kit for detection of bisphenol A in biological material

  • A double-talk detector using audio watermarking

    a novel approach to double-talk detection in the acoustic echo canceler is proposed. a hidden signature is embedded into the arriving signal, using the echo-hiding method. next detection of the presence of this signature in the microphone signal is performed. the results of the signature detection may be used by the acoustic echo canceler to stop or restart the adaptation process.

    Full text to download in external service

  • New approaches for improving selectivity and sensitivity of resistive gas sensors: A review

    Publication
    • J. Smulko
    • M. Trawka
    • L. Hasse
    • C. G. Granqvist
    • R. Ionescu
    • F. E. Annanouch
    • E. Llobet
    • L. B. Kish

    - Year 2014

    Resistive gas sensors are very popular and reliable but suffer from low selectivity and sensitivity. Various methods have been suggested to improve both features without increasing the number of sensors in gas detection systems. Fluctuation enhanced gas sensing was proposed to improve gas detection efficiency by analyzing low-frequency resistance fluctuations, and noise parameters can be more informative than the single DC resistance...

    Full text to download in external service

  • Testing Stability of Digital Filters Using Optimization Methods with Phase Analysis

    Publication

    - ENERGIES - Year 2021

    In this paper, novel methods for the evaluation of digital-filter stability are investigated. The methods are based on phase analysis of a complex function in the characteristic equation of a digital filter. It allows for evaluating stability when a characteristic equation is not based on a polynomial. The operation of these methods relies on sampling the unit circle on the complex plane and extracting the phase quadrant of a function...

    Full text available to download

  • Algorytmy wykrywania krawędzi w obrazie

    Wykrywanie krawędzi jest pierwszym etapem w cyfrowym przetwarzaniu obrazów. Operacja ta polega na usunięciu informacji takich jak kolor czy też jasność, a pozostawieniu jedynie krawędzi. Efektem tej operacji jest znaczna redukcja ilości danych do dalszej analizy. Pozwala to na zastosowanie w następnych etapach bardziej złożonych algorytmów rozpoznawania obiektów na podstawie kształtu. W artykule zaprezentowano zastosowanie algorytmów...

    Full text available to download

  • MAlSim - Mobile Agent Malware Simulator

    Publication

    - Year 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • Malware - a survey on threats and mitigation techniques

    Publication

    - Year 2015

    This paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...

  • Diagnostics in ballast water management

    Publication
    • M. Bielski
    • J. Wachowicz
    • R. Bielski
    • A. Arkadiusz
    • J. Hendra

    - Year 2018

    . Diagnostics in ballast water management is the main remedy to protect against the threat of spreading invasive species that can be carried in ships' ballast tanks. This phenomenon is getting better known and understood. New and more effective methods of preventing threats related to this are being developed. Procedures are created to ensure environmental safety in the face of ever-increasing transport by sea. The article characterizes...

    Full text to download in external service

  • Cavitation Erosion of P110 Steel in Different Drilling Muds

    The P110 steel specimens were subjected to ultrasonic cavitation erosion in different compositions of drilling muds and surfactant additive. The test procedure was based on ASTM-G-32 standard recommendations. API 5CT-P110 steel is used for pipes in oil and gas industry. The harsh environment and high velocity of flows poses corrosive and erosive threat on materials used there. The composition of drilling fluid influences its rheological...

    Full text available to download

  • Processing of Marine Satellite Data in WEB-BASED GIS

    GIS systems are important modern word. They allow to quickly analyse and corelate various data bound to their geographical context. The paper describes Web-base GIS with ability to integrate and analyse data from many sources such as: satellite imagery, threat simulation models, marine vessels Automatic Identification System, raster and vector topographic charts. Some details of system architecture and implementation are presented...

    Full text available to download

  • Evaluation of the content of inorganic anions in tree saps

    Publication
    • M. Bilek
    • K. Stawarczyk
    • P. Kuniar
    • M. Olszewski
    • K. Kędziora
    • E. Cielik

    - Journal of Elementology - Year 2016

    Tree saps were once commonly used in the countries of Northern, Central and Eastern Europe. Although once almost forgotten, their popularity has been growing recently as part of an interest in organic food and traditional medicine. Tree saps, tapped mainly from birch and maple trees, are drunk both fresh and fermented or are used as raw material for the production of food products, e.g. syrups. The aim of this study was to determine...

    Full text available to download

  • Effect of wet Hydrogen Sulfide on Carbon Steels Degradation in Refinery Based on Case Study

    Publication

    Material degradation caused by wet hydrogen sulfide (Wet H2S) is one of the major issues in refineries. Carbon steel is the main construction material used in refineries and is subjected not only to thickness loss but the hydrogen is the major concern. H2S leads to high atomic hydrogen penetration in steel which causes degradation in the form of blistering and/or cracking (HIC/SOHIC) and stress cracking in the area of welds and...

    Full text available to download

  • Adversarial attack algorithm for traffic sign recognition

    Publication

    - MULTIMEDIA TOOLS AND APPLICATIONS - Year 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Full text to download in external service

  • Once in a season – the pragmatic function of fuck in “BoJack Horseman” TV Show

    This article investigates the use and pragmatic functions of the swear word fuck in the “BoJack Horseman” produced by Netflix and bridges the gap in the linguistic research on this particular TVshow. Incorporating corpus linguistics tools, the BoJack Horseman Corpus was compiled and thelemma fuck has been investigated and analysed from the multimodal perspective....

  • Effect of some organic solvent - water mixtures composion on precipitated calcium carbonate in carbonation process

    Precipitated calcium carbonate particles were obtained during carbonation of calcium hydroxide slurry with carbon dioxide. Aqueous solutions of isopropyl alcohol, n-butanol and glycerol were used as solvents. Concentration of organic additives in the reactive mixture was from 0 to 20 % (vol.). Precipitation process were performed in a stirred tank reactor equipped with gas distributor. Multimodal courses of particles size distribution...

    Full text to download in external service

  • Virtual immersive environments

    Publication

    - Year 2022

    Yet a higher level of active systems may be achieved when users are fully immersed in an interface which is a 3D computer generated virtual world and can interact with surrounding objects of that world as they were in a real one. This is the issue covered by Chapter 7. Interaction in such a world is both multidimensional and multimodal, with the possibility of free movement of the user in any direction and the simultaneous stimulation...

    Full text to download in external service

  • NONLINEAR VIBRATION ANALYSIS OF BEAM AND PLATE WITH CLOSED CRACK: A REVIEW

    The effect of nonlinearity is high sensitivity in damage detection, especially for closed cracks and delamination. This review illustrates the results of several researchers dealing with nonlinear effects caused by the closure of cracks in the structure, i.e., beam and plate structures. Early detection of damage is an important aspect for the structure and, therefore, continuous progress is being made in developing new and effective...

    Full text available to download

  • Moving object tracking algorithm evaluation in autonomous surveillance system

    Publication

    Results of evaluation of video object tracking algorithm being a part of an autonomous surveillance system are presented. The algorithm was investigated employing a set of benchmarks recorded locally. The precision of object detection, evaluated with such metrics as fragmentation, object area recall and object precision, is in focus. The experiments aimed at examining the detection quality using various object detection algorithm...

  • River flow simulation based on the HEC-RAS system

    Publication

    This work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...

    Full text to download in external service

  • River Flow Simulation Based on the HEC-RAS System

    This work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...

    Full text to download in external service

  • Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym

    Niniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...

  • Identification of regions of interest in video for a traffic monitoring system

    Publication

    - Year 2008

    A system for automatic event detection in the camera image is presented in this paper. A method of limiting a region of interest to relevant parts of the image using a set of processing procedures is proposed. Image processing includes object detection with shadow removal performed in the modified YCbCr color space instead of RGB. The proposed procedures help to reduce the complexity of image processing algorithm and result in...

    Full text to download in external service

  • Herbarium of Division of Marine Biology and Ecology University of Gdańsk (DMBE)

    Open Research Data
    open access

    Herbarium of Division of Marine Biology and Ecology University of Gdańsk (DMBE) is a research herbarium encompassing specimens of vascular plants and algae hosted by the Laboratory of Marine Plant Ecology at University of Gdańsk, Poland. The aim of Herbarium is to preserve marine plant and algae collections mostly from the Gulf of Gdańsk, but the herbarium...

  • Measurements of Subnanometer Molecular Layers

    Publication

    - Year 2013

    Selected methods of formation and detection of nanometer and subnanometer molecular layers were shown. Additionally, a new method of detection and measurement with subnanometer resolution of layers adsorbed or bonded to the gate dielectric of the ion selective field effect transistor (ISFET) was presented.

    Full text to download in external service

  • Video recordings of static hand gestures for gesture based interaction

    Open Research Data
    open access

    This data set contains video recording of selected simple hand gestures related to sign language. The purpose of the data set is to evaluate different computer algorithms design for hand gesture detection as well as for hand features and hand pose detection and identification. The data set contains 5 video recordings in mp4 format.  Each recording is...

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Full text available to download

  • Parametric impulsive noise detector for corrupted audio signals based on hidden Markow model

    Publication

    - Year 2008

    The paper addresses the problem of impulsive noise detection for audio signals. A structure of threshold parameter detectors using modelingof signals was introduced. the algorithm of the noise detection, based on discrete-time hidden Markow model (HMM)of whitened audio signal is elaborated

  • Challenges in preparing honey samples for chromatographic determination of contaminants and trace residues

    The determination of contaminations and residues in honey is of growing concern over past few years, especially that these compounds can not only diminish beneficial properties of honey but more importantly, if present in significant amounts, can pose serious threat to human health. Since honey is characterized by complex composition of the matrix sample, it is often necessary to apply clean-up step, in order to eliminate interfering...

    Full text to download in external service

  • Immunogenic and protective activity of recombinant chimeric Toxoplasma gondii proteins

    Publication

    - Year 2017

    Toxoplasmosis, one of the most common parasitic invasions worldwide, may pose a great threat for individuals with weakened immune system. The parasite also causes considerable economic losses due to infection of livestock. To date there is no efficient immunoprophylaxis for humans and animals, which would provide long-lasting protection against T. gondii invasion. Chimeric proteins, containing several selected fragments of parasite...