Filters
total: 148
Search results for: environmental threat
-
Model of ship's magnetic signature
PublicationShips made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...
-
Multidipoles model of ship's magnetic field
PublicationShips made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...
-
Multidipoles model of ship's magnetic field
PublicationShips made of ferromagnetic metals interfere with Earth's magnetic field in their surrounding. The disturbance of the magnetic field makes possible localization and even identification of the ship, which could determine a threat to the ship. The measurement of the magnetic field around the ship enables to determine its magnetic signature. The paper presents a multidipoles model of the ship magnetic field, which allows to determine...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Cavitation Erosion of P110 Steel in Different Drilling Muds
PublicationThe P110 steel specimens were subjected to ultrasonic cavitation erosion in different compositions of drilling muds and surfactant additive. The test procedure was based on ASTM-G-32 standard recommendations. API 5CT-P110 steel is used for pipes in oil and gas industry. The harsh environment and high velocity of flows poses corrosive and erosive threat on materials used there. The composition of drilling fluid influences its rheological...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Malware - a survey on threats and mitigation techniques
PublicationThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
Processing of Marine Satellite Data in WEB-BASED GIS
PublicationGIS systems are important modern word. They allow to quickly analyse and corelate various data bound to their geographical context. The paper describes Web-base GIS with ability to integrate and analyse data from many sources such as: satellite imagery, threat simulation models, marine vessels Automatic Identification System, raster and vector topographic charts. Some details of system architecture and implementation are presented...
-
Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas
PublicationThis paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...
-
Effect of wet Hydrogen Sulfide on Carbon Steels Degradation in Refinery Based on Case Study
PublicationMaterial degradation caused by wet hydrogen sulfide (Wet H2S) is one of the major issues in refineries. Carbon steel is the main construction material used in refineries and is subjected not only to thickness loss but the hydrogen is the major concern. H2S leads to high atomic hydrogen penetration in steel which causes degradation in the form of blistering and/or cracking (HIC/SOHIC) and stress cracking in the area of welds and...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
River flow simulation based on the HEC-RAS system
PublicationThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
River Flow Simulation Based on the HEC-RAS System
PublicationThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
Challenges in preparing honey samples for chromatographic determination of contaminants and trace residues
PublicationThe determination of contaminations and residues in honey is of growing concern over past few years, especially that these compounds can not only diminish beneficial properties of honey but more importantly, if present in significant amounts, can pose serious threat to human health. Since honey is characterized by complex composition of the matrix sample, it is often necessary to apply clean-up step, in order to eliminate interfering...
-
Immunogenic and protective activity of recombinant chimeric Toxoplasma gondii proteins
PublicationToxoplasmosis, one of the most common parasitic invasions worldwide, may pose a great threat for individuals with weakened immune system. The parasite also causes considerable economic losses due to infection of livestock. To date there is no efficient immunoprophylaxis for humans and animals, which would provide long-lasting protection against T. gondii invasion. Chimeric proteins, containing several selected fragments of parasite...
-
Reactive Processing and Functionalization of Ground Tire Rubber
PublicationThe dynamic development of the automotive industry resulted in a sig- nificant increase in rubber wastes, especially end-of-life tires, which are a serious threat to the natural environment and human health. This situation has enforced the industry and academic research groups to search new and cost-effective methods for recycling waste tires. In this field of research, reactive processing and functionaliza- tion seem to be a...
-
Diver Observations by Means of Acoustic Methods
PublicationSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublicationDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublicationCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublicationGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Safety Assessment of the Regional Warmia and Mazury Road Network Using Time-Series Analysis
PublicationWarmia and Mazury still belongs to the areas with the smallest transport accessibility in Europe. Unsatisfactory state of road infrastructure is a major barrier to the development of the regional economy, impacting negatively on the life conditions of the population. Also in terms of road safety Warmia and Mazury is one of the most endangered regions in Poland. The Police statistics show that beside a high pedestrian risk observed...
-
Stabilization of Solid Residues Obtained During Sewage Sludge Thermal Treatment
PublicationCurrently wastewater treatment plants are still dealing with the problem of ecological management of sewage sludge. Nowadays, thermal utilization is considered the most eco-friendly way of processing excess sludge. However, during mentioned process, fractions of ashes and dusts are generated. Such wastes, especially dusts fraction, can be potentially harmful for the environment and wastes should be stabilized before further management....
-
Effect of Thermal Shock During Legionella Bacteria Removal on the Corrosion Properties of Zinc-Coated Steel Pipes
PublicationThe purpose of this investigation was to conduct the failure analysis of a water-supply system made from zinc-coated steel. The observed corrosion process had an intense and complex character. The brownish deposits and perforations were present after 2-3 years of exploitation. The electrochemical study based on the Tafel polarization, corrosion potential monitoring, and electrochemical impedance spectroscopy together with microscopic...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
A Target Information Display for Visualising Collision Avoidance Manoeuvres in Various Visibility Conditions
PublicationThe paper introduces a new approach to displaying information on targets. The proposed display visualises three types of information: targets’ motion parameters (typical for target tracking), combinations of own course and speed which collide with those targets (typical for Collision Threat Parameters Area display by Lenart (1983)) and combinations of own course and speed which are not compliant with COLREGS in this case (based...
-
Fibrillar aggregates in powdered milk
PublicationThis research paper addresses the hypothesis that powdered milk may contain amyloid fibrils. Amyloids are fibrillar aggregates of proteins. Up to this time, research on the presence of amyloids in food products are scarce. To check the hypothesis we performed thioflavin T fluorescence assay, X-ray powder diffraction, atomic force microscopy and fluorescence microscopy imaging. Our preliminary results show that commercially available...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Elderly persons professional activity - substantive issues and methodical challenges
PublicationPopulation ageing and mass withdrawal of persons around retirement age from the labour market constitutes a serious threat for European Union economy, especially in the so-called new member states. The coming years are expected to bring a considerable increase in public spending on pensions and health care, as well as changes in the structure and size of consumer demand and an increase in the number of socially excluded individuals....
-
Progress in used tyres management in the european union: a review
PublicationThe dynamic increase in the manufacture of rubber products, particularly those used in the automobile industry, is responsible for a vast amount of wastes, mostly in the form of used tyres, of which more than 17 million tonnes are produced globally each year. The widely differing chemical compositions and the cross-linked structures of rubber in tyres are the prime reason why they are highly resistant to biodegradation, photochemical...
-
“The Guardians of the Truth”: Journalists’ Resistance to the Algorithmization of Journalism
PublicationRegardless of the term used, be it “robot journalism,” “automated journalism,” “algorithmic journalism” or “machine-written journalism,” the process of automatic content creation and distribution is progressing in the newsrooms. Meanwhile, exercising control over the creation and distribution of news is considered a fundamental element of journalists’ professional identity. The article presents the results of research on the perception...
-
Revitalizing the Sacral Complex of the Parish of the Sacred Heart of Jesus in Gdynia: A Comprehensive Restoration Project in Alignment with Monument Conservator's Guidelines and Technical Prerequisites
PublicationReligiouscomplexes, due to their monumental character, belong to the group of facilities in which carrying out renovation works is difficult. Very often, construction works carried out as part of planned renovation work include not only modernization but also repair works, includingthose related to the reinforcement of structural elements. Renovation work in sacral buildings is particularly difficult when they...
-
Ecology In Tribology: Selected Problems of Eliminating Natural Oil-Based Lubricants from Machine Friction Couples
PublicationThe elimination of mineral oil-based lubricants from machines has multiple beneficial effects on the natural environment. Firstly – these lubricants are a direct threat to the environment in the event of leaks; secondly – their elimination reduces the demand for crude oil from which they are obtained. In addition, in many cases, e.g. when replacing traditional lubricants with water, friction losses in the bearings can also be reduced...
-
Sustainable urban planning in the context of studentification of the inner city areas
PublicationThe social dimension of urban planning as well as the importance of local communities and civic participation are often underlined in contemporary urban renewal and revitalisation programmes based on the principles of sustainable development. British Urban Renaissance is one the most far-reaching and widely discussed urban regeneration strategies which aims at repopulation and social diversification of inner city areas and land...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Determination of heavy metals in eyeshadows from China
PublicationPersonal care products and cosmetics are used daily by many people, causing local exposure to certain chemical substances through the application directly inside the oral cavity, on the skin, lips, eyes, and mucosa. Eyeshadows are among the most commonly used types of cosmetics. According to scientifc reports, they may contain heavy metals, especially in non-original products. The exposure to said heavy metals may cause local skin...
-
Solid-contact lead(II) ion-selective electrodes for potentiometric determination of lead(II) in presence of high concentrations of Na(I), Cu(II), Cd(II), Zn(II), Ca(II) and Mg(II)
PublicationLead and its compounds are a serious threat to the environment. Monitoring of this toxic heavy metal is a driving force for the continuous development of novel lead(II) ionophores to be applied in ion-selective electrodes. In this work a highly selective lead(II) ionophore, namely 25,26,27,28-tetrakis(piperidinylthiocarbonylmethylene)-p-tert-butylcalix[4]arene, was used in solid-contact ion-selective electrodes for determination...
-
(Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content
PublicationThe objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...
-
DETERMINATION OF ADDITIONAL TENSION IN TOWED STREAMER CABLE TRIGGERED BY COLLISION WITH UNDERWATER MOVING OBJECT
PublicationThe paper deals with issues connected with the behaviour of a streamer cable towed by a survey seismic vessel when the cable undergoes a strike triggered by collision with an underwater moving object. The consequences of such collisions may be both threat to the life of marine animals or damage to underwater units and large economic losses suffered by vessel owners. The risk of such collisions has increased over the last years...
-
Issues related to noise and protection against noise against the background of hazards present in the working environment
PublicationNoise is one of the physical factors that poses the greatest threat in the working environment. In order to reduce the noise exposure, noise reduction at the source should be considered. Next, the engineering and administrative controls are being developed. Finally, hearing protectors are used. Issues related to protection against noise are part of the topics in the field of occupational...
-
Levels of 13 multi-class pesticide residues in Polish honeys determined by LC-ESI-MS/MS
PublicationLevels of 13 pesticides in 40 honey samples form Poland are reported. A rapid and sensitive method was developed for the LC-ESI-MS/MS determination of multi-class pesticide residues in honey samples. Liquid-liquid extraction (LLE) on a diatomaceous earth support (requiring the use of small amounts of organic solvent), followed by chromatographic separation on a C18 column and gradient elution were employed. The method quantifies...
-
A method of determining and visualizing safe motion parameters of a ship navigating in restricted waters
PublicationThe paper presents a method of displaying ship collision avoidance information which is based on an unconventional Collision Threat Parameters Area (CTPA) technique. The solution presented here extends CTPA's functionality from past works by supporting navigation in restricted waters and handling ship domains analytically instead of numerically. It visualizes potential navigational threats as well as possible collision avoidance...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Automatic Watercraft Recognition and Identification on Water Areas Covered by Video Monitoring as Extension for Sea and River Traffic Supervision Systems
PublicationThe article presents the watercraft recognition and identification system as an extension for the presently used visual water area monitoring systems, such as VTS (Vessel Traffic Service) or RIS (River Information Service). The watercraft identification systems (AIS - Automatic Identification Systems) which are presently used in both sea and inland navigation require purchase and installation of relatively expensive transceivers...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublicationThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...