Filters
total: 1280
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY CONTROLS AND MEASURES
-
Miasto nocą: zaburzenia snu a praca zmianowa i stres zawodowy wśród policjantów
PublicationStreszczenie. Jedną z miar subiektywnej jakości życia jest dobry sen. Cebulowa teoria szczęścia postuluje zależność pomiędzy dobrostanami cząstkowymi. Celem studium była ocena zaburzeń snu wśród policjantów z miejskich komisariatów Policji w zależności od cech pracy (stres zawodowy) i jej organizacji (zmianowość). Rezultaty pokazały, że większe problemy ze snem mieli policjanci pracujący wyłącznie na zmianach dziennych niż pracujący...
-
Wzmocnienie przestrzennych dźwigarów kratowych z zastosowaniem dodatkowego podparcia i sprężenia
PublicationPodczas obowiązkowego przeglądu technicznego obiektu budowlanego stwierdzone zostały deformacje stalowych prętów wykratowania przestrzennych dźwigarów dachowych. Opinie techniczne dotyczące stanu technicznego potwierdziły wstępnie wykryte nieprawidłowości i nakazywały podjęcie kroków zaradczych w postaci opracowania koncepcji naprawy, a w jej ślad projektu budowlanego i wykonawczego. Do czasu naprawy obiekt został dopuszczony do...
-
Scanning networks with cactus topology
PublicationThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublicationThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublicationAbstrakt Analiza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia...
-
Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid
PublicationA unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublicationMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
(Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content
PublicationThe objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublicationThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublicationIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...
-
Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method
PublicationThe paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...
-
Systemy bezprzewodowej łączności i transmisji danych dla potrzeb bezpieczeństwa publicznego (studium stanu i rozwiązań)
PublicationW niniejszym rozdziale przedstawiono charakterystyki rozwiązań użytkowych zrealizowanych w Katedrze Systemów i Sieci Radiokomunikacyjnych Politechniki Gdańskiej. Autorzy scharakteryzowali opracowane przez zespół badawczy Katedry, systemy bezprzewodowego monitoringu zagrożeń bezpieczeństwa oraz zarządzania i sterowania infrastrukturami krytycznymi. W tym też kontekście omówiono następujące systemy i aplikacje użytkowe: − globalny...
-
Safety PL - a support tool for Road Safety Impact Assessment
PublicationPublished on 19 November 2008, the European Union's Directive 2008/96/EC is one of the most important EU documents setting out a road safety orientation, in particular, road infrastructure safety management. It identifies four main areas of activity: road safety impact assessment, road safety audit, ranking of high accident concentration sections and network safety ranking and road infrastructure safety inspection. The Directive...
-
Road Infrastructure Safety Management in Poland
PublicationThe objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is...
-
Naturally occurring mitochondrial DNA heteroplasmy in the MRL mouse
PublicationThe MRL/MpJ mouse is an inbred laboratory strain of Mus musculus, known to exhibit enhanced autoimmunity, increased wound healing, and increased regeneration properties. We report the full-length mitochondrial DNA (mtDNA) sequence of the MRL mouse (Accession # EU450583), and characterize the discovery of two naturally occurring heteroplasmic sites. The first is a T3900C substitution in the TpsiCloop of the tRNA methionine gene...
-
Determining and verifying the safety integrity level of the controland protection systems under uncertainty
PublicationThe probabilistic models of the electrical, electronic and programmable electronic (E/E/PE)systems, which are proposed in the IEC 61508 and IEC 61511 standards, do not cover the uncertainty aspectsof results obtained from these models. The proposed method takes into consideration the sensitivity analysisof probabilistic models of E/E/PE systems as well as the uncertainty of probabilistic results. It uses differentialfactors, which...
-
Gender and Digital Divide - Information and Communication Technologiesand their Impact on Equality
PublicationIn the entire Europe more women than men graduate from tertiaryeducation institutes. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors. A number of industry reports highlight a low number of women in IT occupations49. This has led to a variety of public policy measures, such as subsidies on community provision,...
-
The Method of Multi-criteria Analysis to Support the Decision on Load or Micro-generation Connection to a Low- or Medium-voltage Power Grid
PublicationThis paper presents a method that supports the decision in terms on selecting the best option of a load connection to a low- or medium-voltage power distribution grid, and of a micro-generation source connection to a low-voltage grid. The method is based on the search for the option with the lowest aggregate assessment measure, which is the weighted average of partial assessment measures determined for each of eight considered...
-
Automated Detection of Sleep Apnea and Hypopnea Events Based on Robust Airflow Envelope Tracking in the Presence of Breathing Artifacts. - [IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS]
PublicationThe paper presents a new approach to detection of apnea/hypopnea events, in the presence of artifacts and breathing irregularities, from a single channel airflow record. The proposed algorithm, based on a robust envelope detector , identifies segments of signal affected by a high amplitude mo d- ulation corresponding to apnea/hypopnea events. It is show n that a robust airflow envelope - free of breathing artifacts - improves effectiveness...
-
An analysis of domain-based ship collision risk parameters
PublicationAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
Development of trolleybus public transport in Gdynia as part of sustainable mobility strategy
PublicationIn many EU cities trolleybuses are experiencing a period of revitalization. New lines, new and modern trolley-buses, the use of auxiliary propulsion battery, eco-logical values and others, create great opportunities for that kind of public transport as an effective tool to shape transport policy in accordance with the principles of sustainable mobility. Gdynia is one of three cities in Poland with trolleybuses public transport...
-
Elderly persons professional activity - substantive issues and methodical challenges
PublicationPopulation ageing and mass withdrawal of persons around retirement age from the labour market constitutes a serious threat for European Union economy, especially in the so-called new member states. The coming years are expected to bring a considerable increase in public spending on pensions and health care, as well as changes in the structure and size of consumer demand and an increase in the number of socially excluded individuals....
-
How to define and measure informal employment in CEE countries - the case of Poland
PublicationThe study of informal employment is still associated with several obstacles, from the scope of definition, through measurement methods, to policy recommendations. This article aims to revise the existing methodological frames in order to point out how to improve the study of informal employment in CEE countries. The case of Poland serves to examine whether the common definitions and measurement methods are suitable for an inclusive...
-
Pilot Testing of Developed Multimodal Biometric Identity Verification System
PublicationThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed at engineered...
-
Social Capital, Human Capital, Tacit Knowledge, and Innovations: A Polish-US Cross-Country Study
PublicationThis study measures the relationship between human and social capital (internal and external) and tacit knowledge sharing's influence on innovativeness among knowledge workers employed in Polish (n=1050) and US (n=1118) organizations. The structural equation modeling method revealed that internal social capital matters more for organizational innovativeness in the US. In Poland, both external and internal were important. Specifically,...
-
Sustainable Waste Management for Implementation of a Circular Economy Model in a Port
PublicationThe manuscript presents the management of waste from marine vessels and cargo handling companies in a selected European Union port. The main objective of the paper is to analyse and evaluate the existing waste management model in the port of Szczecin in the context of circular economy. The expert research carried out is aimed, inter alia, at identifying which of the solutions currently in use need to be improved from an environmental...
-
Top k Recommendations using Contextual Conditional Preferences Model
PublicationRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
TRANSFORMATION OF THE BANKING SECTOR AS AN ELEMENT OF ECONOMIC TRANSFORMATION IN SOUTH-EAST EUROPE
PublicationThe issue of stability in economy is essential, both in theoretical as well as in practical discussion. It is especially important in an environment of economic transformation. The aim of the article is to assess the economic stability during the transformation of the south-east region of Europe over a period of 19 years (1996 – 2014), and the mutual relation between the economic stability and the transformation process, including...
-
Acoustic Detector of Road Vehicles Based on Sound Intensity
PublicationA method of detecting and counting road vehicles using an acoustic sensor placed by the road is presented. The sensor measures sound intensity in two directions: parallel and perpendicular to the road. The sound intensity analysis performs acoustic event detection. A normalized position of the sound source is tracked and used to determine if the detected event is related to a moving vehicle and to establish the direction of movement....
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Improving Traffic Light Recognition Methods using Shifting Time-Windows
PublicationWe propose a novel method of improving algorithms recognizing traffic lights in video sequences. Our focus is on algorithms for applications which notify the driver of a light in sight. Many existing methods process images in the recording separately. Our method bases on the observation that real-life videos depict underlying continuous processes. We named our method FSA (Frame Sequence Analyzed). It is applicable for any underlying...
-
Improving methods for detecting people in video recordings using shifting time-windows
PublicationWe propose a novel method for improving algorithms which detect the presence of people in video sequences. Our focus is on algorithms for applications which require reporting and analyzing all scenes with detected people in long recordings. Therefore one of the target qualities of the classification result is its stability, understood as a low number of invalid scene boundaries. Many existing methods process images in the recording...
-
Adapting new tools of urban freight management based on Gdynia’s dedicated delivery bays example – an analysis of the process
PublicationThe article presents an analysis of a process which ultimately helped Gdynia to designate pilot delivery sites in its downtown area using international experience. A verification was conducted of policy transfer theory and its practical implementation based on an URBACT Freight Tails project. While the choice of the solution was based on critical analysis of existing practical examples, it needed to be adapted to the local conditions...
-
Place attachment, place identity, and satisfaction with urban aesthetic.
Open Research DataThe data include individual responses on the following scales (1) place attachment, (2) place identity, and (3) satisfaction with an urban aesthetic. Each line represents responses obtained from one participant and his or her demographic characteristics. like gender, age, and education level.
-
IFIP WG 11.3 Working Conference on Data and Applications Security (also known as DBSEC)
Conferences -
Searching for road deformations using mobile laser scanning
PublicationMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
Global energy transition: From the main determinants to economic challenges regions
PublicationDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublicationThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublicationPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublicationThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublicationIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublicationIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Zagrożenie katastrofą budowlaną Mostu Uniwersyteckiego w Bydgoszczy. Analiza i badania
PublicationMost Uniwersytecki został zamknięty po 7 latach od oddania do użytku. Powodem były błędy projektowe ujawnione w przeglądzie w roku 2020, potwierdzone teoretycznymi analizami nośności. Bezpośrednim powodem zamknięcia przeprawy było stwierdzenie zagrożenia katastrofą budowlaną. W roku 2021, zgodnie z zaleceniem i koncepcją ekspercką, krytyczne elementy konstrukcji mostu zostały wzmocnione. W styczniu 2022 most został przywrócony...
-
Effect of the Road Environment on Road Safety in Poland
PublicationRun-off-road accidents tend to be very severe because when a vehicle leaves the road, it will often crash into a solid obstacle (tree, pole, supports, front wall of a culvert, barrier). A statistical analysis of the data shows that Poland's main roadside hazard is trees and the severity of vehicles striking a tree in a run-off-road crash. The risks are particularly high in north-west Poland with many of the roads lined up with...
-
Multimodal learning application with interactive animated character. [Multimodalna aplikacja edukacyjna wykorzystująca interaktywną animowaną postać]
PublicationThe aim of this study is to design a computer application that may assist teachers and therapists in multimodal manner in their work with impaired or disabled children. The application can be operated in many different ways, giving to a child with special educational needs a possibility to learn and train many skills or treat speech disorders. The main stress in this research is on the creation of animated character that will serve...
-
2-Methoxyestradiol and Hydrogen Peroxide as Promising Biomarkers in Parkinson’s Disease
PublicationEstrogens function in numerous physiological processes including controlling brain cell growth and differentiation. 2-Meth- oxestradiol (2-ME2), a 17β-estradiol (E2) metabolite, is known for its anticancer effects as observed both in vivo and in vitro. 2-ME2 affects all actively dividing cells, including neurons. The study aimed to determine whether 2-ME2 is a potentially cancer-protective or rather neurodegenerative agent in a...
-
Combined analysis of whole human blood parameters by Raman spectroscopy and spectral-domain low-coherence interferometry
PublicationIn this article the simultaneous investigation of blood parameters by complementary optical methods, Raman spectroscopy and spectral-domain low-coherence interferometry, is presented. Thus, the mutual relationship between chemical and physical properties may be investigated, because low-coherence interferometry measures optical properties of the investigated object, while Raman spectroscopy gives information about its molecular...