Filters
total: 2322
displaying 1000 best results Help
Search results for: PRESENTATION ATTACK DETECTION
-
A universal IT system architecture for servicing, collecting, storing, processing and presenting data from wireless devices
PublicationIn the article we present a universal IT system architecture, which allows one to develop, based on mobile and multiplatform JAVA language, applications capable of working with many different wireless systems in an easy and effective way. Modular system architecture supports efficient data processing and enables convenient presentation of chosen parameters. Additionally, proposed IT system architecture provides easy adoption to...
-
Influence of the Square Wave Voltage on Dynamical Properties of a Flat Voltammetric Electrode in the Time Domain by the Electrochemical Reversible Reaction
PublicationIn this article there is a presentation of the analysis of the polarizing voltage shape influencing dynamic properties of voltammetric electrodes when on their surface reversible reaction takes place in the time domain. The electrode polarization with linearly increasing voltage and with a square component, was analyzed. The analysis that were conducted showed that the voltammetric electrode behaves like a first order transducer....
-
Quantum entanglement in time
PublicationIn this paper we present a concept of quantum entanglement in time in a context of entangled consistent histories. These considerations are supported by presentation of necessary tools closely related to those acting on a space of spatial multipartite quantum states. We show that in similarity to monogamy of quantum entanglement in space, quantum entanglement in time is also endowed with this property for a particular history....
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
NONLINEAR VIBRATION ANALYSIS OF BEAM AND PLATE WITH CLOSED CRACK: A REVIEW
PublicationThe effect of nonlinearity is high sensitivity in damage detection, especially for closed cracks and delamination. This review illustrates the results of several researchers dealing with nonlinear effects caused by the closure of cracks in the structure, i.e., beam and plate structures. Early detection of damage is an important aspect for the structure and, therefore, continuous progress is being made in developing new and effective...
-
Electrical Stimulation Modulates High Gamma Activity and Human Memory Performance
PublicationDirect electrical stimulation of the brain has emerged as a powerful treatment for multiple neurological diseases, and as a potential technique to enhance human cognition. Despite its application in a range of brain disorders, it remains unclear how stimulation of discrete brain areas affects memory performance and the underlying electrophysiological activities. Here, we investigated the effect of direct electrical stimulation...
-
State Interventionism in Tax System - Example of Action in a COVID-19 Crisis
PublicationThe following article presents and classifies changes in tax systems of selected countries as well as counts them as the response to the emergence of the crisis caused by the COVID-19 pandemic. Such actions were undertaken the context of state interventionism in the tax system. In order to achieve the objective of presenting the state interventionism in the context of tax rates, an analysis of the literature on the phenomenon described,...
-
Moving object tracking algorithm evaluation in autonomous surveillance system
PublicationResults of evaluation of video object tracking algorithm being a part of an autonomous surveillance system are presented. The algorithm was investigated employing a set of benchmarks recorded locally. The precision of object detection, evaluated with such metrics as fragmentation, object area recall and object precision, is in focus. The experiments aimed at examining the detection quality using various object detection algorithm...
-
Application of Web-GIS for Dissemination and 3D Visualization of Large-Volume LiDAR Data
PublicationThe increasing number of digital data sources, which allow for semi-automatic collection and storage of information regarding various aspects of life has recently granted a considerable rise in popularity to the term “Big data”. As far as geospatial data is concerned, one of the major sources of Big data are Light Detection And Ranging (LiDAR) scanners, which produce high resolution three-dimensional data on a local scale. The...
-
Analysis of spatial changes in the town of Puck with its surroundings in the years 1926, 1940, 1974, 1985, 2000, 2020 on the basis of topographic maps using the BDOT10K database
Open Research DataSpatial changes over time are extremely valuable due to the possibility of modeling forecasts. This dataset shows how Puck has evolved over a specific period of time. Thanks to this presentation of the data set, it is possible to easily recreate the appearance of the city in particular years.
-
A synthetic result of the development of personnel risk factors in the A, B, C, D enterprise
Open Research DataThe data below presents the shape of all the researched personnel risk factors in the A, B, C, D enterprise (which were tested by the author). Further considerations should be started with the presentation of the synthesis of the obtained results, which is presented in this research data.
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublicationDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Koncepcja i symulacja polowa generatora o zmiennej częstotliwości. Zastosowanie w autonomicznych systemach elektroenergetycznych = Conception and field simulations of a variable frequency generator. Application for autonomous power generation system
PublicationStreszczenie angielskie: This paper covers a conception and simulation results for a brushless synchronous generator working with variable speed in an autonomous energy generation system (e.g. airplane power grid, hybrid vehicle, micro-CHP). The papers has two parts: presentation of the generator conception used in modern autonomous energy generation systems, and simulation results using filed model elaborated in Flux2D software....
-
Retrieval with Semantic Sieve
PublicationThe article presents an algorithm we called Semantic Sieve applied for refining search results in text documents repository. The algorithm calculates socalled conceptual directions that enables interaction with the user and allows to narrow the set of results to the most relevant ones. We present the system where the algorithm has been implemented. The system also offers in the presentation layer clustering of the results into...
-
Software for calculation of noise maps implemented on the supercomputer
PublicationThis paper presents investigation results relevant to the implementation of the algorithms for the calculation of noise maps. The aim of the implementation of the algorithms on the computer cluster is explained. Selected implementation details of the software called the noise propagation model are described. The interaction of the software with the data acquisition system is presented. Noise maps obtained by exploitation of the...
-
Multimedia distributed system for visualization of ongoing and archival events for BG
PublicationThe paper presents concept of the distributed system designed to gather and provide the information about vehicles, vessels and airplanes present within the area of operations of the Border Guard supplemented with related multimedia. The part of the system related to the map data gathering, distribution and visualization has been already implemented in the preceding project. The presented system is the expansion of the previous...
-
Identification of regions of interest in video for a traffic monitoring system
PublicationA system for automatic event detection in the camera image is presented in this paper. A method of limiting a region of interest to relevant parts of the image using a set of processing procedures is proposed. Image processing includes object detection with shadow removal performed in the modified YCbCr color space instead of RGB. The proposed procedures help to reduce the complexity of image processing algorithm and result in...
-
Microscopic examination of the texture of paper products
Open Research DataAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
Measurements of Subnanometer Molecular Layers
PublicationSelected methods of formation and detection of nanometer and subnanometer molecular layers were shown. Additionally, a new method of detection and measurement with subnanometer resolution of layers adsorbed or bonded to the gate dielectric of the ion selective field effect transistor (ISFET) was presented.
-
Video recordings of static hand gestures for gesture based interaction
Open Research DataThis data set contains video recording of selected simple hand gestures related to sign language. The purpose of the data set is to evaluate different computer algorithms design for hand gesture detection as well as for hand features and hand pose detection and identification. The data set contains 5 video recordings in mp4 format. Each recording is...
-
Renewable Energy Sources - W/C/L, E+MiBM, sem.05, (PG_00042100) - Nowy
e-Learning CoursesPresentation of the modern achievements and tendencies in the area of renewable energy resources utilization. Classification of renewable energy resources. Possibilities of renewable energy resources utilization. Discussion of theoretical backgrounds of selected technologies.
-
Renewable Energy Sources, WIMiO, Energetyka, I st., sem. 03, stacjonarne, (PG_00042100), semestr zimowy 2023/2024
e-Learning CoursesPresentation of the modern achievements and tendencies in the area of renewable energy resources utilization. Classification of renewable energy resources. Possibilities of renewable energy resources utilization. Discussion of theoretical backgrounds of selected technologies.
-
Parametric impulsive noise detector for corrupted audio signals based on hidden Markow model
PublicationThe paper addresses the problem of impulsive noise detection for audio signals. A structure of threshold parameter detectors using modelingof signals was introduced. the algorithm of the noise detection, based on discrete-time hidden Markow model (HMM)of whitened audio signal is elaborated
-
Leak detection methods for transmission pipelines.**2001, 156 s. 63 rys. 31 tab. bibliogr. 78 poz. maszyn. Rozprawa doktorska (2002.????) PG, Wydz. ETI. Promotor: dr hab. inż. Z. Kowalczuk, prof. nadzw. PG. Metody detekcji wycieków w rurociągach przemysłowych.
Publication.
-
Software Modeling from the Perspective of Intuitive Information Processing
PublicationThere is psychological evidence that humans process information not only consciously but also intuitively. Intuitive information processing is present also during the activities related to software modeling. The goal of this paper is to analyze software modeling from the perspective of theories which describe intuitive (nonconscious, implicit) information processing. The paper includes presentation of relevant psychological theories,...
-
Influence of the Delay in Monitor System on the Motor Coordination of Musicians while Performing
PublicationThis paper provides a description and results of measurements of the maximum acceptable value of delay tolerated by a musician, while playing an instrument, that does not cause de-synchronization and discomfort. First, methodology of measurements comprising audio recording and a fast camera is described. Then, themeasurement procedure for acquiring the maximum value of delay conditioning...
-
Economic benefits of dynamic charging of electric buses
PublicationDiesel engines buses are still the most used type of buses. Electric buses provide promising green alternatives and a lot of advantages, but their main disadvantages are limited travel range and long charging time. This article is a presentation of innovative solution for charging of electric busses - Dynamic Charging (IMC). The modern IMC system in Solingen was presented. At the end of the article, a proposal was made to introduce...
-
Electrical and noise responses of carbon nanotube networks enhanced by UV light for nitrogen dioxide sensing
Open Research DataNetworks consisting of randomly oriented carbon nanotubes (CNN) were investigated toward nitrogen dioxide detection by means of electrical and low-frequency noise measurements. UV-activation of CNN layers improved gas sensitivity and reduced the limit of detection, especially by employing 275 nm-LED. This data set includes DC resistance measurements...
-
Detekcja i lokalizacja nieprzewodzenia tranzystorów falownika napięcia na podstawie analizy prądu obciążenia
PublicationPrzedstawiono nową metodę detekcji i lokalizacji nieprzewodzenia tranzystorów w falownikach napięcia zasilających silniki indukcyjne małej mocy. Metoda bazuje na monitorowaniu wartości dwóch sygnałów dia-gnostycznych. Pierwszy z nich, wskaźnik braku przepływu prądu, wykorzystano w celu detekcji uszkodzeń. Drugi, stosunek wartości średniej prądu do wartości średniej bezwzględnej, zawiera informacje umożliwiające lokalizację uszkodzonych...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Open-transistor fault diagnostics in voltage-source inverters by analyzing the load current
PublicationA novel method is presented for the detection andisolation of open-transistor faults in voltage-source invertersfeeding low-power AC motors. The method is based onmonitoring two diagnostic signals, one indicating sustained nearzerovalues of output current and thus permitting fault detection,the other permitting the isolation of the particular transistorwhich went faulty. The latter signal is the ratio of the averagephase current...
-
Analysis of soundscape recordings in close proximity to the road in changeable wather conditions
PublicationThe acoustic vehicle sensing is the least invasive type of traffic detection. Also, acoustic-based vehicle detection technology is insensitive to precipitation and can operate in low light level. Therefore, this kind of method may be used for automatic detection of the vehicle passage events. It can also be employed for measurements of a vehicle speed and the vehicle assignment to the particular category. In this paper the results...
-
Bartosz Szostak mgr inż.
PeopleBartosz Szostak graduated with a degree in engineering, specializing in Geodesy and Cartography, at the Gdansk University of Technology in 2019. On 2021, he graduated with a Master's degree also in the field of Geodesy and Cartography at the Gdansk University of Technology. The topics covered in his thesis were machine learning and object detection.
-
Direct determination of paraquat herbicide by square-wave voltammetry by two-step transfer mechanism at heterogeneous boron-doped carbon nanowall electrodes
PublicationBoron-doped carbon nanowalls (B:CNW) versus boron-doped diamond (BDD) materials were investigated for the effective electrochemical detection of highly toxic herbicide paraquat (PQ). Depending on the surface morphology and functional groups of BDD and B:CNWs, the electrochemical absorption and detection of the target analyte PQ revealed different detection mechanisms. The surface absorption mechanism was mainly observed for BDD,...
-
Aktywny system RFID do lokalizacji i identyfikacji obiektów w wielomodalnej infrastrukturze bezpieczeństwa
PublicationPrzedstawiono prace koncepcyjne, badawcze oraz implementacyjne skoncentrowane na praktycznej realizacji systemu detekcji obiektów z wykorzystaniem kamer wizyjnych i identyfikacji radiowej. Zaproponowano rozbudowę wielomodalnego teleinformatycznego systemu bezpieczeństwa o warstwę identyfikacji radiowej obiektów. Omówiono założenia zaprojektowanego systemu oraz opracowaną warstwę sprzętową. Zaproponowano i przedyskutowano praktyczne...
-
Multimodal Surveillance Based Personal Protection System
PublicationA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
System of specific grants for local government units in Poland
PublicationThe article analyses the system of specific grants in local governments in Poland. First, main revenue sources of local self-governments are presented. Their presentation is based upon the consideration of one of the basic important principles in democratic states today, i.e. decentralization. The text then, in more details, describes specific grants with respect to the European Charter of Local Self-Government. Subsequently, the...
-
Teleportation of geometric structures in 3D
PublicationThe simplest quantum teleportation algorithms can be represented in geometric terms in spaces of dimensions 3 (for real state vectors) and 4 (for complex state vectors). The geometric representation is based on geometric-algebra coding, a geometric alternative to the tensor-product coding typical of quantum mechanics. We discuss all the elementary ingredients of the geometric version of the algorithm: geometric analogs of states...
-
The Imaging of Gdansk Bay Seabed by Using Side Sonar
PublicationThis paper is mainly aimed at presentation of an impact of environmental conditions on imaging accuracy by using hydro-acoustic systems in waters of a high non-uniformity of spatial distribution of hydrological parameters. Impact of refraction on erroneous estimation of range, in case of wave radiation into water under a large angle, like in side sonars or multi-beam echo-sounders, is especially important. In this paper seasonal...
-
Mathematical Models in Design Process of Ship Bow Thrusters
PublicationThe presentation is about an application of simulation models for computer-aided design of ship bow thrusters. Generation of simulation models of ship bow thruster requires development and verifying of mathematical models of system component elements. Using the results of simulation the expert system is able to determine, that the rules of classification societies are met. Design procedures and mathematical models are part of an...
-
Style Transfer for Detecting Vehicles with Thermal Camera
PublicationIn this work we focus on nighttime vehicle detection for intelligent traffic monitoring from the thermal camera. To train a Convolutional Neural Network (CNN) detector we create a stylized version of COCO (Common Objects in Context) dataset using Style Transfer technique that imitates images obtained from thermal cameras. This new dataset is further used for fine-tuning of the model and as a result detection accuracy on images...
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Abdalraheem Ijjeh Ph.D. Eng.
PeopleThe primary research areas of interest are artificial intelligence (AI), machine learning, deep learning, and computer vision, as well as modeling physical phenomena (i.e., guided waves in composite laminates). The research interests described above are utilized for SHM and NDE applications, namely damage detection and localization in composite materials.
-
Innowacyjny moduł ultradźwiękowy systemu monitoringu technicznego mostu podwieszonego w Rzeszowie
PublicationW artykule przedstawiono system monitoringu technicznego konstrukcji mostu podwieszonego nad rzeką Wisłok. System będzie wyposażony w dodatkowy moduł ultradźwiękowy umożliwiający śledzenie degradacji mechanicznej betonu w pylonie mostu. Wczesne wykrywanie stref mikropęknięć, przed pojawieniem się widocznych rys, umożliwia monitorowanie amplitud propagującej fali ultradźwiękowej oraz analizę sygnałów w dziedzinie częstotliwości.
-
Macrocyclic derivatives of imidazole as chromoionophores for bismuth(III)/lead(II) pair
Publication18-membered diazomacrocycles with imidazole or 4-methylimidazole residue as a part of macrocycle were used as chromoionophores in bismuth(III) and lead(II) dual selective optodes for the first time. Cellulose triacetate membranes doped with macrocyclic chromoionophores are bismuth(III) and lead(II) selective with color change from orange/red to different shades of blue and violet, respectively. Results obtained for model and real...