Search results for: THREATS - Bridge of Knowledge

Search

Search results for: THREATS

Search results for: THREATS

  • Bioterrorism — characteristics and possibilities of prevention

    In the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.

    Full text available to download

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Badania systemów powstrzymujących pojazd przed wypadnięciem z drogi - cz. I

    Transportation systems are designed and used so as to effectively and safely relocate people, goods and services. Despite this there are numerous hazards that disrupt or damage these systems. Risks such as extreme weather conditions, terrorist threats, landsliders or earthquakes are difficult to predict, manage and mitigate. One of the hazards for transportation systems are accidents, and their impact on the transport functioning...

    Full text available to download

  • Assessing Industry 4.0 Features Using SWOT Analysis

    Publication

    - Communications in Computer and Information Science - Year 2020

    This paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...

    Full text available to download

  • Small city and a bridge. Landscape perspective

    Publication

    - Year 2018

    The aim of the paper is to present the problems connected with the location of big infrastructure objects; like bridges; in close neighbourhood to the small cities located in valuable environment and landscape; and the ways to minimize the potential threats. The case study of the small town Wyszogrod in central Poland will be presented to illustrate the values of the environment and landscape; which could have been easily destroyed...

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • Acoustics - new services for urban planning, research and education

    Publication

    The main purpose of the presented design is twofold, namely: providing detailed information about the noise threats that occur every day in city areas and preventing the noise induced hearing loss especially among young people. An experimental system designed for the continuous monitoring of the acoustic climate of urban areas was developed and implemented within the PLGrid Plus project. The assessment of environmental threats...

    Full text to download in external service

  • The networking of the justice system as part of public court networks

    Publication

    - Year 2015

    The goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...

  • Security Assessment of a Turbo-Gas Power Plant

    Publication

    - Year 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Full text to download in external service

  • Cybersecurity of Enterprise Infrastructure 2023

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Managing enterprise IT infrastructure and security 2022

    e-Learning Courses
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Landscape as a Potential Key Concept in Urban Environmental Planning: The Case of Poland

    Publication

    Rapid urban development increases the consumption of materials, energy, and water, resulting in an overproduction of waste and emissions. These cause many environmental threats, such as ozone layer depletion and rain acidification, leading to climate change. Therefore, the question arises on how to improve the effectiveness of tools that strengthen environmental protection. This discursive article presents an approach stressing...

    Full text available to download

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Tomasz Janowski dr

    Tomasz Janowski is the Head of the Department of Informatics in Management, Gdańsk University of Technology, Poland; Invited Professor at the Department for E-Governance and Administration, University for Continuing Education Krems, Austria; and Co-Editor-in-Chief of Government Information Quarterly, Elsevier.  Previously, he was the founder and head of the United Nations University Operating Unit on Policy-Driven Electronic Governance...

  • Case studies of resonance phenomena in high voltage overhead power lines with shunt reactors

    Misguided design of the towers of power transmission lines can lead to serious problems such as voltage asymmetry, overvoltages, electric arc extinction difficulties or resonance – in case of double circuit line with shunt reactors. The paper points out those threats on example of 400 kV double circuit overhead transmission line with shunt reactors.

  • Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras

    The study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.

  • Rospuda - czy wszędzie budować mosty?

    Publication

    - Year 2008

    Streszczenie - SummaryThe article presents the problem of planning transport system in the areas of high natural and landscape values. Bridges and roads crossing valuable areas undergo Environmental Impact Assessment (EIA) Procedure. This procedure in Poland is often treated only as formal requirement, not as an instrument helping to solve conflicts and to minimise negative environmental and landscape effects. The potential of...

  • Resolving conflicts in object tracking for automatic detection of events in video

    An algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...

    Full text to download in external service

  • Sources of investment risk in urban regeneration projects

    Publication

    - Czasopismo Techniczne - Year 2014

    The scope of the article includes multidimensional risk analysis of urban regeneration projects, whose base is to identify areas of its occurrence. Authors thoroughly analyze the sources of potential threats and attempts to answer the question, what is their contribution into overall urban regeneration’ investment risk. The target concept will be used to assess the level of investment risk at the stage of initiation, preparation...

    Full text available to download

  • Concrete versus green corridors in road planning. Gdansk case

    Publication

    The aim of an article is to present the threats which may be caused by the construction of the transit road inside the city structure, and some mitigation measures aiming to eliminate or minimize environmental and landscape damages and social problems. Theoretical guidelines and conclusions will be followed by the example illustrating the problem. As an answer, some guidelines enabling sustainable road planning will be presented....

    Full text to download in external service

  • Nowe wyzwania, nowe rozwiązania. Jak przedsiębiorstwo branży IT odnajduje się w erze VUCA?

    Publication

    - e-mentor - Year 2023

    Zmienność, niepewność, złożoność i niejednoznaczność, określane akronimem VUCA (volatility, uncertainty, complexity, ambiguity) towarzyszą funkcjonowaniu każdego przedsiębiorstwa. Jak wykorzystać te nieodłączne cechy otoczenia przedsiębiorstw jako szanse dla ich rozwoju to wy-zwania stojące przed nimi, a zarazem pytanie badawcze artykułu. Celem artykułu jest wykazanie, na przykładzie przedsiębiorstwa branży IT, że analiza zmienności,...

    Full text available to download

  • Determining and visualizing safe motion parameters of a ship navigating in severe weather conditions

    Publication

    The paper presents a method of determining, organizing and displaying ship collision avoidance information, which is based on the Collision Threat Parameters Area (CTPA) technique. The method makes it possible to visualize navigational threats as well as possible collision avoidance manoeuvres. The solution is focused on supporting navigation in severe weather conditions. Normally collision avoidance decisions are made taking into...

    Full text to download in external service

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publication

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Full text available to download

  • Profesjonalizacja zawodu dziennikarza w obliczu konwergencji mediów

    Publication

    - Zarządzanie Mediami - Year 2019

    Celem artykułu jest poszerzenie stanu obecnej wiedzy na temat zmian zachodzących w dziennikarstwie, spowodowanych digitalizacją oraz konwergencją mediów. Autorzy przeprowadzili badania wśród dziennikarzy, które dotyczyły ich opinii na temat profesjonalizacji, procesu zmian w mediach oraz możliwości i zagrożeń spowodowanych przez nowe media.

    Full text available to download

  • Mobility Oriented Development (MOD): Public-Private Partnership in Urban Parking & Traffic Management with the Use of Autonomous Automobiles, Car-Sharing, Ridesharing Modes of Transport & Mobility as a Service (MaaS)

    Publication

    - Year 2017

    The focus of the following research are relations between mobility technologies and metropolitan (urban and suburban) spatial structures. In this paper the author discusses various urban modes of transport (automobile, mass transit) in the context of emerging technical (autonomous vehicles, self-driving cars and driverless shuttles) and organizational (carpooling, ridesharing, car-sharing, on-demand mobility) solutions for " mobility...

    Full text to download in external service

  • Photolytic and Photocatalytic Recreational Water Treatment

    Disinfection is one of the most important steps during recreational water treatment. Nevertheless, disinfection by-products are formed by conventional disinfectants, which pose several health threats. The concentration of disinfection by-products can be decreased by photolytic and photocatalytic treatment. Medium-pressure mercury lamp, UV-LEDs and solar irradiation were investigated and evaluated considering emitted wavelength,...

    Full text to download in external service

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Method of sacrificial anode transistor-driving in cathodic protection system

    A magnesium anode driving system has been proposed. A PNP driving transistor has been used. Electrochemical testing in 3%NaCl, results and comparison of the driving system and classic direct anode to cathode connection are presented. The driving system reduced the protection current and stabilized the working conditions of the anode. Higher anode efficiency was achieved. Overprotection and hydrogen embrittlement threats were prevented...

    Full text available to download

  • Julita Wasilczuk dr hab.

    Born on 5th of April, 1965 in Gdansk. In 1987-1991 studied the economics of transport, at the University of Gdansk. At 1993 she started to work at the Faculty of Management and Economics. In 1997 received a PhD at the faculty, in 2006 habilitation at the Faculty of Management, University of Gdansk. Since 2009 Associate Professor at Gdansk University of Technology. In 2010-2012 Associate Professor of Humanistic High School at Gdansk. The...

  • Diagnostics in ballast water management

    Publication
    • M. Bielski
    • J. Wachowicz
    • R. Bielski
    • A. Arkadiusz
    • J. Hendra

    - Year 2018

    . Diagnostics in ballast water management is the main remedy to protect against the threat of spreading invasive species that can be carried in ships' ballast tanks. This phenomenon is getting better known and understood. New and more effective methods of preventing threats related to this are being developed. Procedures are created to ensure environmental safety in the face of ever-increasing transport by sea. The article characterizes...

    Full text to download in external service

  • Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?

    Publication

    - Year 2018

    Positive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...

    Full text to download in external service

  • Frequently updated noise threat maps created with use of supercomputing grid

    An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed services were developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers....

    Full text available to download

  • Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance

    This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...

    Full text available to download

  • Biopolymers in designing modern antimicrobial medical materials. Part I. Biopolymer medical materials - collagen, chitosan

    Publication

    The article is a review of the literature concerning the possible use of biopolymers for the preparation of dressings with antimicrobial activity. Authors show the potential of biopolymers: collagen and chitosan - which have the ability to immobilize and control the release of various active compounds - for providing the appropriate antibacterial, bacteriostatic and wound healing properties. Types of threats, for which the dressing...

    Full text available to download

  • Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream

    A background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....

    Full text to download in external service

  • Influence of Operation Conditions on Temperature Hazard of Lithium-Iron-Phosphate (LiFePO4) Cells

    Publication
    • W. Kurpiel
    • B. Polnik
    • Ł. Orzech
    • K. Lesiak
    • B. Miedziński
    • M. Habrych
    • G. Debita
    • M. Zamłyńska
    • P. Falkowski-Gilski

    - ENERGIES - Year 2021

    The article presents and discusses the results of research on hazard, especially temperature, for selected lithium-ion-phosphate cells operated in accordance with the manufacturer’s recommendations but used under onerous mining conditions. This applies to the performance of cells in battery sets without the application of any management system (BMS). On the basis of the obtained test results, first of all, the influence of the...

    Full text available to download

  • Oczekiwania stron konfliktu i mediatorów wobec e-mediacji. Czy e-mediacja ma przyszłość?

    Publication

    - Year 2014

    Artykuł prezentuje możliwości prowadzenia mediacji – skutecznej i korzystnej, ale rzadko wykorzystywanej w Polsce metody pozasądowego rozstrzygania sporów - z wykorzystaniem profesjonalnej platformy internetowej. Na podstawie badań przeprowadzonych na grupie mediatorów oraz stron konfliktów określono oczekiwania dotyczące prowadzenia e-mediacji i wyzwania, jakie stawia przed mediatorami mediacja on-line.

  • Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego

    W artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.

    Full text available to download

  • Trudności ochrony środowiska w planowaniu przestrzennym–struktura problemu

    Publication

    Artykuł zawiera ogólną systematykę negatywnych oddziaływań na środowisko przyrodnicze. Autor omawia trudności zapobiegania przez planowanie przestrzenne zagrożeniom środowiska. Analizuje strukturę problemu, wskazując czynniki: społeczne, gospodarcze, prawne i polityczne, w tym rolę: motywacji, hierarchii wartości, świadomości ekologicznej, przekonań. Autor wskazuje też działania prowadzące do ograniczenia zagrożeń.

    Full text available to download

  • Analysis of the Usefulness of Cheap Audio Recorders for Spectral Measurement of Environmental Noise

    Environmental noise pollution is nowadays one of the most serious health threats. The impact of noise on the human body depends not only on the sound level but also on its spectral distribution. Reliable measurements of the environmental noise spectrum are often hampered by the very high price of top quality measuring devices. This paper explores the possibility of using much cheaper audio recorders for the frequency analysis....

    Full text available to download

  • EHV transmission lines wires location on line operation issues - case studies

    Transmission lines towers construction affects the line parameters and influences on its operation in the future. Misguided design of the tower can lead to serious problems such as overvoltages, electric arc extinction difficulties, voltage asymmetry, resonance phenomena or increasing of magnetic field near the line. The paper points out those threats on example of 400 kV double circuit overhead transmission line with shunt reactors....

    Full text to download in external service

  • Forecasted climate changes and their influence on cities and regions in 2050 in terms of extreme hydrological events

    Global climate change is a problem which arises numerous theories and uncertainties, especially in terms of speculated human impact. Independent from the fact, what is the main driver for the changes, some of the climate shifts are visible already nowadays. Both contemporary and future cities will have to face such problems. Although climate change may cause numerous effects on different fields, a special stress in this article...

    Full text available to download

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publication

    - Year 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Full text to download in external service

  • Youth attitude to entrepreneurship in Eastern and Central European countries: Gender aspect

    Publication

    Current business conditions pose new challenges to youth entrepreneurship, which is a significant component of countries’ economic growth. In addition, Generation Z differs from previous generations and requires new approaches. In this context, a comprehensive study of the peculiarities and various aspects of youth entrepreneurship development is highly-demanded and relevant. Furthermore, the lower representation of women among...

    Full text available to download

  • Forecasting risks and challenges of digital innovations

    Publication

    - Year 2020

    Forecasting and assessment of societal risks related to digital innovation systems and services is an urgent problem, because these solutions usually contain artificial intelligence algorithms which learn using data from the environment and modify their behaviour much beyond human control. Digital innovation solutions are increasingly deployed in transport, business and administrative domains, and therefore, if abused by a malicious...

    Full text to download in external service

  • Systemowe ujęcie wpływu destabilizatorów na poszukiwanie równowagi adaptacyjnej w procesie doskonalenia jakości w podmiotach leczniczych

    W niniejszym opracowaniu zaprezentowano metodyczne aspekty poszukiwania równowagi adaptacyjnej w doskonaleniu jakości w podmiotach leczniczych. Tego typu sytuacja wynikać może miedzy innymi z pojawienia się szeregu destabilizatorów zakłócających realizację działań doskonalących. Istotne staje się także zidentyfikowanie szans i unikanie zagrożeń wynikających z tego typu destabilizacji, a w dalszej konsekwencji podjęcie działań adaptatywnych...

    Full text available to download

  • ICT and social development. Conceptual considerations.

    Publication

    - Year 2020

    This chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...

    Full text to download in external service