Search results for: threat
-
Karolina Sobieraj mgr inż.
PeopleMSc. Karolina Sobieraj graduated in 2018 in the field of Renewable Energy Sources and Waste Management in the specialization of Waste Management, with a scholarship from the Minister of Science and Higher Education for students for outstanding scientific achievements in the 2017/2018 academic year. From October 2019, she started studies at the UPWr Doctoral School in the discipline of environmental engineering, mining and energy....
-
Processing of Marine Satellite Data in WEB-BASED GIS
PublicationGIS systems are important modern word. They allow to quickly analyse and corelate various data bound to their geographical context. The paper describes Web-base GIS with ability to integrate and analyse data from many sources such as: satellite imagery, threat simulation models, marine vessels Automatic Identification System, raster and vector topographic charts. Some details of system architecture and implementation are presented...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Diagnostics in ballast water management
Publication. Diagnostics in ballast water management is the main remedy to protect against the threat of spreading invasive species that can be carried in ships' ballast tanks. This phenomenon is getting better known and understood. New and more effective methods of preventing threats related to this are being developed. Procedures are created to ensure environmental safety in the face of ever-increasing transport by sea. The article characterizes...
-
Cavitation Erosion of P110 Steel in Different Drilling Muds
PublicationThe P110 steel specimens were subjected to ultrasonic cavitation erosion in different compositions of drilling muds and surfactant additive. The test procedure was based on ASTM-G-32 standard recommendations. API 5CT-P110 steel is used for pipes in oil and gas industry. The harsh environment and high velocity of flows poses corrosive and erosive threat on materials used there. The composition of drilling fluid influences its rheological...
-
Effect of wet Hydrogen Sulfide on Carbon Steels Degradation in Refinery Based on Case Study
PublicationMaterial degradation caused by wet hydrogen sulfide (Wet H2S) is one of the major issues in refineries. Carbon steel is the main construction material used in refineries and is subjected not only to thickness loss but the hydrogen is the major concern. H2S leads to high atomic hydrogen penetration in steel which causes degradation in the form of blistering and/or cracking (HIC/SOHIC) and stress cracking in the area of welds and...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
River flow simulation based on the HEC-RAS system
PublicationThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
River Flow Simulation Based on the HEC-RAS System
PublicationThis work considers the problem of river floods, and presents a computer solution that can be used to predict such a threat. The basic tool, called Hydrologic Engineering Centers for River Analysis System (HEC-RAS), and created by the US Army Corps of Engineering, is well developed; and the models created in the system HEC-RAS are quite realistic. For the purpose of solving practical national flood problems, simplified static and...
-
Herbarium of Division of Marine Biology and Ecology University of Gdańsk (DMBE)
Open Research DataHerbarium of Division of Marine Biology and Ecology University of Gdańsk (DMBE) is a research herbarium encompassing specimens of vascular plants and algae hosted by the Laboratory of Marine Plant Ecology at University of Gdańsk, Poland. The aim of Herbarium is to preserve marine plant and algae collections mostly from the Gulf of Gdańsk, but the herbarium...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublicationW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Challenges in preparing honey samples for chromatographic determination of contaminants and trace residues
PublicationThe determination of contaminations and residues in honey is of growing concern over past few years, especially that these compounds can not only diminish beneficial properties of honey but more importantly, if present in significant amounts, can pose serious threat to human health. Since honey is characterized by complex composition of the matrix sample, it is often necessary to apply clean-up step, in order to eliminate interfering...
-
Reactive Processing and Functionalization of Ground Tire Rubber
PublicationThe dynamic development of the automotive industry resulted in a sig- nificant increase in rubber wastes, especially end-of-life tires, which are a serious threat to the natural environment and human health. This situation has enforced the industry and academic research groups to search new and cost-effective methods for recycling waste tires. In this field of research, reactive processing and functionaliza- tion seem to be a...
-
Immunogenic and protective activity of recombinant chimeric Toxoplasma gondii proteins
PublicationToxoplasmosis, one of the most common parasitic invasions worldwide, may pose a great threat for individuals with weakened immune system. The parasite also causes considerable economic losses due to infection of livestock. To date there is no efficient immunoprophylaxis for humans and animals, which would provide long-lasting protection against T. gondii invasion. Chimeric proteins, containing several selected fragments of parasite...
-
Acoustics - new services for urban planning, research and education
PublicationThe main purpose of the presented design is twofold, namely: providing detailed information about the noise threats that occur every day in city areas and preventing the noise induced hearing loss especially among young people. An experimental system designed for the continuous monitoring of the acoustic climate of urban areas was developed and implemented within the PLGrid Plus project. The assessment of environmental threats...
-
Diver Observations by Means of Acoustic Methods
PublicationSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublicationDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku
PublicationStreszczenie: Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku. Celem artykułu jest wykazanie roli inicjatyw społecznych w budzeniu poczucia odpowiedzialności za dziedzictwo materialne i kulturowe. Przyjęto założenie, że dla lokalnych społeczności miasto jest przestrzenią pamięci. Nastrój, atmosfera i klimat miejsca to słowa, które określają fizyczny...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublicationCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Klasyfikacja wyrobów tytoniowych z wykorzystaniem elektronicznych nosów
PublicationZapobieganie nielegalnej dystrybucji wyrobów tytoniowych w Polsce stanowi poważny problem. Wyroby tytoniowe przemycane do Polski mogą charakteryzować się niższą jakością, wynikającą z wykorzystania surowców gorszego gatunku. Jednym z rozwiązań zmniejszających skalę tego problemu mogą być działania ograniczające przemyt przez granice państwa. Autorzy pracy uważają, że wykorzystanie elektronicznych nosów do rutynowych kontroli przewożonych...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublicationGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Safety Assessment of the Regional Warmia and Mazury Road Network Using Time-Series Analysis
PublicationWarmia and Mazury still belongs to the areas with the smallest transport accessibility in Europe. Unsatisfactory state of road infrastructure is a major barrier to the development of the regional economy, impacting negatively on the life conditions of the population. Also in terms of road safety Warmia and Mazury is one of the most endangered regions in Poland. The Police statistics show that beside a high pedestrian risk observed...
-
Stabilization of Solid Residues Obtained During Sewage Sludge Thermal Treatment
PublicationCurrently wastewater treatment plants are still dealing with the problem of ecological management of sewage sludge. Nowadays, thermal utilization is considered the most eco-friendly way of processing excess sludge. However, during mentioned process, fractions of ashes and dusts are generated. Such wastes, especially dusts fraction, can be potentially harmful for the environment and wastes should be stabilized before further management....
-
Effect of Thermal Shock During Legionella Bacteria Removal on the Corrosion Properties of Zinc-Coated Steel Pipes
PublicationThe purpose of this investigation was to conduct the failure analysis of a water-supply system made from zinc-coated steel. The observed corrosion process had an intense and complex character. The brownish deposits and perforations were present after 2-3 years of exploitation. The electrochemical study based on the Tafel polarization, corrosion potential monitoring, and electrochemical impedance spectroscopy together with microscopic...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Fibrillar aggregates in powdered milk
PublicationThis research paper addresses the hypothesis that powdered milk may contain amyloid fibrils. Amyloids are fibrillar aggregates of proteins. Up to this time, research on the presence of amyloids in food products are scarce. To check the hypothesis we performed thioflavin T fluorescence assay, X-ray powder diffraction, atomic force microscopy and fluorescence microscopy imaging. Our preliminary results show that commercially available...
-
A Target Information Display for Visualising Collision Avoidance Manoeuvres in Various Visibility Conditions
PublicationThe paper introduces a new approach to displaying information on targets. The proposed display visualises three types of information: targets’ motion parameters (typical for target tracking), combinations of own course and speed which collide with those targets (typical for Collision Threat Parameters Area display by Lenart (1983)) and combinations of own course and speed which are not compliant with COLREGS in this case (based...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Marcin Kulawiak dr hab. inż.
People -
Elderly persons professional activity - substantive issues and methodical challenges
PublicationPopulation ageing and mass withdrawal of persons around retirement age from the labour market constitutes a serious threat for European Union economy, especially in the so-called new member states. The coming years are expected to bring a considerable increase in public spending on pensions and health care, as well as changes in the structure and size of consumer demand and an increase in the number of socially excluded individuals....
-
“The Guardians of the Truth”: Journalists’ Resistance to the Algorithmization of Journalism
PublicationRegardless of the term used, be it “robot journalism,” “automated journalism,” “algorithmic journalism” or “machine-written journalism,” the process of automatic content creation and distribution is progressing in the newsrooms. Meanwhile, exercising control over the creation and distribution of news is considered a fundamental element of journalists’ professional identity. The article presents the results of research on the perception...
-
Ecology In Tribology: Selected Problems of Eliminating Natural Oil-Based Lubricants from Machine Friction Couples
PublicationThe elimination of mineral oil-based lubricants from machines has multiple beneficial effects on the natural environment. Firstly – these lubricants are a direct threat to the environment in the event of leaks; secondly – their elimination reduces the demand for crude oil from which they are obtained. In addition, in many cases, e.g. when replacing traditional lubricants with water, friction losses in the bearings can also be reduced...
-
Revitalizing the Sacral Complex of the Parish of the Sacred Heart of Jesus in Gdynia: A Comprehensive Restoration Project in Alignment with Monument Conservator's Guidelines and Technical Prerequisites
PublicationReligiouscomplexes, due to their monumental character, belong to the group of facilities in which carrying out renovation works is difficult. Very often, construction works carried out as part of planned renovation work include not only modernization but also repair works, includingthose related to the reinforcement of structural elements. Renovation work in sacral buildings is particularly difficult when they...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Progress in used tyres management in the european union: a review
PublicationThe dynamic increase in the manufacture of rubber products, particularly those used in the automobile industry, is responsible for a vast amount of wastes, mostly in the form of used tyres, of which more than 17 million tonnes are produced globally each year. The widely differing chemical compositions and the cross-linked structures of rubber in tyres are the prime reason why they are highly resistant to biodegradation, photochemical...
-
Determination of heavy metals in eyeshadows from China
PublicationPersonal care products and cosmetics are used daily by many people, causing local exposure to certain chemical substances through the application directly inside the oral cavity, on the skin, lips, eyes, and mucosa. Eyeshadows are among the most commonly used types of cosmetics. According to scientifc reports, they may contain heavy metals, especially in non-original products. The exposure to said heavy metals may cause local skin...
-
Sustainable urban planning in the context of studentification of the inner city areas
PublicationThe social dimension of urban planning as well as the importance of local communities and civic participation are often underlined in contemporary urban renewal and revitalisation programmes based on the principles of sustainable development. British Urban Renaissance is one the most far-reaching and widely discussed urban regeneration strategies which aims at repopulation and social diversification of inner city areas and land...
-
Ultimate biodegradability and ecotoxicity of orally administered antidiabetic drugs
PublicationHypoglycaemic pharmaceuticals are recently more and more frequently detected in the environment. In our previous study, we have shown that even though many of them undergo significant primary degradation some are transformed to stable products or undergo such transformation that a large part of the structure is still preserved. One of the main routes of elimination from wastewaters or surface waters is biodegradation and a lack...
-
Ocena stopnia degradacji termicznej olejów jadalnych z wykorzystaniem techniki ultraszybkiej chromatografii gazowej
PublicationPod wpływem podwyższonej temperatury oleje jadalne ulegają procesowi degradacji termicznej. W tym przypadku ilość lotnych związków organicznych, charakteryzujących się dużą polarnością, występujących w olejach jadalnych jest większa. Zmiany składu olejów jadalnych mogą stanowić zagrożenie dla zdrowia człowieka. Obecnie istnieje możliwości wykorzystania techniki ultraszybkiej chromatografii gazowej do oceny stopnia degradacji olejów...
-
Solid-contact lead(II) ion-selective electrodes for potentiometric determination of lead(II) in presence of high concentrations of Na(I), Cu(II), Cd(II), Zn(II), Ca(II) and Mg(II)
PublicationLead and its compounds are a serious threat to the environment. Monitoring of this toxic heavy metal is a driving force for the continuous development of novel lead(II) ionophores to be applied in ion-selective electrodes. In this work a highly selective lead(II) ionophore, namely 25,26,27,28-tetrakis(piperidinylthiocarbonylmethylene)-p-tert-butylcalix[4]arene, was used in solid-contact ion-selective electrodes for determination...
-
DETERMINATION OF ADDITIONAL TENSION IN TOWED STREAMER CABLE TRIGGERED BY COLLISION WITH UNDERWATER MOVING OBJECT
PublicationThe paper deals with issues connected with the behaviour of a streamer cable towed by a survey seismic vessel when the cable undergoes a strike triggered by collision with an underwater moving object. The consequences of such collisions may be both threat to the life of marine animals or damage to underwater units and large economic losses suffered by vessel owners. The risk of such collisions has increased over the last years...
-
(Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content
PublicationThe objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...
-
Analiza bibliometryczna w badaniach dotyczących prognozowania upadłości przedsiębiorstw w Polsce
PublicationCelem opracowania jest ukazanie obrazu piśmiennictwa poświęconego zagadnieniom prognozowania upadłości przedsiębiorstw w Polsce. Jako metodę badawczą zastosowano analizę bibliometryczną. Do analizy wykorzystano bazę Google Scholar oraz narzędzie Publish or Perish 7. Okresem badań objęto lata 1995– 2019. Jako frazy do wyszukiwania publikacji zastosowano: „prognozowanie upadłości”, „prognozowanie zagrożenia finansowego”, „systemy...
-
Issues related to noise and protection against noise against the background of hazards present in the working environment
PublicationNoise is one of the physical factors that poses the greatest threat in the working environment. In order to reduce the noise exposure, noise reduction at the source should be considered. Next, the engineering and administrative controls are being developed. Finally, hearing protectors are used. Issues related to protection against noise are part of the topics in the field of occupational...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Levels of 13 multi-class pesticide residues in Polish honeys determined by LC-ESI-MS/MS
PublicationLevels of 13 pesticides in 40 honey samples form Poland are reported. A rapid and sensitive method was developed for the LC-ESI-MS/MS determination of multi-class pesticide residues in honey samples. Liquid-liquid extraction (LLE) on a diatomaceous earth support (requiring the use of small amounts of organic solvent), followed by chromatographic separation on a C18 column and gradient elution were employed. The method quantifies...